Analysis

  • max time kernel
    122s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/07/2024, 16:12

General

  • Target

    Valorant-Spoofer-main/Fortnite4.exe

  • Size

    559KB

  • MD5

    4c37879689505f683c1e07b86b8aa7f2

  • SHA1

    58484777d59af5378002ee6cd686525f26449098

  • SHA256

    7bcbc81dbfbc85b4c7c40f44931788a814ded426317e6ea9456cc65c37341c92

  • SHA512

    0b6615a38a67e922527edc694838afa2e96db58ab4f09c03fdf3e71a49bbab6e74addd54efbdd56a25c2bc8fc74e60d8a58409e2c471421438d3193df88acc74

  • SSDEEP

    6144:5fqHpILYw0mlefjZJnu3GHYKDcOuhHovXIslLMJsd/4TelpDtrRA6Ts5v3FNR3:xq2L7UjX0G/xvwsrSeLlTst3t3

Score
10/10

Malware Config

Signatures

  • ElysiumStealer

    ElysiumStealer (previously known as ZeromaxStealer) is an info stealer that can steal login credentials for various accounts.

  • ElysiumStealer Support DLL 1 IoCs
  • Manipulates Digital Signatures 1 TTPs 4 IoCs

    Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 20 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 48 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 52 IoCs
  • Modifies registry key 1 TTPs 19 IoCs
  • Modifies system certificate store 2 TTPs 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\Fortnite4.exe
    "C:\Users\Admin\AppData\Local\Temp\Valorant-Spoofer-main\Fortnite4.exe"
    1⤵
    • Manipulates Digital Signatures
    • Checks computer location settings
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4720
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c wmic useraccount where caption='Nemesis-79921' rename Nemesis-79921
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4540
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic useraccount where caption='Nemesis-79921' rename Nemesis-79921
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:1584
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d PizzaXYZ-27003 /f
        3⤵
        • Modifies registry key
        PID:1476
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4248
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ComputerName /v ComputerName /t REG_SZ /d I LOVE PIZZA-27006 /f
        3⤵
        • Modifies registry key
        PID:4368
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:644
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SYSTEM\CurrentControlSet\Control\ComputerName\ActiveComputerName /v ComputerName /t REG_SZ /d I LOVE PIZZA-27006 /f
        3⤵
        • Modifies registry key
        PID:556
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4364
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SYSTEM\HardwareConfig /v LastConfig /t REG_SZ /d {I LOVE PIZZA-27006} /f
        3⤵
        • Modifies registry key
        PID:4484
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v HwProfileGuid /t REG_SZ /d {I LOVE PIZZA-27006-3066-2285-29270} /f
        3⤵
        • Modifies registry key
        PID:4068
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5048
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SYSTEM\CurrentControlSet\Control\IDConfigDB\Hardware" "Profiles\0001 /v GUID /t REG_SZ /d {I LOVE PIZZA-27006-3066-2285-29270} /f
        3⤵
        • Modifies registry key
        PID:1636
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v BuildGUID /t REG_SZ /d I LOVE PIZZA-27006 /f
        3⤵
        • Modifies registry key
        PID:4728
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v RegisteredOwner /t REG_SZ /d I LOVE PIZZA-27006 /f
        3⤵
        • Modifies registry key
        PID:3964
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v RegisteredOrganization /t REG_SZ /d I LOVE PIZZA-27010 /f
        3⤵
        • Modifies registry key
        PID:1672
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5112
      • C:\Windows\SysWOW64\reg.exe
        REG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v GUID /t REG_SZ /d 27010-13814-20149-20565 /f
        3⤵
        • Modifies registry key
        PID:1836
    • C:\Windows\SysWOW64\cmd.exe
      "cmd"
      2⤵
        PID:4196
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKLM\SOFTWARE\Microsoft\Cryptography /v MachineGuid /t REG_SZ /d 27010-13814-20149-20565 /f
          3⤵
          • Modifies registry key
          PID:3896
      • C:\Windows\SysWOW64\cmd.exe
        "cmd"
        2⤵
          PID:4576
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v ProductId /t REG_SZ /d 27010-13814-20149-20565 /f
            3⤵
            • Modifies registry key
            PID:4480
        • C:\Windows\SysWOW64\cmd.exe
          "cmd"
          2⤵
            PID:4992
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\SOFTWARE\Microsoft\Windows" "NT\CurrentVersion /v InstallDate /t REG_SZ /d 27010 /f
              3⤵
              • Modifies registry key
              PID:2580
          • C:\Windows\SysWOW64\cmd.exe
            "cmd"
            2⤵
              PID:2920
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\SYSTEM\CurrentControlSet\Control\SystemInformation /v ComputerHardwareId /t REG_SZ /d {27010-13814-20149-20565} /f
                3⤵
                • Modifies registry key
                PID:4996
            • C:\Windows\SysWOW64\cmd.exe
              "cmd"
              2⤵
                PID:1584
                • C:\Windows\SysWOW64\reg.exe
                  REG ADD HKLM\HARDWARE\DESCRIPTION\System\BIOS /v SystemSKU /t REG_SZ /d I LOVE PIZZA-27010-13814 /f
                  3⤵
                  • Modifies registry key
                  PID:1756
              • C:\Windows\SysWOW64\cmd.exe
                "cmd"
                2⤵
                  PID:4792
                  • C:\Windows\SysWOW64\reg.exe
                    REG ADD HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\1 /v ProcessorNameString /t REG_SZ /d 27010-13814 /f
                    3⤵
                    • Checks processor information in registry
