Analysis
-
max time kernel
228s -
max time network
204s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
05-09-2024 12:23
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://reformedtundra.itch.io/windows-12-exe
Resource
win11-20240802-en
General
-
Target
https://reformedtundra.itch.io/windows-12-exe
Malware Config
Signatures
-
Executes dropped EXE 10 IoCs
pid Process 5096 windows 12.exe 5552 windows 12.exe 4688 windows 12.exe 1612 windows 12.exe 5504 windows 12.exe 2548 windows 12.exe 6120 windows 12.exe 4860 windows 12.exe 4744 windows 12.exe 4100 windows 12.exe -
Loads dropped DLL 18 IoCs
pid Process 5096 windows 12.exe 5552 windows 12.exe 4688 windows 12.exe 5552 windows 12.exe 5552 windows 12.exe 5552 windows 12.exe 1612 windows 12.exe 5552 windows 12.exe 5504 windows 12.exe 2548 windows 12.exe 6120 windows 12.exe 4860 windows 12.exe 4744 windows 12.exe 6120 windows 12.exe 6120 windows 12.exe 6120 windows 12.exe 6120 windows 12.exe 4100 windows 12.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows 12.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName Taskmgr.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings msedge.exe Key created \REGISTRY\USER\S-1-5-21-131918955-2378418313-883382443-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Windows 12 exe.zip:Zone.Identifier msedge.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2076 msedge.exe 2076 msedge.exe 3916 msedge.exe 3916 msedge.exe 2928 msedge.exe 2928 msedge.exe 5636 identity_helper.exe 5636 identity_helper.exe 952 msedge.exe 952 msedge.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1824 Taskmgr.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 14 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 3180 7zG.exe Token: 35 3180 7zG.exe Token: SeSecurityPrivilege 3180 7zG.exe Token: SeSecurityPrivilege 3180 7zG.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: 33 1680 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 1680 AUDIODG.EXE Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe Token: SeShutdownPrivilege 5096 windows 12.exe Token: SeCreatePagefilePrivilege 5096 windows 12.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3180 7zG.exe 5096 windows 12.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 3916 msedge.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe 1824 Taskmgr.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2164 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3916 wrote to memory of 5508 3916 msedge.exe 79 PID 3916 wrote to memory of 5508 3916 msedge.exe 79 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 5980 3916 msedge.exe 81 PID 3916 wrote to memory of 2076 3916 msedge.exe 82 PID 3916 wrote to memory of 2076 3916 msedge.exe 82 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83 PID 3916 wrote to memory of 5244 3916 msedge.exe 83
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://reformedtundra.itch.io/windows-12-exe1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xdc,0x10c,0x7fffdc493cb8,0x7fffdc493cc8,0x7fffdc493cd82⤵PID:5508
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1936 /prefetch:22⤵PID:5980
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2164 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2660 /prefetch:82⤵PID:5244
