Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
26-12-2024 01:02
Behavioral task
behavioral1
Sample
b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe
Resource
win7-20240729-en
General
-
Target
b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe
-
Size
2.3MB
-
MD5
640810384369b5434037b059e178d2cb
-
SHA1
67f0e5c4df09a2f6fe86574f681569e3d2bd8879
-
SHA256
b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17
-
SHA512
b504a544392c24adb40fa75756470e47cf03b921f2c0bff7f24e3af3a58a6ef2d754a6149fbaba643b1c78d05c31896172863dcd2f4d33d0bf49c46240c81958
-
SSDEEP
49152:y4AMirXrrcI0AilFEvxHPLPUwXNYSLNTdqjy6:y4AtUwc
Malware Config
Extracted
orcus
System
199.195.253.181:25202
ecca0f439cec4158b200af951642a93a
-
autostart_method
Registry
-
enable_keylogger
true
-
install_path
%appdata%\Microsoft\speech\voices\COM Surrogate.exe
-
reconnect_delay
10000
-
registry_keyname
COM_key
-
taskscheduler_taskname
COM start
-
watchdog_path
AppData\COM Surrogate.exe
Extracted
quasar
1.0.0
COM Surrogate
194.29.101.219:25201
45.91.92.112:25201
199.195.253.181:25201
6953938f-ba49-4496-840c-af4ae63c3c3e
-
encryption_key
23992CD46AE82E7A5F390707A57232703BF090FE
-
install_name
COM Surrogate.exe
-
log_directory
Logs
-
reconnect_delay
5000
-
startup_key
COM Surrogate
-
subdirectory
Microsoft
Signatures
-
Contains code to disable Windows Defender 2 IoCs
A .NET executable tasked with disabling Windows Defender capabilities such as realtime monitoring, blocking at first seen, etc.
resource yara_rule behavioral1/files/0x0007000000018780-20.dat disable_win_def behavioral1/memory/2216-33-0x0000000000CA0000-0x0000000000CA8000-memory.dmp disable_win_def -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableScanOnRealtimeEnable = "1" DISABLE-WINDOWS-DEFENDER.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection DISABLE-WINDOWS-DEFENDER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableBehaviorMonitoring = "1" DISABLE-WINDOWS-DEFENDER.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\Policies\Microsoft\Windows Defender\Real-Time Protection\DisableOnAccessProtection = "1" DISABLE-WINDOWS-DEFENDER.EXE -
Orcus family
-
Orcus main payload 1 IoCs
resource yara_rule behavioral1/files/0x000b0000000122cf-2.dat family_orcus -
Quasar family
-
Quasar payload 3 IoCs
resource yara_rule behavioral1/files/0x0009000000018766-9.dat family_quasar behavioral1/memory/2424-34-0x0000000000DF0000-0x0000000000E74000-memory.dmp family_quasar behavioral1/memory/1988-74-0x0000000000C30000-0x0000000000CB4000-memory.dmp family_quasar -
Orcurs Rat Executable 3 IoCs
resource yara_rule behavioral1/files/0x000b0000000122cf-2.dat orcus behavioral1/memory/2380-31-0x0000000000910000-0x00000000009FA000-memory.dmp orcus behavioral1/memory/2896-67-0x0000000001080000-0x000000000116A000-memory.dmp orcus -
pid Process 2496 powershell.exe 2332 powershell.exe -
Executes dropped EXE 10 IoCs
pid Process 2380 COM SURROGATE.EXE 2424 CONNTO-LONDON.ZURCH.NY.EXE 2216 DISABLE-WINDOWS-DEFENDER.EXE 2764 EXCLUSION.EXE 2748 PUBBEANS.EXE 2896 COM Surrogate.exe 1988 COM Surrogate.exe 2140 COM Surrogate.exe 2160 COM Surrogate.exe 2588 COM Surrogate.exe -
Loads dropped DLL 7 IoCs
pid Process 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 2380 COM SURROGATE.EXE 2896 COM Surrogate.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features DISABLE-WINDOWS-DEFENDER.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\COM_key = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\speech\\voices\\COM Surrogate.exe\"" COM Surrogate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM SURROGATE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language COM Surrogate.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2516 schtasks.exe 2592 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2332 powershell.exe 2788 powershell.exe 2496 powershell.exe 2588 COM Surrogate.exe 2588 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2896 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe 2896 COM Surrogate.exe 2588 COM Surrogate.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2332 powershell.exe Token: SeDebugPrivilege 2788 powershell.exe Token: SeDebugPrivilege 2424 CONNTO-LONDON.ZURCH.NY.EXE Token: SeDebugPrivilege 2496 powershell.exe Token: SeDebugPrivilege 1988 COM Surrogate.exe Token: SeDebugPrivilege 2896 COM Surrogate.exe Token: SeDebugPrivilege 2160 COM Surrogate.exe Token: SeDebugPrivilege 2588 COM Surrogate.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2896 COM Surrogate.exe 1988 COM Surrogate.