                    • Modifies registry key
                    PID:816
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd"
                  2⤵
                    PID:3308
                    • C:\Windows\SysWOW64\reg.exe
                      REG ADD HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\2 /v ProcessorNameString /t REG_SZ /d 27010-13814 /f
                      3⤵
                      • Checks processor information in registry
                      • Modifies registry key
                      PID:3192
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd"
                    2⤵
                      PID:556
                      • C:\Windows\SysWOW64\reg.exe
                        REG ADD HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\3 /v ProcessorNameString /t REG_SZ /d 27013-24562 /f
                        3⤵
                        • Checks processor information in registry
                        • Modifies registry key
                        PID:4484
                    • C:\Windows\SysWOW64\cmd.exe
                      "cmd"
                      2⤵
                        PID:4072
                        • C:\Windows\SysWOW64\reg.exe
                          REG ADD HKLM\HARDWARE\DESCRIPTION\System\CentralProcessor\0 /v ProcessorNameString /t REG_SZ /d 27013-24562 /f
                          3⤵
                          • Checks processor information in registry
                          • Modifies registry key
                          PID:4068
                      • C:\Windows\SysWOW64\cmd.exe
                        "cmd"
                        2⤵
                          PID:2672
                          • C:\Windows\SysWOW64\reg.exe
                            REG ADD "HKEY_CURRENT_USER\Software\Epic Games"
                            3⤵
                              PID:4168
                          • C:\Windows\SysWOW64\cmd.exe
                            "cmd"
                            2⤵
                              PID:5068
                              • C:\Windows\SysWOW64\reg.exe
                                REG ADD "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine"
                                3⤵
                                  PID:64
                              • C:\Windows\SysWOW64\cmd.exe
                                "cmd"
                                2⤵
                                  PID:3244
                                  • C:\Windows\SysWOW64\reg.exe
                                    REG ADD "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers"
                                    3⤵
                                      PID:3708
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "cmd"
                                    2⤵
                                      PID:3648
                                      • C:\Windows\SysWOW64\reg.exe
                                        reg delete "HKEY_LOCAL_MACHINE\Software\Epic Games" / f
                                        3⤵
                                          PID:1072
                                      • C:\Windows\SysWOW64\cmd.exe
                                        "cmd"
                                        2⤵
                                          PID:60
                                          • C:\Windows\SysWOW64\reg.exe
                                            reg delete "HKEY_CURRENT_USER\Software\Epic Games" /f
                                            3⤵
                                              PID:1940
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "cmd"
                                            2⤵
                                              PID:1712
                                            • C:\Windows\SysWOW64\cmd.exe
                                              "cmd"
                                              2⤵
                                                PID:1012
                                              • C:\Windows\SysWOW64\cmd.exe
                                                "cmd"
                                                2⤵
                                                  PID:1972
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  "cmd"
                                                  2⤵
                                                    PID:1364
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "cmd"
                                                    2⤵
                                                      PID:3396
                                                    • C:\Windows\SysWOW64\cmd.exe
                                                      "cmd"
                                                      2⤵
                                                        PID:4996
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        "cmd"
                                                        2⤵
                                                          PID:2924
                                                        • C:\Windows\SysWOW64\cmd.exe
                                                          "cmd"
                                                          2⤵
                                                            PID:4032
                                                          • C:\Windows\SysWOW64\cmd.exe
                                                            "cmd"
                                                            2⤵
                                                              PID:1608
                                                            • C:\Windows\SysWOW64\cmd.exe
                                                              "cmd"
                                                              2⤵
                                                                PID:4492