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:5748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:3128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4628 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5300 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4852 /prefetch:12⤵PID:1800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5152 /prefetch:12⤵PID:3124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3896 /prefetch:12⤵PID:2584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3196 /prefetch:12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4872 /prefetch:12⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4588 /prefetch:82⤵
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
PID:952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6132 /prefetch:12⤵PID:3148
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6264 /prefetch:12⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6324 /prefetch:12⤵PID:6132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=20 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6348 /prefetch:12⤵PID:4192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6612 /prefetch:12⤵PID:3964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1788,16360489737658306817,13412629992381179259,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=24 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6976 /prefetch:12⤵PID:2788
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:5052
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1564
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4948
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\" -an -ai#7zMap8081:86:7zEvent90961⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3180
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:5096 -
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1600 --field-trial-handle=1656,i,169789232865281939,5262090712187177085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5552
-
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --mojo-platform-channel-handle=2092 --field-trial-handle=1656,i,169789232865281939,5262090712187177085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4688
-
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --app-path="C:\Users\Admin\Desktop\windows 12\resources\app" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2396 --field-trial-handle=1656,i,169789232865281939,5262090712187177085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --mojo-platform-channel-handle=2788 --field-trial-handle=1656,i,169789232865281939,5262090712187177085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:5504
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x0000000000000494 0x00000000000004DC1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1680
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2164
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1824
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=gpu-process --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1564 --field-trial-handle=1764,i,6252771864353259682,15532785537837212279,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6120
-
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --mojo-platform-channel-handle=2068 --field-trial-handle=1764,i,6252771864353259682,15532785537837212279,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4860
