Analysis
-
max time kernel
73s -
max time network
75s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
13-11-2024 08:21
Static task
static1
Behavioral task
behavioral1
Sample
Documentation/README.pdf
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
Installers/EndpointVerification_2.0.3.msi
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
Installers/GoogleChromeStandaloneEnterprise64.msi
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
Installers/LegacyBrowserSupport_8.1.0.0_en_x64.msi
Resource
win10ltsc2021-20241023-en
General
-
Target
Documentation/README.pdf
-
Size
176KB
-
MD5
a427b5c1690f1bab5137e1bb2110d00b
-
SHA1
dd936235b66d22d86ef591169c0e39db9448c954
-
SHA256
7e206eb7666330413b76240e1343848f00cdbbfb56cd1b30f943f8169ea63b34
-
SHA512
c13053f662b00145fab710687f9c779ef1549a63f25d35c3012d8d1f21b53f1ed79b1038aa7d3a879e13c659d6d851d1544d95c247e097c57046d79c6e809004
-
SSDEEP
3072:SOSOYZwC7Scubu3RhcgaqkCpEqLh8diO6ED/JTpxYIynqCo4wYZomwaxtGzOaeHf:SOSPZwciuhcgaGpEqLh8wO6EbJ1xwqCh
Malware Config
Signatures
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\71da0d9b-0b00-4cdb-b454-fd66522bd11a.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20241113082302.pma setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3192 msedge.exe 3192 msedge.exe 4060 msedge.exe 4060 msedge.exe 5008 identity_helper.exe 5008 identity_helper.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe 4060 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4060 msedge.exe 4060 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3612 wrote to memory of 4060 3612 cmd.exe 82 PID 3612 wrote to memory of 4060 3612 cmd.exe 82 PID 4060 wrote to memory of 3040 4060 msedge.exe 84 PID 4060 wrote to memory of 3040 4060 msedge.exe 84 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 4488 4060 msedge.exe 85 PID 4060 wrote to memory of 3192 4060 msedge.exe 86 PID 4060 wrote to memory of 3192 4060 msedge.exe 86 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87 PID 4060 wrote to memory of 3008 4060 msedge.exe 87
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Documentation\README.pdf1⤵
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\Documentation\README.pdf2⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x128,0x12c,0x130,0x124,0x134,0x7ffc265046f8,0x7ffc26504708,0x7ffc265047183⤵PID:3040
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2132 /prefetch:23⤵PID:4488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2544 /prefetch:33⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:83⤵PID:3008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3364 /prefetch:13⤵PID:1276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:13⤵PID:2128
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --extension-process --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4888 /prefetch:13⤵PID:3856
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=ppapi --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --device-scale-factor=1 --ppapi-antialiased-text-enabled=1 --ppapi-subpixel-rendering-setting=1 --mojo-platform-channel-handle=5532 /prefetch:63⤵PID:1568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:83⤵PID:1952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings3⤵
- Drops file in Program Files directory
PID:3156 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x264,0x268,0x26c,0x10c,0x270,0x7ff714c05460,0x7ff714c05470,0x7ff714c054804⤵PID:1984
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5972 /prefetch:83⤵