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                "cmd"
                                                                2⤵
                                                                  PID:1516
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  "cmd"
                                                                  2⤵
                                                                    PID:3740
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      REG ADD "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /v AccountId /t REG_SZ /d 27019-13291-8205-27219 /f
                                                                      3⤵
                                                                        PID:2412
                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                      "cmd"
                                                                      2⤵
                                                                        PID:4276
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          REG ADD "HKEY_CURRENT_USER\Software\Epic Games\Unreal Engine\Identifiers" /v Machineid /t REG_SZ /d 27019-13291-8205-27219 /f
                                                                          3⤵
                                                                            PID:3808
                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                          "cmd"
                                                                          2⤵
                                                                            PID:4348
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0000" /v NetCfgInstanceId /t REG_SZ /d {27019-13291-8205-27219} /f
                                                                              3⤵
                                                                                PID:4668
                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                              "cmd"
                                                                              2⤵
                                                                                PID:3708
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  REG ADD "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Class\{4d36e972-e325-11ce-bfc1-08002be10318}\0000" /v MatchingDeviceId /t REG_SZ /d {27019-13291-8205-27219} /f
                                                                                  3⤵
                                                                                    PID:3128
                                                                              • C:\Windows\system32\rundll32.exe
                                                                                "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                                                1⤵
                                                                                  PID:4964
                                                                                • C:\Windows\System32\svchost.exe
                                                                                  C:\Windows\System32\svchost.exe -k UnistackSvcGroup
                                                                                  1⤵
                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                  PID:3680
                                                                                • C:\Windows\system32\rundll32.exe
                                                                                  "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.Search_cw5n1h2txyewy
                                                                                  1⤵
                                                                                    PID:3472
                                                                                  • C:\Windows\system32\rundll32.exe
                                                                                    "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy
                                                                                    1⤵
                                                                                      PID:1832
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                      1⤵
                                                                                      • Enumerates system info in registry
                                                                                      • Modifies Internet Explorer settings
                                                                                      • Modifies registry class
                                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                                      • Suspicious use of FindShellTrayWindow
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:4648
                                                                                    • C:\Windows\system32\rundll32.exe
                                                                                      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
                                                                                      1⤵
                                                                                        PID:4320
                                                                                      • C:\Windows\system32\rundll32.exe
                                                                                        "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.AAD.BrokerPlugin_cw5n1h2txyewy
                                                                                        1⤵
                                                                                          PID:3192