-
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=renderer --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --app-path="C:\Users\Admin\Desktop\windows 12\resources\app" --enable-sandbox --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=2416 --field-trial-handle=1764,i,6252771864353259682,15532785537837212279,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4744
-
-
C:\Users\Admin\Desktop\windows 12\windows 12.exe"C:\Users\Admin\Desktop\windows 12\windows 12.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --user-data-dir="C:\Users\Admin\AppData\Roaming\windows 12" --mojo-platform-channel-handle=2912 --field-trial-handle=1764,i,6252771864353259682,15532785537837212279,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:82⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53e681bda746d695b173a54033103efa8
SHA1ae07be487e65914bb068174b99660fb8deb11a1d
SHA256fee5f7377e5ca213c1d8d7827b788723d0dd2538e7ce3f35581fc613fde834c2
SHA5120f4381c769d4ae18ff3ac93fd97e8d879043b8ec825611db27f08bd44c08babc1710672c3f93435a61e40db1ccbf5b74c6363aaaf5f4a7fc95a6a7786d1aced8
-
Filesize
152B
MD59f081a02d8bbd5d800828ed8c769f5d9
SHA1978d807096b7e7a4962a001b7bba6b2e77ce419a
SHA256a7645e1b16115e9afec86efa139d35d5fecc6c5c7c59174c9901b4213b1fae0e
SHA5127f3045f276f5bd8d3c65a23592419c3b98f1311c214c8e54a4dfe09122a08afb08ab7967b49bd413bc748ce6363658640bc87958d5e0a78974680a8f9beadf44
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize600B
MD5e086258e3c45a14bdceafe42370a59ed
SHA116505d9b51cb576db6212b61400d8fcff73ebb07
SHA256fb7cf49254acc484046259ec4ef25d40d914b7ef340e2699c95212895127b4bc
SHA512f213595a2f737190f6fb019a7dbde328f206d72f46212ebf59f736a389b565e7ee61d3472ab46c4dd302ba9d78f274f9aec8cb57b278904aca7d5998ed2aeff2
-
Filesize
3KB
MD5f12789bf0f8549fd7f59c35e2cc0123f
SHA1be913542a17af79860c0eff2226ed6248717be48
SHA256988698a8c614eb5a9f70f95d700f83e74caec215b345a08903c6da25d7e3409a
SHA51268b0c33ef488fabee9dad9f7d1a5d6a8f60af3cd79d1a2def87efe01c88196e5237026afd80034d411ff36073777e45836d772e8455055f011e9ae8c89957211
-
Filesize
8KB
MD58a4de8fb8aa000e5689db1fa315b9435
SHA1b953b446156d8a18975cfa013ea4c4e2da4269a1
SHA256127c428c1660577a2d164d468d01aaf85bc72a49eed93ea02f40b34ac9b2b47d
SHA512cecdc1ff6a027f0712ce18bd4328038b3ebbc5702214a8e391bc88d9821fc8c3e7d83895a69b58fff2855f1b3d041c2b11e863c1a9a66e6d5516d961b8593910
-
Filesize
6KB
MD5315ba36f38b0e6b4e40394d4e2bc42d0
SHA17384b0205567cb5e2d52402818a5dca5e8f809b3
SHA25606d37836469ab8566747b97128fe4f3dde0bda2419acea1000276ef091e1ad36
SHA512f211859f979a7c4703e29c38d127a04b41eb0f203afe69d4fd29016d148350ae6ef215d791850dbb78c29a22ce7e8d44adeaa4575bda983421c83df7deeb1b6a
-
Filesize
1KB
MD5133a141c257f56ba51817ca5c0cea39b
SHA136db8c027d40f5b0898044076551083e9b826f7a
SHA256c170635d56c03318631ffe61a019cbb4d4092ebe2a7b5cd1095c006b96e999d7
SHA5128be638eeb8951eb70d4a8383a952f20110f95172b39500eb65baa3e918ad5e34a306ab70c7788bda1fea67ed4d3fd771256dd6886ca94e8991dc4dbd5d1d7310
-
Filesize
1KB
MD5363edaae4e9fb78fd90ee29e9febc4cf
SHA1a11db4a745cfb3f805a8bea483fda7f729044525
SHA256856152dbf8fd2a5b43dee7e36c704f4049fb2f9e389abd5af0a6c2eb6fede165
SHA512f22d87390b90476c0fec708026b0ec31795945e56287c856a932e49a2245875f9ad05cef851ce0dac4a4267d5f4c1c3c1bb019f01c3495da45f9551d946037e1
-
Filesize
1KB