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5968 /prefetch:13⤵PID:2060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4292 /prefetch:13⤵PID:3440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6448 /prefetch:13⤵PID:4548
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2120,5929585156386712341,14887310080656900442,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6396 /prefetch:13⤵PID:1656
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1624
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5467bc167b06cdf2998f79460b98fa8f6
SHA1a66fc2b411b31cb853195013d4677f4a2e5b6d11
SHA2563b19522cb9ce73332fa1c357c6138b97b928545d38d162733eba68c8c5e604bd
SHA5120eb63e6cacbec78b434d976fa2fb6fb44b1f9bc31001857c9bcb68c041bb52df30fbc7e1353f81d336b8a716821876fcacf3b32a107b16cec217c3d5d9621286
-
Filesize
152B
MD5cc10dc6ba36bad31b4268762731a6c81
SHA19694d2aa8b119d674c27a1cfcaaf14ade8704e63
SHA256d0d1f405097849f8203095f0d591e113145b1ce99df0545770138d772df4997f
SHA5120ed193fdcc3f625221293bfd6af3132a5ce7d87138cd7df5e4b89353c89e237c1ff81920a2b17b7e0047f2cc8b2a976f667c7f12b0dcc273ddc3b4c8323b1b56
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
5KB
MD5c5d2c7b400ae9b080e6fc351b6884ac4
SHA14b411dabd7fba6adfda4f34ed5028c5f28a5c051
SHA2562c5a4804cc6e973074a5b122298c92ded854e488cf7bc1436871fb0a3b2b6069
SHA5125489025210e11d15e2dd116166c4bef17e4e83ebacfecc602d1694225053a5e648b2662b746c41fc16b36bc64390b75fa5724c21a21d32b29c1c1c144c3e5d54
-
Filesize
4KB
MD5d464a14e5fd26954b27ba62acc13af55
SHA109ba36d1261ac138b0a9bd1654971624f6208707
SHA2567d4d5761a2f0e71eed290a119d087132f8ddf26b29b4d2d7500d333a6407fcb7
SHA512c80f76ef293a8ac6c739ad89d4a5d6470d6d8583d626eb032c4e1f9e270d27bfc79c23468aba1804efd75224ca222ca640747b627cf1c5a4e02f7bb172d74827
-
Filesize
5KB
MD581ad973e7c564887c0a7e13a458436f1
SHA191dac29903e00875539677ffa2bbffb80b4c036d
SHA256077f94652950b7b52640158bc0b8737e3839caf5ab227f7331c4ef5ae05b98c4
SHA512e4777e176f709d8310ee0cf3d0e8a87dcf36fdc69f1702a0738a10879274bd6b444c1abf1508379d1d0f2d603f0aafde98a425ff0975b8e508936721119fd6a9
-
Filesize
24KB
MD53b964859deef3a6f470b8021df49b34d
SHA162023dacf1e4019c9f204297c6be7e760f71a65d
SHA256087debdcfba4666c03a5ea699e9bb31cf22ef4e0fad7c961cb0b500e5d262fb5
SHA512c30b7e1b28820a5815b52634b46cb210c241704e33e41304400cb3ed29e82ec547a1068fc819350b368456bcabd27034afade5add3251dc74e4174f51b6c7adf
-
Filesize
24KB
MD55c2d5c900312f44e72209416d45723cb
SHA168fb8909308589149399c3fb74605600833fbbc1
SHA25656f7a77549e5fc45bd4b1f7c2db3e8b4bd1dd9234545207613a80342cee8e7d8
SHA51207c2920cff7c1125e3a2fe66bf21d8606a1f2a3d36be2d8e136da0d2a21130242ac8324f18cedfb0040304cf804815861767c969a6923d8db851312bf9b4348b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD52d60b1c349f158dbc283378a1f3af394
SHA173f16e0df7c65ceb9044f423849139c5c48016c9
SHA256f84ed13f7d9fca6c18929a39e84384344aba77f23aa66d54567b87bf843fd0b5
SHA5126a57098bacd8baeebfa24d1036aa72b378ad4050571d59254811147ba4b79d42d18b70479dc5e48476766caa76ff492a96f9f22668d1bce1928af12790f1739f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5300347298b51a05d470db7126f11d54e
SHA11da57809139c39be99ca04f46e9614e390fe8e76
SHA2560f166c51f530d83a724276b810e75f9bc6b9d7565f99f44c1a352592ce3f397e
SHA51225e4065f3bcf149414bbc5bdcc8294797dcbc57cfda1e0ee2fa3c0cf5ff48db4513a17db02790b5a5a937766c0cd0843c8c37125ddae13f70838970338ad74dd
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD589e781896e6053dd9cc4cedea15371bf
SHA1a16e76b8f57247e012f3acb93d0d2b93ceeb48f5
SHA256e6c8d2d375bbd7e0a645ed435e4dddbd0c455b971101e35948d3115283fee8d2
SHA51274e959a55360201d99059d3af5ac832660d588142a68b41fff2a79d27193933c3a5848f60335bda8afa274e79fed03598c6e99ca9baf53cef8e9560c5e0c6fa3