                                                                                        Network

                                                                                        MITRE ATT&CK Enterprise v15

                                                                                        Replay Monitor

                                                                                        Loading Replay Monitor...

                                                                                        Downloads

                                                                                        • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\USS.jcp

                                                                                          Filesize

                                                                                          8KB

                                                                                          MD5

                                                                                          30766e6331507eeb98d9691991b0aefe

                                                                                          SHA1

                                                                                          64b3e88a88c524f9988e8b1ac38a250907ffeb92

                                                                                          SHA256

                                                                                          4c299def4703c67aa5049b55e2a7d486efd0562a35411415e4f56d8159438f5f

                                                                                          SHA512

                                                                                          085ec9145c31eee176c50ba15b769a6456d5c53af0f718a8ae30f584d03921e66baf8f4de57e1a4e061b0fe357dc8289c134ba6be2cfb458ed0f572d2e8cfe1f

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\AINOFUHE\microsoft.windows[1].xml

                                                                                          Filesize

                                                                                          97B

                                                                                          MD5

                                                                                          ce0789bdca84d9355ecd40a5085c4314

                                                                                          SHA1

                                                                                          f50d0b3d9b0dc65eae41908d41f3c1a27ccfdfac

                                                                                          SHA256

                                                                                          e32bff2168d5656534a48084d8aac2c84780cf89725af67126f70c07cca9c633

                                                                                          SHA512

                                                                                          2dc57de8d0a939da5839e7e8eed6f25d02905ca0641f664b604d31e0c6368b976f290ff2d3e1166256302c042abc886d8de6aba877125250311e983e71af8a50

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_AutoGenerated_{2F519BF2-C697-59F8-8F6A-1E19509CE66B}

                                                                                          Filesize

                                                                                          36KB

                                                                                          MD5

                                                                                          8aaad0f4eb7d3c65f81c6e6b496ba889

                                                                                          SHA1

                                                                                          231237a501b9433c292991e4ec200b25c1589050

                                                                                          SHA256

                                                                                          813c66ce7dec4cff9c55fb6f809eab909421e37f69ff30e4acaa502365a32bd1

                                                                                          SHA512

                                                                                          1a83ce732dc47853bf6e8f4249054f41b0dea8505cda73433b37dfa16114f27bfed3b4b3ba580aa9d53c3dcc8d48bf571a45f7c0468e6a0f2a227a7e59e17d62

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

                                                                                          Filesize

                                                                                          36KB

                                                                                          MD5

                                                                                          ab0262f72142aab53d5402e6d0cb5d24

                                                                                          SHA1

                                                                                          eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

                                                                                          SHA256

                                                                                          20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

                                                                                          SHA512

                                                                                          bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{343c2673-5d80-4bf6-80ff-e5edfbdf82d7}\0.0.filtertrie.intermediate.txt

                                                                                          Filesize

                                                                                          28KB

                                                                                          MD5

                                                                                          ab6db363a3fc9e4af2864079fd88032d

                                                                                          SHA1

                                                                                          aa52099313fd6290cd6e57d37551d63cd96dbe45

                                                                                          SHA256

                                                                                          373bb433c2908af2e3de58ede2087642814564560d007e61748cdb48d4e9da3f

                                                                                          SHA512

                                                                                          d3d13d17df96705d0de119ad0f8380bfe6b7bc44c618e2fcd0233061a0ab15beae44d38c48a880121b35f90f56c1529e5f4cf1a19acb9e2cbba5d1c402c749c0

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{343c2673-5d80-4bf6-80ff-e5edfbdf82d7}\0.1.filtertrie.intermediate.txt

                                                                                          Filesize

                                                                                          5B

                                                                                          MD5

                                                                                          34bd1dfb9f72cf4f86e6df6da0a9e49a

                                                                                          SHA1

                                                                                          5f96d66f33c81c0b10df2128d3860e3cb7e89563

                                                                                          SHA256

                                                                                          8e1e6a3d56796a245d0c7b0849548932fee803bbdb03f6e289495830e017f14c

                                                                                          SHA512

                                                                                          e3787de7c4bc70ca62234d9a4cdc6bd665bffa66debe3851ee3e8e49e7498b9f1cbc01294bf5e9f75de13fb78d05879e82fa4b89ee45623fe5bf7ac7e48eda96

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{343c2673-5d80-4bf6-80ff-e5edfbdf82d7}\0.2.filtertrie.intermediate.txt