MD528e1caeaffd43522bcc8e18d5fb794b9
SHA1429559a9296d4e18ddc93db9d1b691fcd87ddb29
SHA256970b4667275f28f60718dccf4771b44a61f22db6d63c7433ec4b70b596cb04d0
SHA5125d7b29dbbc8cdaf59dd5dde7e3336dc1f0e769b5aaddf3650db7c6ca621da4d6d7dfe010f74052cf98f1fc81cca9db2778bc08db2d1969f401ba309830f55e71
-
Filesize
201B
MD5cdb45a36694232e4aa2245aed4ce743d
SHA1e040e7d4864a09dcfcfd99b0630ec02d4f013db5
SHA256c3ffffa148b09eaa17f5e5247ecdaff1af49223bb9d014e3f9ee8df3f59bbc14
SHA5129efd61e9d0385aff62c60f2042e20b85a5e5c72bc4701f34a0e2c15c0e59ae60d04d28c150ea7e4e0dd48fea5c6e7437ee5e4526872449e94a515ab7d31b2acb
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\e089798a-70b3-44a4-8be6-ef7f8f57b744.tmp
Filesize5KB
MD56fe4e2b70270e2ceccd31439a76606f7
SHA1c52f8b630164098da37a148c6b6b8e3f80b3faab
SHA25678ded833202c2e0b965eee240ce09b2c55d6a59493c4b95af0f725db4e3b70a0
SHA5123b5abb01b138527fed315c2ee606352804452531b390f3af1471f0ce53e9c19129f8923877ba09f2858fa04f142ed8552dc12ee864c489f15f1c1d4dc28914e8
-
Filesize
10KB
MD59d91ade73d22b1bf0eb5530959eef6cf
SHA1836f92a76779f1337073a77611846c639033bb36
SHA256a58f7fb56c73883af053696de209664733f09eaa69d8d39ac0695d14d1c5d5b9
SHA51221f51b02672a5b5eca9a6d0cc9e77b527f1de608f2594717d43d344349f31939965c12b9a235def7e73aeb1012f23c6fc72b2225055dbd1dbfefb062f881bebf
-
Filesize
10KB
MD50ebe358c464dee96aef47a94747bcd71
SHA1ee6e80b4c706edae096814873d73429fbd48fdce
SHA25692796f573fe9a50160e46171351e332369f4e3cc743087b55cfd14d965f3efd8
SHA512708823f04bb5d42ece6ae99f54e9d74180a0f15a19b1535b8f71e8dc3434f59627ba78d33bf05db0eb74dcb4ea05362b6359662df1b2ed22776e27832591ca5a
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD527152171537c47796aa7194ac41383bc
SHA1430c380ea885fce765a771cc40cbfe6358b4d04c
SHA25628276ad4adb3f540918a28a722f10a63406037b96a14e05565e31ec90c605c22
SHA512044ded8d45d2249f69ae617768398a33cf060618f1cb583aa9d9a34171de10bf3e23f6e49b3c0b8ca872f5ecbe98e841168fb3e94fdef2efbb299a3cbc01f616
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5f8f606a032719f0447a78d9b50fb672f
SHA145d741cb2185064eb8c06a91d79c928fcb657abe
SHA256d5e5bb3e87ef84f4e352d277fbe38a57f65ed50c0f8309dbff43d57af778b3ca
SHA51296169b9bcfce9f671452010340d707e2dd3a60a1ba2847cccbf1fff2dd11d0f74dfdc74cb9c20015bdbe95479f52501f9ee30ac634f547006104fba349472b65
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
Filesize
8KB
MD5cf89d16bb9107c631daabf0c0ee58efb
SHA13ae5d3a7cf1f94a56e42f9a58d90a0b9616ae74b
SHA256d6a5fe39cd672781b256e0e3102f7022635f1d4bb7cfcc90a80fffe4d0f3877e
SHA5128cb5b059c8105eb91e74a7d5952437aaa1ada89763c5843e7b0f1b93d9ebe15ed40f287c652229291fac02d712cf7ff5ececef276ba0d7ddc35558a3ec3f77b0
-
Filesize
264KB
MD5d0d388f3865d0523e451d6ba0be34cc4
SHA18571c6a52aacc2747c048e3419e5657b74612995
SHA256902f30c1fb0597d0734bc34b979ec5d131f8f39a4b71b338083821216ec8d61b
SHA512376011d00de659eb6082a74e862cfac97a9bb508e0b740761505142e2d24ec1c30aa61efbc1c0dd08ff0f34734444de7f77dd90a6ca42b48a4c7fad5f0bddd17
-
Filesize
8KB
MD50962291d6d367570bee5454721c17e11
SHA159d10a893ef321a706a9255176761366115bedcb
SHA256ec1702806f4cc7c42a82fc2b38e89835fde7c64bb32060e0823c9077ca92efb7
SHA512f555e961b69e09628eaf9c61f465871e6984cd4d31014f954bb747351dad9cea6d17c1db4bca2c1eb7f187cb5f3c0518748c339c8b43bbd1dbd94aeaa16f58ed
-
Filesize
8KB
MD541876349cb12d6db992f1309f22df3f0
SHA15cf26b3420fc0302cd0a71e8d029739b8765be27
