Analysis
-
max time kernel
127s -
max time network
146s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
03-12-2024 23:52
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/file/d/1EMBsHzn19MOJWJyFKD0g1TvJMq-Uhjh1/view?usp=sharing
Resource
win11-20241007-en
General
-
Target
https://drive.google.com/file/d/1EMBsHzn19MOJWJyFKD0g1TvJMq-Uhjh1/view?usp=sharing
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 1 drive.google.com 5 drive.google.com -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Panther\UnattendGC\setupact.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\setuperr.log UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagerr.xml UserOOBEBroker.exe File opened for modification C:\Windows\Panther\UnattendGC\diagwrn.xml UserOOBEBroker.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FileCoAuth.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Content\CachePrefix BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\Cookies\CachePrefix = "Cookie:" BackgroundTransferHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoftwindows.client.cbs_cw5n1h2txyewy\Internet Settings\Cache\History\CachePrefix = "Visited:" BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache BackgroundTransferHost.exe Key created \REGISTRY\USER\S-1-5-21-3870231897-2573482396-1083937135-1000_Classes\Local Settings\MuiCache MiniSearchHost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 6056 msedge.exe 6056 msedge.exe 5336 msedge.exe 5336 msedge.exe 5180 identity_helper.exe 5180 identity_helper.exe 2664 msedge.exe 2664 msedge.exe -
Suspicious behavior: LoadsDriver 6 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 652 Process not Found -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
pid Process 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe -
Suspicious use of SendNotifyMessage 12 IoCs
pid Process 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe 5336 msedge.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1684 MiniSearchHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5336 wrote to memory of 4156 5336 msedge.exe 78 PID 5336 wrote to memory of 4156 5336 msedge.exe 78 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 3384 5336 msedge.exe 79 PID 5336 wrote to memory of 6056 5336 msedge.exe 80 PID 5336 wrote to memory of 6056 5336 msedge.exe 80 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81 PID 5336 wrote to memory of 2752 5336 msedge.exe 81
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --start-maximized --single-argument https://drive.google.com/file/d/1EMBsHzn19MOJWJyFKD0g1TvJMq-Uhjh1/view?usp=sharing1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:5336 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=90.0.4430.212 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=90.0.818.66 --initial-client-data=0x100,0x104,0x108,0xe0,0x10c,0x7fff63993cb8,0x7fff63993cc8,0x7fff63993cd82⤵PID:4156
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1912 /prefetch:22⤵PID:3384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:6056
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2664 /prefetch:82⤵PID:2752
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3204 /prefetch:12⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3212 /prefetch:12⤵PID:6136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\90.0.818.66\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5344 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4984 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4972 /prefetch:12⤵PID:4840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4572 /prefetch:12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3392 /prefetch:12⤵PID:5028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=1904,996046608531381736,17050011721718547504,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5556 /prefetch:12⤵PID:4128
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2700
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1096
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.131⤵
- Modifies registry class
PID:4152
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\MiniSearchHost.exe" -ServerName:MiniSearchUI.AppXj3y73at8fy1htwztzxs68sxx1v7cksp7.mca1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s NPSMSvc1⤵PID:4820