                                                                                          Filesize

                                                                                          5B

                                                                                          MD5

                                                                                          c204e9faaf8565ad333828beff2d786e

                                                                                          SHA1

                                                                                          7d23864f5e2a12c1a5f93b555d2d3e7c8f78eec1

                                                                                          SHA256

                                                                                          d65b6a3bf11a27a1ced1f7e98082246e40cf01289fd47fe4a5ed46c221f2f73f

                                                                                          SHA512

                                                                                          e72f4f79a4ae2e5e40a41b322bc0408a6dec282f90e01e0a8aaedf9fb9d6f04a60f45a844595727539c1643328e9c1b989b90785271cc30a6550bbda6b1909f8

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{343c2673-5d80-4bf6-80ff-e5edfbdf82d7}\Apps.ft

                                                                                          Filesize

                                                                                          38KB

                                                                                          MD5

                                                                                          84ac0c242b77b8fc326db0a5926b089e

                                                                                          SHA1

                                                                                          cc6b367ae8eb38561de01813b7d542067fb2318f

                                                                                          SHA256

                                                                                          b1557167a6df424f8b28aabd31d1b7e8a469dd50d2ae4cbbd43afd8f9c62cf92

                                                                                          SHA512

                                                                                          8f63084bd5a270b7b05e80454d26127b69bcb98ec93d9fad58d77203934f46b677a3aaf20f29e73dcd7035deb61f4c0aa3b10acbc4c0fc210632c1d74f705d2f

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{343c2673-5d80-4bf6-80ff-e5edfbdf82d7}\Apps.index

                                                                                          Filesize

                                                                                          1.0MB

                                                                                          MD5

                                                                                          f4514c93191e0efc0f61036e4ebb341a

                                                                                          SHA1

                                                                                          c80478e9a734790c18584f67a43518aa4a7dcf58

                                                                                          SHA256

                                                                                          43da4fa5f62affe399ceaac2d489b7cde610963a48e72d445bebe6f2c63a3600

                                                                                          SHA512

                                                                                          8aecb3491767e040a52f351908004db2c8f2f083397744585c2832212ec8aa288d3492be941a48b04774e16b43672ab167209776cbdef6692fef684fc54666a6

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{bf48d1c0-317b-4454-837a-6a5fb363c6d3}\apps.csg

                                                                                          Filesize

                                                                                          444B

                                                                                          MD5

                                                                                          5475132f1c603298967f332dc9ffb864

                                                                                          SHA1

                                                                                          4749174f29f34c7d75979c25f31d79774a49ea46

                                                                                          SHA256

                                                                                          0b0af873ef116a51fc2a2329dc9102817ce923f32a989c7a6846b4329abd62cd

                                                                                          SHA512

                                                                                          54433a284a6b7185c5f2131928b636d6850babebc09acc5ee6a747832f9e37945a60a7192f857a2f6b4dd20433ca38f24b8e438ba1424cc5c73f0aa2d8c946ff

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{bf48d1c0-317b-4454-837a-6a5fb363c6d3}\apps.schema

                                                                                          Filesize

                                                                                          150B

                                                                                          MD5

                                                                                          1659677c45c49a78f33551da43494005

                                                                                          SHA1

                                                                                          ae588ef3c9ea7839be032ab4323e04bc260d9387

                                                                                          SHA256

                                                                                          5af0fc2a0b5ccecdc04e54b3c60f28e3ff5c7d4e1809c6d7c8469f0567c090bb

                                                                                          SHA512

                                                                                          740a1b6fd80508f29f0f080a8daddec802aabed467d8c5394468b0cf79d7628c1cb5b93cf69ed785999e8d4e2b0f86776b428d4fa0d1afcdf3cbf305615e5030

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{bf48d1c0-317b-4454-837a-6a5fb363c6d3}\appsconversions.txt

