Overview
overview
10Static
static
1038f792a175...c0.exe
windows7-x64
1038f792a175...c0.exe
windows10-1703-x64
1038f792a175...c0.exe
windows10-2004-x64
1038f792a175...c0.exe
windows11-21h2-x64
103dfaf477d5...a7.exe
windows7-x64
93dfaf477d5...a7.exe
windows10-1703-x64
93dfaf477d5...a7.exe
windows10-2004-x64
93dfaf477d5...a7.exe
windows11-21h2-x64
9801505b222...4e.exe
windows7-x64
9801505b222...4e.exe
windows10-1703-x64
9801505b222...4e.exe
windows10-2004-x64
9801505b222...4e.exe
windows11-21h2-x64
9be7c6e308b...8e.exe
windows7-x64
10be7c6e308b...8e.exe
windows10-1703-x64
10be7c6e308b...8e.exe
windows10-2004-x64
10be7c6e308b...8e.exe
windows11-21h2-x64
10ecfb5c95d0...9d.exe
windows7-x64
10ecfb5c95d0...9d.exe
windows10-1703-x64
10ecfb5c95d0...9d.exe
windows10-2004-x64
10ecfb5c95d0...9d.exe
windows11-21h2-x64
10Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
18-10-2024 17:30
Behavioral task
behavioral1
Sample
38f792a175c366b53407143da8c13ea2f1d3600b00ef8e8f6ec7e0ef79dcb6c0.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
38f792a175c366b53407143da8c13ea2f1d3600b00ef8e8f6ec7e0ef79dcb6c0.exe
Resource
win10-20240611-en
Behavioral task
behavioral3
Sample
38f792a175c366b53407143da8c13ea2f1d3600b00ef8e8f6ec7e0ef79dcb6c0.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
38f792a175c366b53407143da8c13ea2f1d3600b00ef8e8f6ec7e0ef79dcb6c0.exe
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
3dfaf477d5058014e308f079fdfe1e9c765f3280c0ef105ddd0efeb5c9b0daa7.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
3dfaf477d5058014e308f079fdfe1e9c765f3280c0ef105ddd0efeb5c9b0daa7.exe
Resource
win10-20240404-en
Behavioral task
behavioral7
Sample
3dfaf477d5058014e308f079fdfe1e9c765f3280c0ef105ddd0efeb5c9b0daa7.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
3dfaf477d5058014e308f079fdfe1e9c765f3280c0ef105ddd0efeb5c9b0daa7.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
Resource
win10-20240404-en
Behavioral task
behavioral11
Sample
801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral12
Sample
801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
be7c6e308b1d8a20cc46232fc95f6c094717f05cadb0c7a03108d969b561f68e.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
be7c6e308b1d8a20cc46232fc95f6c094717f05cadb0c7a03108d969b561f68e.exe
Resource
win10-20240611-en
Behavioral task
behavioral15
Sample
be7c6e308b1d8a20cc46232fc95f6c094717f05cadb0c7a03108d969b561f68e.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral16
Sample
be7c6e308b1d8a20cc46232fc95f6c094717f05cadb0c7a03108d969b561f68e.exe
Resource
win11-20241007-en
Behavioral task
behavioral17
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win10-20240404-en
Behavioral task
behavioral19
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral20
Sample
ecfb5c95d0f3d112650ef4047936e8fa5244c21c921f6c7a6963e92abab4949d.exe
Resource
win11-20241007-en
General
-
Target
801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe
-
Size
18KB
-
MD5
f31d6529ff4ad98053f9a8a9832f95e3
-
SHA1
abdd5ce48e2d11a4c82fc90d9e9beeb14b437cee
-
SHA256
801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e
-
SHA512
25e452098a46f3ddf3cc6e268a94fa998d7c0de907741f436d10caf7be8c038163dc3a0f51516f3b4072085951eb5e44053b2e9f84a532c152bbf813a518a755
-
SSDEEP
384:imwIxiBDXgRUV7JCGgmxt8mvA4ILbfNGHEDPUw3rXTXLazK:i6UVl7twPbfg2Uw3HXAK
Malware Config
Signatures