SHA256e09f42c398d688dce168570291f1f92d079987deda3099a34adb9e8c0522b30c
SHA512e9a4fc1f7cb6ae2901f8e02354a92c4aaa7a53c640dcf692db42a27a5acc2a3bfb25a0de0eb08ab53983132016e7d43132ea4292e439bb636aafd53fb6ef907e
-
Filesize
300B
MD521de6de28bd917da5e53e404871afc7a
SHA1d7be9c3f4c434b63f3ed4f688f746c2e5663c992
SHA256fd662b8a0d3f586ff78ddb1832a4f81a6138272d7df3cc9c7a47afe70df68828
SHA51207d2167e0201839b1771519cbf498dafe4a65736812b0be7d5ecfcd1d6019b9d4bb127af0d3fd2f7d6ad9de5fea71818eb8150526c6db48f8351d7326df7ff22
-
Filesize
390B
MD562492adc093afbfaaa5c0a86bbd3d8c3
SHA1152ae7fb62de40e992e3b9ef6496fb9e411b765c
SHA2560053a0248b78e4a3dcdc065328efb5da728b82ffab8b1dc2e1a521af618b4d78
SHA5126bd9e42e93a363e4be7359b6ed771249bacdd07c1dc756a1cc2331a5d47fab681a1979cb74522db656af97d4ca294bc5d2106e903aa0dfa8f8d66161d8daed70
-
Filesize
59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
203B
MD5ff0a892b3cd8f0247b0c50b244c8a115
SHA1adc7d77472812ed6a10b495d466eb15567cd04e4
SHA25695fd53c21d538e470edddc4bf19798fc64db931d74a6d3426a6cba2531c75718
SHA5128544dbd44c26ab6cf3c981d02f0bd4b23b7b64b548a9777ac9f2c8062d3bfc637281544335ada940e46629539db3550611668d1ff72817beb181903cb53366cd
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
7.8MB
MD569cdb61b83395d25017aaa787da8eb86
SHA1393ab7a5acf293eb0b6048e9b233dcc1661b7d09
SHA256ebae84f8c392c9d9be9d000ba02ea66a011dcc25733fb97a6f14e365d833638d
SHA512d91872942f24d8d5baa41b55537b9c3e469f4f50604a2169739a8451cf63798fae6adc714f30a3bf1d63cb80c73f76836eebbb64b8b8035a78eaeb5dbed50d70
-
Filesize
57B
MD558127c59cb9e1da127904c341d15372b
SHA162445484661d8036ce9788baeaba31d204e9a5fc
SHA256be4b8924ab38e8acf350e6e3b9f1f63a1a94952d8002759acd6946c4d5d0b5de
SHA5128d1815b277a93ad590ff79b6f52c576cf920c38c4353c24193f707d66884c942f39ff3989530055d2fade540ade243b41b6eb03cd0cc361c3b5d514cca28b50a
-
Filesize
126KB
MD5d31f3439e2a3f7bee4ddd26f46a2b83f
SHA1c5a26f86eb119ae364c5bf707bebed7e871fc214
SHA2569f79f46ca911543ead096a5ee28a34bf1fbe56ec9ba956032a6a2892b254857e
SHA512aa27c97bf5581eb3f5e88f112df8bfb6a5283ce44eb13fbc41855008f84fb5b111dfe0616c310c3642b7f8ac99623d7c217aecc353f54f4d8f7042840099abc5
-
Filesize
175KB
MD55604b67e3f03ab2741f910a250c91137
SHA1a4bb15ac7914c22575f1051a29c448f215fe027f
SHA2561408387e87cb5308530def6ce57bdc4e0abbbaa9e70f687fd6c3a02a56a0536c
SHA5125e6f875068792e862b1fc8bb7b340ac0f1f4c51e53e50be81a5af8575ca3591f4e7eb9239890178b17c5a8ff4ebb23719190d7db0bd8a9aa6dcb4308ffa9a34d
-
Filesize
3.9MB
MD5ab3be0c427c6e405fad496db1545bd61
SHA176012f31db8618624bc8b563698b2669365e49cb
SHA256827d12e4ed62520b663078bbf26f95dfd106526e66048cf75b5c9612b2fb7ce6
SHA512d1dc2ec77c770c5da99e688d799f88b1e585f8dcf63e6876e237fe7fce6e23b528e6a5ef94ffc68283c60ae4e465ff19d3fd6f2fae5de4504b5479d68cbc4dba
-
Filesize
2.4MB
MD5c921230b4bbe802f0d797db79d0009b9
SHA1dd852ce1f82b2daadfb85efa9c53e3264e1d401e
SHA25602a6d001e6dd944738e09b720e49dcb1272cb782b870e5ae319d4600bc192225
SHA5126acdda7d638609ffa1989e50dde5a51436ae3d98e036b24ffc2c3f08bc0d39e91a5a2ea427063645f3141f06e7c272ca45fd41333d6770f8402651489a0f6da7
-
Filesize
10.0MB
MD576bef9b8bb32e1e54fe1054c97b84a10
SHA105dfea2a3afeda799ab01bb7fbce628cacd596f4
SHA25697b978a19edd4746e9a44d9a44bb4bc519e127a203c247837ec0922f573449e3
SHA5127330df8129e7a0b7b3655498b2593321595ec29445ea193c8f473c593590f5701eb7125ff6e5cde970c54765f9565fa51c2c54af6e2127f582ab45efa7a3a0f6