                                                                                          Filesize

                                                                                          1.4MB

                                                                                          MD5

                                                                                          2bef0e21ceb249ffb5f123c1e5bd0292

                                                                                          SHA1

                                                                                          86877a464a0739114e45242b9d427e368ebcc02c

                                                                                          SHA256

                                                                                          8b9fae5ea9dd21c2313022e151788b276d995c8b9115ee46832b804a914e6307

                                                                                          SHA512

                                                                                          f5b49f08b44a23f81198b6716195b868e76b2a23a388449356b73f8261107733f05baa027f8cdb8e469086a9869f4a64983c76da0dc978beb4ec1cb257532c6b

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{bf48d1c0-317b-4454-837a-6a5fb363c6d3}\appsglobals.txt

                                                                                          Filesize

                                                                                          343KB

                                                                                          MD5

                                                                                          931b27b3ec2c5e9f29439fba87ec0dc9

                                                                                          SHA1

                                                                                          dd5e78f004c55bbebcd1d66786efc5ca4575c9b4

                                                                                          SHA256

                                                                                          541dfa71a3728424420f082023346365cca013af03629fd243b11d8762e3403e

                                                                                          SHA512

                                                                                          4ba517f09d9ad15efd3db5a79747e42db53885d3af7ccc425d52c711a72e15d24648f8a38bc7e001b3b4cc2180996c6cac3949771aa1c278ca3eb7542eae23fd

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Input_{bf48d1c0-317b-4454-837a-6a5fb363c6d3}\appssynonyms.txt

                                                                                          Filesize

                                                                                          237KB

                                                                                          MD5

                                                                                          06a69ad411292eca66697dc17898e653

                                                                                          SHA1

                                                                                          fbdcfa0e1761ddcc43a0fb280bbcd2743ba8820d

                                                                                          SHA256

                                                                                          2aa90f795a65f0e636154def7d84094af2e9a5f71b1b73f168a6ea23e74476d1

                                                                                          SHA512

                                                                                          ceb4b102309dffb65804e3a0d54b8627fd88920f555b334c3eac56b13eeb5075222d794c3cdbc3cda8bf1658325fdecf6495334e2c89b5133c9a967ec0d15693

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133652743747679694.txt

                                                                                          Filesize

                                                                                          73KB

                                                                                          MD5

                                                                                          4c036314f080c753345c8481caf9ae5f

                                                                                          SHA1

                                                                                          c90add2903b9de1bfac12a139e2551af8ec71745

                                                                                          SHA256

                                                                                          ca7a49706055df15b0d7f15795ca9846c18f76f20ce135c039f99096bf164b71

                                                                                          SHA512

                                                                                          2c42b710436c2153a935fdbee7399177deca03c9c877cff99ef2dfa237fc7da5cc0dfbd93129122b268f8eda79f34e41ea5f9c901e5dee35861a2c9dce09bc38

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ShellFeeds\IDX_CONTENT_TASKBARHEADLINES.json

                                                                                          Filesize

                                                                                          239KB

                                                                                          MD5

                                                                                          3d8704a60288d632f5816c467c6a4bb5

                                                                                          SHA1

                                                                                          d8283f4d5291de51127fe2024342833911567119

                                                                                          SHA256

                                                                                          44e7c24776d38d65421ef26f396aa00ce9f5ff3c7ce13f244afc7bbc4c1ec9df

                                                                                          SHA512

                                                                                          b3fd5521eed5f156a51ff2faf783d83375f1dc14bc667598d9d650bc2a15c9e8b0fb8405f3ac29bba1ba2d117dc4b9b9353d06ad9d580409ad3f6a62fbeb8ea8

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                                                                                          Filesize

                                                                                          9KB

                                                                                          MD5

                                                                                          d35778570f9a2f7a4fe63e2c4450f595

                                                                                          SHA1

                                                                                          c770a5edae15d9ec796cf4c64b2c124918706b79

                                                                                          SHA256

                                                                                          80cc048e011b411a8aa5647ca6e5c06c4705383bc16a887b2b77ae1ac7a144b0

                                                                                          SHA512

                                                                                          2299b38f4a390aa74ead75fe912e41d7c8a33dc268b3579714d9172b1d94df69a2dbe7d5950612c24e54f04a4577df8ca87080122a575b25b43e2f0802b50431