-
C:\Windows\System32\oobe\UserOOBEBroker.exeC:\Windows\System32\oobe\UserOOBEBroker.exe -Embedding1⤵
- Drops file in Windows directory
PID:5500
-
C:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exeC:\Users\Admin\AppData\Local\Microsoft\OneDrive\18.151.0729.0013\FileCoAuth.exe -Embedding1⤵
- System Location Discovery: System Language Discovery
PID:4332
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD53d68c7edc2a288ee58e6629398bb9f7c
SHA16c1909dea9321c55cae38b8f16bd9d67822e2e51
SHA256dfd733ed3cf4fb59f2041f82fdf676973783ffa75b9acca095609c7d4f73587b
SHA5120eda66a07ec4cdb46b0f27d6c8cc157415d803af610b7430adac19547e121f380b9c6a2840f90fe49eaea9b48fa16079d93833c2bcf4b85e3c401d90d464ad2f
-
Filesize
152B
MD5c03d23a8155753f5a936bd7195e475bc
SHA1cdf47f410a3ec000e84be83a3216b54331679d63
SHA2566f5f7996d9b0e131dc2fec84859b7a8597c11a67dd41bdb5a5ef21a46e1ae0ca
SHA5126ea9a631b454d7e795ec6161e08dbe388699012dbbc9c8cfdf73175a0ecd51204d45cf28a6f1706c8d5f1780666d95e46e4bc27752da9a9d289304f1d97c2f41
-
Filesize
1KB
MD5fef7c59a31bac48d0886ea104d489229
SHA11175daa095c9f1bd28b6d66e219cfd7830ab2b11
SHA25602b15831069a3f083dae8b09141eec6356dd7d5eab3d0bf20e945d97e5dc8cf7
SHA512152890aca275f54c3958fbac4cf209e1d0932de2ab1c2546d02174cda02fb1c38e93a6087eb6c5185ca4f98a3068d6c9a14c7b5157f0763208ef7790ec3846d2
-
Filesize
5KB
MD5ec6d647548f5ab67bd37a8e66e16ff3a
SHA1220f18d378d7e1be30fafa8994becaedae59fea9
SHA256fd13e4a0c74e900ca67e84160221ce0c82baa6511f1258aac1ee97a86fe4d826
SHA5122da7736e8610a5bacb383c1602493faf6751a76a07b1f4922209fb941f4168105164eb174f20c54e944c07bb4ba4f0d39d075261a7bcad6a99c31eb017459d2d
-
Filesize
6KB
MD5b2d2452aacb58f88c09c6ae45073ea23
SHA1494151d71adf2e2276c8929f961317a07c0d4f6e
SHA2561df621e92dd0ee6e764afc7c2546fa773741d8d9dfa36fdc2b955f7cb5741eea
SHA512bc3117438f14f60bd9e0b28695a733055770188fcb74d4db0499b765c59cbfeff64e84bb711cc68c979fbb20a5aafd06d05b10f78f69c7dc0258d6dc2c296399
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\b471404d-4e4f-453a-985b-742f5cafcb99.tmp
Filesize6KB
MD52e69c60c8ebd9e1ff36d793f2927750b
SHA1255292a9b51988ed734955f6159f096c793fb2a4
SHA2562dcb5ba7ab933487f218323c21aab2396fc7dc11f8e5f6e5324995b439118744
SHA512b37dc75cce8bc6fa96ac412c90aca9384d8740ec15745de1eb217c11db0a4a42faa1a3a0975f77f711aa29d1a864a893082d079b54e4ce0c60e9795700f36bc9
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
10KB
MD56e6b35469a70c527d9f1c8d80bc416c4
SHA1ae9b2a6b86f7a78ce02d8b4d481af8766eaaf91a
SHA256de6712676e7e87c40fa9c81ebdbd04f88493ba5ece19abe7661e81f8fa3ee901
SHA5123bdfe607684344ebbd7a6f8ba45c84cea6230a397730780a4443c524e8e4e55ad2bec1656c1c659618559eb5d640a4c79ffb4d5e390ad9c9bf374f27cf72b91b
-
Filesize
10KB
MD58da13130880ebfdfeb1f11661e7e63f1
SHA1c5134b990cbcf6b57b0234d9a93dd4cb626ec8c4
SHA256400747312c6ab7fc003707b2796800ff644c2a7d2ceccc48bffb77307fe82b92
SHA512b3c2c0e95eb784f6b3889dc7e067d316f5796fa9ba83712a01aef15677476ecfa9388029ec1d31eeba85fe81c1c8d0508e84cd4f228ebe53df8c802f0ffefb75
-
Filesize
10KB
MD500300893edd714d5066f0be9b69f93bc
SHA17cc506f56ee57561e1664826e0650d0b46293730
SHA25621bb046887967118a7900cf38952065e1a5b1178eb2b1a41adc3778036657411
SHA5127a51f87a1e8c8930dfb612a96315b7086ac8b9cadc44494f1c123889270df7507ea46d2844b6f5506da276fe7354db30cbeb4a84abcdbf7ca2502d97168ede4b
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\AC\BackgroundTransferApi\591ac624-44e3-48de-bf04-d903cabc0da4.down_data
Filesize555KB
MD55683c0028832cae4ef93ca39c8ac5029
SHA1248755e4e1db552e0b6f8651b04ca6d1b31a86fb
SHA256855abd360d8a8d6974eba92b70cbd09ce519bc8773439993f9ab37cb6847309e
SHA512aba434bd29be191c823b02ea9b639beb10647bbe7759bbffdaa790dfb1ec2c58d74c525ef11aacda209e4effe322d1d3a07b115446c8914b07a3bce4d8a0e2c3
-
C:\Users\Admin\AppData\Local\Packages\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\TempState\SearchHoverUnifiedTileModelCache.dat
Filesize10KB
MD5d6d3499e5dfe058db4af5745e6885661
SHA1ef47b148302484d5ab98320962d62565f88fcc18
SHA2567ec1b67f891fb646b49853d91170fafc67ff2918befd877dcc8515212be560f6
SHA512ad1646c13f98e6915e51bfba9207b81f6d1d174a1437f9c1e1c935b7676451ff73a694323ff61fa72ec87b7824ce9380423533599e30d889b689e2e13887045f