-
Filesize
375KB
MD551cc9f3891cfe33e095f901c8e5f121d
SHA103ac95d250969e65a3ede7a29c3e5425ccdd9fe1
SHA256961aff31cab097ebb973a32140c4f87c415734412771cf1fdfe24ddc675b54c2
SHA5123351898af8c75afa8df3f300416bc9d40f4ead90ea947876140ec54a015fafd149427a9dfb5b7c8239ae229839edd786561a5a73ffe37f29758946fd18730039
-
Filesize
6.4MB
MD5fb74e837a2ebbf59afeb09106644a9ab
SHA155225fcc692aa332f698960c3dc1140d791d1fa1
SHA256e6ab5fc601d0d230c989d2f481b37c259a0a1fffb7fb841b7099a5e966f0088a
SHA512585e464de076d6d2560288fe9430004430effb0599134bfb30fabb7bad3cdccff9458d21d17f580823a308cd6472f36d1f1ce6a04e568ba6dcca2e68fd39d63f
-
Filesize
313KB
MD53f6f4b2c2f24e3893882cdaa1ccfe1a3
SHA1b021cca30e774e0b91ee21b5beb030fea646098f
SHA256bb165eaa51456b52fcbdf7639ee727280e335a1f6b4cfb91afc45222895b564f
SHA512bd80ddaa87f41cde20527ff34817d98605f11b30a291e129478712ebebe47956dbd49a317d3eeb223adf736c34750b59b68ad9d646c661474ad69866d5a53c5c
-
Filesize
5.1MB
MD5f5ab76d2b17459b5288b6269b0925890
SHA175be4046f33919340014a88815f415beb454a641
SHA2564f29587bcd952de1dbc0b98df0aa506bd9fcf447e6a7258c5eb7e9eb780e6d6c
SHA5126ec6a08418743adb5e20218b73169be4f45f5458592219497c3718e620e37871876788937418f1341e0023c1137f9cac715e6bb941f4690febdda993b072feab
-
Filesize
517B
MD505a38c893c80e0d9a2ac8083a994e2c6
SHA11b1bb1b47f793cddeaf45ae7ed03a920d7ac31d3
SHA256c2c4ad098d3c9e97f7f64d05b5fcb43c550c1ce3dbb88d30bc6b336e37ede059
SHA512558cd2c1ef1553a281947bcdb976519f0d2fe34a42a6e40ef93afaa7fe306cfd6ab513a0ec47f3cab91646a3bcd5b443aab89c108c9f17ba5d74984634b83af6
-
Filesize
19KB
MD52a8b402edbc69084108a843ef2d6cadd
SHA175dfb8b36d542d5c599f0188b980b7f690d02808
SHA256fbfe024f4d473caebc9835129b95e5880b208268d9ff98eb49566af1c297150e
SHA5121735f5819a0b336cb47f0d0a039492095b7fcac417666595acfee3ff771915e3ab2919b3e6fdcbf9cb77f31bd0ae081a1aea2ecd7894b2599b13a5b4d4dd9edc
-
Filesize
29KB
MD53f3556e1688a58246b6a530dc4842f92
SHA15b8df68d1c5bb815079f6ceb48fb798fd060ef6f
SHA25668baa70899aec73e6a797f7691bed34c8b88fab0b5bfefcb157865cd332d3de8
SHA512ee832ba75d405795cca448a46ee48b0322806a2a7ce04664bdbd5bc0a74f880dc584b0847e05cf23d0a6793d978393bc3438d2360b368ce455a355e08dc0cb9b
-
Filesize
71KB
MD5508c20ecc94fd4e76e3ff10d3695e3a6
SHA1f714fc6c897b38fb73e7e5c7dfa7917db9fb3ec3
SHA2564416a4d43eba6ec7433344aba7871dbdb07cdc4a5b6597f1257298120576d907
SHA512fd776a9123de9e2c22c84b39ea45daae2de8219d9b29a373a54d055ce06566ae3dacba4ec76c0b0b042003d76f286e8bf9836d7787b592c3ca053448fe880563
-
Filesize
134KB
MD57473365e17a9b5f4ef41605f79b7dcc3
SHA15a8add443b08985d7bc75eca3bacd9bd4cf47a89
SHA256457e15e07ed91b38620ded712a822d6c8c026b7d3db8c91c2347fcc0a3949c5b
SHA51297a4bac58b78efbd0b79807db8a5124215000249d1f02869da0f6671e8778d5d1e100303105f69a587f7a361177f7f11a3252c8f7453acd8a42e104a3a9fb331
-
Filesize
40KB
MD5bfdc1e48fbae23633a84bfd61cbe2954
SHA1b144a2d4358281bb482e86df8691840c8245a310
SHA2561742c1aca07c9ac76f3246e5808aa6b789566e2e5c335e7ed7b06c19924ecad7
SHA5127c55656cea76d986fc38887905822dda63c36b3869207d73b31b6bbd383816b85eda5b4edcb6dc0e4bc7bf689e24c14b7f3fbfb89fd49dc41bef65b691006233
-
Filesize
517B
MD5e3f3d5ceffeae22c7fff36f3c1979a8e
SHA19d4483764bc206df90caec95a547f91db6416342
SHA256c7b03925bf2d3038f88e4bf3c3ad6d2059c4321df27de936adbe0568f0b9591b
SHA512cd11f3c8e6925beb5aca00bad95fea92404207a0c68a29d87e6fcc8336a87d093d04ef72cfee6a4737142a07f1e1106390cd771a767fd7a0e60b36580dd214a8