                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\TempState\CortanaUnifiedTileModelCache.dat

                                                                                          Filesize

                                                                                          10KB

                                                                                          MD5

                                                                                          6b32121a9e428d34b01005ceb7f3ba81

                                                                                          SHA1

                                                                                          64f92cec2825c67d030f8370a707837c40d8625d

                                                                                          SHA256

                                                                                          7009305f31f3fb6c9880a5735988f3ba740ee45dd31ca6b750727bbadd9064a1

                                                                                          SHA512

                                                                                          5443e421a6212b13f9be65a3268f8a2ec313e5133167bab121359ea5f0934afdd470fde619c3a3589d374bc1a25e2936923670d7f85bc552e10b63e8a04cef4e

                                                                                        • C:\Users\Admin\AppData\Local\Temp\Runtime.MSIL.1.0.0.0\NativePRo.dll

                                                                                          Filesize

                                                                                          40KB

                                                                                          MD5

                                                                                          94173de2e35aa8d621fc1c4f54b2a082

                                                                                          SHA1

                                                                                          fbb2266ee47f88462560f0370edb329554cd5869

                                                                                          SHA256

                                                                                          7e2c70b7732fb1a9a61d7ce3d7290bc7b31ea28cbfb1dbc79d377835615b941f

                                                                                          SHA512

                                                                                          cadbf4db0417283a02febbabd337bf17b254a6eb6e771f8a553a140dd2b04efd0672b1f3175c044a3edd0a911ce59d6695f765555262560925f3159bb8f3b798

                                                                                        • memory/3680-55-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-52-0x000001AE28A10000-0x000001AE28A11000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-59-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-63-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-64-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-66-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-65-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-67-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-68-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-69-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-70-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-72-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-71-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-73-0x000001AE28A40000-0x000001AE28A41000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-75-0x000001AE28B50000-0x000001AE28B51000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-74-0x000001AE28A40000-0x000001AE28A41000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-76-0x000001AE28AA0000-0x000001AE28AA1000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-77-0x000001AE28AA0000-0x000001AE28AA1000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-13-0x000001AE205A0000-0x000001AE205B0000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/3680-28-0x000001AE20690000-0x000001AE206A0000-memory.dmp

                                                                                          Filesize

                                                                                          64KB

                                                                                        • memory/3680-61-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-62-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-58-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-57-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-56-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-47-0x000001AE288C0000-0x000001AE288C1000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-54-0x000001AE28A10000-0x000001AE28A11000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-53-0x000001AE28A10000-0x000001AE28A11000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-60-0x000001AE28A30000-0x000001AE28A31000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-51-0x000001AE28A00000-0x000001AE28A01000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/3680-49-0x000001AE28A00000-0x000001AE28A01000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/4648-83-0x0000017B55000000-0x0000017B55100000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4648-84-0x0000017B55000000-0x0000017B55100000-memory.dmp

                                                                                          Filesize

                                                                                          1024KB

                                                                                        • memory/4720-0-0x000000007479E000-0x000000007479F000-memory.dmp

                                                                                          Filesize

                                                                                          4KB

                                                                                        • memory/4720-9-0x00000000059B0000-0x0000000005A16000-memory.dmp

                                                                                          Filesize

                                                                                          408KB

                                                                                        • memory/4720-3-0x0000000074790000-0x0000000074F40000-memory.dmp

                                                                                          Filesize

                                                                                          7.7MB

                                                                                        • memory/4720-2-0x00000000032A0000-0x00000000032AC000-memory.dmp

                                                                                          Filesize

                                                                                          48KB

                                                                                        • memory/4720-1-0x0000000000E70000-0x0000000000F02000-memory.dmp

                                                                                          Filesize

                                                                                          584KB

                                                                                        • memory/4720-443-0x0000000074790000-0x0000000074F40000-memory.dmp

                                                                                          Filesize

                                                                                          7.7MB