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (495) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu Places\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Pictures\Camera Roll\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Desktop\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Libraries\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\OneDrive\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Links\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created F:\$RECYCLE.BIN\S-1-5-21-1687926120-3022217735-1146543763-1000\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Contacts\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\AccountPictures\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Music\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Favorites\Links\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Saved Games\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Pictures\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Documents\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Downloads\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Pictures\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Favorites\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu Places\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Searches\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Videos\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\All Users\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Public\Music\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Desktop\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe File created C:\Users\Admin\Downloads\desktop.ini 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1816 vssadmin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeBackupPrivilege 4580 vssvc.exe Token: SeRestorePrivilege 4580 vssvc.exe Token: SeAuditPrivilege 4580 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2828 wrote to memory of 4896 2828 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe 74 PID 2828 wrote to memory of 4896 2828 801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe 74 PID 4896 wrote to memory of 1816 4896 cmd.exe 76 PID 4896 wrote to memory of 1816 4896 cmd.exe 76 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe"C:\Users\Admin\AppData\Local\Temp\801505b222599fb1b73dcf02ae754566bbe0ba03cb253592bc585b639f65f04e.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SYSTEM32\cmd.exe"cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:1816
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4580
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
272B
MD5201bdedf73f2016eb7ea3b04fb4adf7d
SHA19eb0b21ceb33fa68d13f900d69154bc92a17caec
SHA2561d8f591d1102fb73716f364bec05ad14b55f24b815e0be9b1d2a55ac5afd2384
SHA512f07de931514da814ee1b5bccaf5fae3b6526538921609e87041d1ee0ce0d2f8646d140d27cedbe2b7a1ab91e936dadfbd6a815ec254910ffa33eb3a4c200cf67
-
Filesize
256B
MD56159cf6ccc6d095beba98064ab856e4e
SHA1b335446e9d4a2e81b7d3f610f5f87f3d8474512e
SHA2566411b8f6bd28ed6a600e583dd9d2a03f340fb7cea263b61a0f22e50ab9191bca
SHA512ded36507a4bd0288f6ef05c0ec1f08ea3918940a6a02bd5ac151ed39e5a37f688a6d115483602c6eed428dd62b6b19f9c3201f3a33c730bf9acf573ab6466b79
-
Filesize
464B
MD55c261106c9e88ae9e174342547707c5d
SHA191b04b0d080439baf3cfcd9c137f84bbde3f6ffc
SHA256435dad09ef4a5b5a316e8f4bdda6666550623c63822d8ed34966c58ee9f437af
SHA512dde32b688137b02563d293a9af1772e2b4a8c3671eb6e42522aef93925fc91e5aafee1376543f6b1bce271a79886824ce9bde04280ba5e29d066f098864d9538
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Storage\ext\nmmhkkegccagdldgiimedpiccmgmieda\def\Local Storage\leveldb\000003.log
Filesize16B
MD5a013eea1e36146e85f980060ab873ca6
SHA1b1ab5ac7a052dd3d3288c67307c989c78c9b34f2
SHA256c6d018a4f8145c322fb1672530e567a56e711f7eab53076c4160bc1a99c9f816