-
Filesize
104KB
MD5e8a5b253e1364764ba464011007c23fb
SHA1e6ac0e2970c54cf5f2dae0308a510b3d338257e2
SHA256b323ae90cb10a943cb60043330eb153d107f742a687417eea540e7f3f28267b8
SHA512e9e6ee40c6c28833605946569db7ca6e7a8c9f426721cc527b09bb715725484b88a61a7670edaeded1e5236d24561046849c2a9c430f7dea5f6b9762afb11976
-
Filesize
107KB
MD5e93c420e8f0d473026ccafd0f7e3df11
SHA19f6eb0fd83b26d6740ad9876e345a56031ab2493
SHA256bbbcbf5558fb32ad8b9d16f23c2b6c00317b0a4237c584edc00008fb88965112
SHA5122c989748714ae4afa90ae450bc02890242a7ec22bea619e155ca7a633d1bee61e2f1b796ddbeeca78eb782ca8813416c5b461f61405dfa9784774cd7f59bce58
-
Filesize
149KB
MD5c5339bb85a6500b10d97cc7265d64f6d
SHA19d177b0998d289e9d391bbd4bc0aa32355b6f7eb
SHA2560f3976a300767aaa666349b7f765506db63c75ef4ee845aa7670fcebd1da5989
SHA51249ad6f40ab3069ce6deec1dbd744e90fae4a6307e28f180955ee3112225ad939c3b2f5bfd6f39663fa6a828babf1faafd9386a59e19554ecea7543d6ac707a0e
-
Filesize
4KB
MD51188b698cd2b9694dc58b736ca129102
SHA1ada0697fe217e9524154b214fadabcce210d78ab
SHA256fda45e1aeac0c9ada09169c4d344341ccac3712cb924739838aff31141f2983f
SHA512e41306f7917bbe8a9fe8e51f52108b61175f5cace3da3c917600086e44464fa252d5839afa16eb2b68b1dec40847fd6e65318f7ff8df496b5d518aa4607484b2
-
Filesize
4KB
MD58deaf706d6e635f289fd5a06a53f2560
SHA1d1febaadd94d78a6120e9a79560426489cbd4c3b
SHA25696f557324abcbba31e03bef3c580e8dafcd808472d7073bfadd02eaef337b274
SHA51233d90873798bbba889ff92ceca9dfecfdbb7bdef84003e8681cdf4257f75b05e6ce420d55541dccd97c938634abf31b6af5e0215f08b71d4a7ffd85315ef7d9e
-
Filesize
86KB
MD503e473539b387f33efd92dd82c5aa329
SHA1af2e542425f72260118288cc1b8300ff041eec87
SHA25687017d74f8355ad67e416e7bdddda244de8964116764de86dee8628f495dfd92
SHA51285a260ba46bd25fe1ffefc57c04ebea844150bb81e2d1dab53c43ca070eb0f6f05a17876488143998f03155602cf957513985996c615bde8717716283ef943fe
-
Filesize
84B
MD5e920a847319e7e9ab17b137d8261efde
SHA17733b97299b2934e55246797dbdd991f2dd74a78
SHA256670fe13f877643ede85bebb3bcd636b6e6e69995fba5c8f60394e6c912ab8d9b
SHA512c1f8de09d077a5512608a53310350fccab769bffb0d2f751cd41eaef35fe4a7bec7b6167b193299bf2297f85c7397151ba861243dd0aba5d87a010f890e4c18c
-
Filesize
2.1MB
MD5d9daaeddc8a64897414ae416aa3852d1
SHA149e7d413020c749d7146920f53a36531ae2d1883
SHA256a7fe6f6da3ee8319dcb0b9c7478257e6eeaf8488bd41df349af182e6a0fa3f65
SHA512d568e072667ebd8cd442ce0d5ab14b131e258d4071c4cb5604bd99693ad5ade61e58c6bbe885879268d2f1397afa2d9ca4e85a064ba625ed170560a73213d433
-
Filesize
585KB
MD5b32cbc4a5ff34f441e8e0c264aa61849
SHA1435d88a3e50ff85b6030c4c6e8918161fa340201
SHA2564f72c7b625b64d38f819a970cfff5921ff4080e27de84b00b9a7cf8be15277c5
SHA5127c13eedfab9fba821d5a26e5ba81444a84b48aff13a7cd508c03f7ea113997c2edf7126e5547e16fb3e98a942f0070a5d597c25971afbde92b46125085b57b4e
-
Filesize
4.3MB
MD5ad00a712203b9dfb702d886e43d215e6
SHA11921d4d14b5ac0a669f69cd852a41eba8377a434
SHA25601742049534047b956328b9a0ca57f720e957edb684a6a0d70acc992e2b684fc
SHA512f4672dce073c940fe3b9f9687fc9a195b5d0a6e51bb92c91047775be244ce95a2c743947eb05299d77cb3c8b914821984bb98182bc9afdc35e3963148f5562e0
-
Filesize
26B
MD5fbccf14d504b7b2dbcb5a5bda75bd93b
SHA1d59fc84cdd5217c6cf74785703655f78da6b582b
SHA256eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913
SHA512aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98