SHA512f966719407bc125bdddc8113cf6b16c566794b03a8ce432f4c3a4c85a9c93204dd282cf427ec6649e2659287516f3bdceb5df4414fa6582a41ab290175053748
-
Filesize
333KB
MD588b72dc1bcc9a2b9a1e89e82ed3359e2
SHA14d0003b141ebf68bcfb5781ef3625113da6653c7
SHA256b3ea9b4ee74530c48a8ae95631ca29ac66411681837e3fd9d4f17ac9b0329ef1
SHA512de924c6f0e9701dc91c72b347cc6590761ecf29339da0703152fcbe0a59ba1f0ca43d2ecdd7bf17b5217a2638d8708b12e7968f2d6f3e29dba52667da2d00388
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{7e66d639-dbb5-4058-a88d-d587ca4b635a}\0.1.filtertrie.intermediate.txt
Filesize16B
MD57a11aef00a85c1129307941b164590ae
SHA137de87792cde5a07d3766634de91ca70a070b68b
SHA256fa83dfa46d49fdcd7bd939dec9e4b77849ffa179c15dcb64c8aff492e7c236f5
SHA5128393c8dbb079013bed107bb866c2ef095ae11ea1ceb8818efccf5c05a9e62c45bfefb52a33c5a1192b07465a747556ff657b517343999001e5531d9a70ae6947
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{7e66d639-dbb5-4058-a88d-d587ca4b635a}\0.2.filtertrie.intermediate.txt
Filesize16B
MD5f2da31a460f21aa9ef32b1058bc175bc
SHA1739b7bed75d686bdddf48df9532a4af3807a7222
SHA25661fcf18967bbaf729a2f464de95e1e34d82f2cd9b789f43b80512076319cb783
SHA512ed738350a6535fcfe37d831db5d77e49efdba45ed7d35b6809081047a240b922727224a27815577fb2c5ac8f495c8f25104d68ebac63ea17541883879662e34b
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{aabc41c2-49bd-4a0e-a74a-2a8f0c6feb4e}\0.0.filtertrie.intermediate.txt
Filesize15KB
MD5a4b5187cb82771d376adfc6dfe1a4791
SHA1100a667ab88469fcc17545504787899b1f825070
SHA2561388532fb81fa3fb263862eb7fc897685fcdadc2b0f9dc0ffbad84639964a7a8
SHA5127eaaa341f80d60711ffb7b30ca24679549c12e219e9dfc15e4a25124bbef30722d9e721db721812ac425f277b43cba487254c61492c83a45cc967c17f80e004d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133567066645589540.txt
Filesize85KB
MD5d4f2144a8232e5ce6a332dee7cb4beec
SHA1171c54bfbe0bf2c1a15b71290a78b6465d8fc1f4
SHA256851ec3471672ec41594d2e8241b321e2961f59ab20e255010c3f034a932dac09
SHA512342e3f87674baed88405bea42790b551cc8718a65497fd7fdee60a6ad82e39047fe52d4ac90dc292a2353dac37254d70b44957fadf3a6297b9067fa72687a888
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Cortana_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133567067454100560.txt
Filesize72KB
MD593c721fc279d33808cb99fdad6117b28
SHA19bca0c32b11f662e8a51c6184d0dca2a698d34e3
SHA25649f1cc9630af7341bc4cb7a4ee85593646cd3960b20b0d9214ad011fbb1d46b3
SHA512eac285601f9d4db60cc3311cb1809292f2230dcbe089ed83ff745edf4baee3b6ab3b7e19dbf7e807077e4435a098a1987ef56dd53810549f136ed9fc80470b3b
-
Filesize
2.0MB
MD524f9df2069e7b074158a427d587f3d4f
SHA16d976d9e6a8aa821979703e46bc42bad78638718
SHA256a5e5cf082433e8b3f211d191311a34febdacf8876f26303ebce815fb6dcc92e2
SHA5124d566a32431657837bb3bdebc5adf05a8d2d17faf2b1ffc7a8451cb1d97e974d10a1ed66e65ada991cfd5ea90e90103db472df7760ceb7b75b0965d38e92e012
-
C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\6lk2b5bo.default-release\storage\permanent\chrome\idb\2823318777ntouromlalnodry--naod.sqlite.Satyr
Filesize48KB
MD5dc8f1eb068c5654264162763f105d37a
SHA14c54f7a0f9d95f7c8704e4f1395e490b198e0c48
SHA2569ea6593eccb00389e314a27a06ed6fb74ef5176955fa1a6b3946c9be3ab1e674
SHA5126f1b37ff19b3780a8ddaf59d781d3b8c42305fee440c689d9e785e68ef26f815b93d142b31e02654bb015b4d49d76d80fe941baf3175c2d7c6eb9d2783c3e7ed
-
Filesize
80KB
MD571c3261c5f5ded0e87a89842c1087861
SHA1dacc64aa854fa32becaf8bcd5e680e13aedcaf0a
SHA256bf251c02453663012a0f90447f30bb8011eecfa5fa0e4ecbd226ddf64a2cf94c
SHA512ad3ae560a8e90de20f1d1cf5e5a075dab68e4cc6f226bc515f79af854faaa6c11832c101fe96ccb782138db6e55de3416d1efb1d6d4b91f08ea1e08383b78f32