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2380 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 30 PID 1916 wrote to memory of 2380 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 30 PID 1916 wrote to memory of 2380 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 30 PID 1916 wrote to memory of 2380 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 30 PID 1916 wrote to memory of 2424 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 31 PID 1916 wrote to memory of 2424 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 31 PID 1916 wrote to memory of 2424 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 31 PID 1916 wrote to memory of 2424 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 31 PID 1916 wrote to memory of 2216 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 32 PID 1916 wrote to memory of 2216 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 32 PID 1916 wrote to memory of 2216 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 32 PID 1916 wrote to memory of 2216 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 32 PID 1916 wrote to memory of 2764 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 33 PID 1916 wrote to memory of 2764 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 33 PID 1916 wrote to memory of 2764 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 33 PID 1916 wrote to memory of 2764 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 33 PID 2764 wrote to memory of 2772 2764 EXCLUSION.EXE 34 PID 2764 wrote to memory of 2772 2764 EXCLUSION.EXE 34 PID 2764 wrote to memory of 2772 2764 EXCLUSION.EXE 34 PID 1916 wrote to memory of 2748 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 35 PID 1916 wrote to memory of 2748 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 35 PID 1916 wrote to memory of 2748 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 35 PID 1916 wrote to memory of 2748 1916 b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe 35 PID 2772 wrote to memory of 2332 2772 cmd.exe 37 PID 2772 wrote to memory of 2332 2772 cmd.exe 37 PID 2772 wrote to memory of 2332 2772 cmd.exe 37 PID 2216 wrote to memory of 2788 2216 DISABLE-WINDOWS-DEFENDER.EXE 38 PID 2216 wrote to memory of 2788 2216 DISABLE-WINDOWS-DEFENDER.EXE 38 PID 2216 wrote to memory of 2788 2216 DISABLE-WINDOWS-DEFENDER.EXE 38 PID 2772 wrote to memory of 2496 2772 cmd.exe 40 PID 2772 wrote to memory of 2496 2772 cmd.exe 40 PID 2772 wrote to memory of 2496 2772 cmd.exe 40 PID 2380 wrote to memory of 2896 2380 COM SURROGATE.EXE 41 PID 2380 wrote to memory of 2896 2380 COM SURROGATE.EXE 41 PID 2380 wrote to memory of 2896 2380 COM SURROGATE.EXE 41 PID 2380 wrote to memory of 2896 2380 COM SURROGATE.EXE 41 PID 2424 wrote to memory of 2516 2424 CONNTO-LONDON.ZURCH.NY.EXE 42 PID 2424 wrote to memory of 2516 2424 CONNTO-LONDON.ZURCH.NY.EXE 42 PID 2424 wrote to memory of 2516 2424 CONNTO-LONDON.ZURCH.NY.EXE 42 PID 2424 wrote to memory of 1988 2424 CONNTO-LONDON.ZURCH.NY.EXE 44 PID 2424 wrote to memory of 1988 2424 CONNTO-LONDON.ZURCH.NY.EXE 44 PID 2424 wrote to memory of 1988 2424 CONNTO-LONDON.ZURCH.NY.EXE 44 PID 1476 wrote to memory of 2140 1476 taskeng.exe 46 PID 1476 wrote to memory of 2140 1476 taskeng.exe 46 PID 1476 wrote to memory of 2140 1476 taskeng.exe 46 PID 1476 wrote to memory of 2140 1476 taskeng.exe 46 PID 2896 wrote to memory of 2160 2896 COM Surrogate.exe 47 PID 2896 wrote to memory of 2160 2896 COM Surrogate.exe 47 PID 2896 wrote to memory of 2160 2896 COM Surrogate.exe 47 PID 2896 wrote to memory of 2160 2896 COM Surrogate.exe 47 PID 1988 wrote to memory of 2592 1988 COM Surrogate.exe 49 PID 1988 wrote to memory of 2592 1988 COM Surrogate.exe 49 PID 1988 wrote to memory of 2592 1988 COM Surrogate.exe 49 PID 2160 wrote to memory of 2588 2160 COM Surrogate.exe 48 PID 2160 wrote to memory of 2588 2160 COM Surrogate.exe 48 PID 2160 wrote to memory of 2588 2160 COM Surrogate.exe 48 PID 2160 wrote to memory of 2588 2160 COM Surrogate.exe 48 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe"C:\Users\Admin\AppData\Local\Temp\b2b799de79ae7073d1f92584000e7de9ac6ce223e1e1123b6960297df857dc17.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\COM SURROGATE.EXE"C:\Users\Admin\AppData\Local\Temp\COM SURROGATE.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Roaming\Microsoft\speech\voices\COM Surrogate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\speech\voices\COM Surrogate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Roaming\COM Surrogate.exe"C:\Users\Admin\AppData\Roaming\COM Surrogate.exe" /launchSelfAndExit "C:\Users\Admin\AppData\Roaming\Microsoft\speech\voices\COM Surrogate.exe" 2896 /protectFile4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Roaming\COM Surrogate.exe"C:\Users\Admin\AppData\Roaming\COM Surrogate.exe" /watchProcess "C:\Users\Admin\AppData\Roaming\Microsoft\speech\voices\COM Surrogate.exe" 2896 "/protectFile"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CONNTO-LONDON.ZURCH.NY.EXE"C:\Users\Admin\AppData\Local\Temp\CONNTO-LONDON.ZURCH.NY.EXE"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "COM Surrogate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\CONNTO-LONDON.ZURCH.NY.EXE" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2516
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\COM Surrogate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\COM Surrogate.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "COM Surrogate" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Microsoft\COM Surrogate.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\DISABLE-WINDOWS-DEFENDER.EXE"C:\Users\Admin\AppData\Local\Temp\DISABLE-WINDOWS-DEFENDER.EXE"2⤵
- Modifies Windows Defender Real-time Protection settings
- Executes dropped EXE
- Windows security modification
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\EXCLUSION.EXE"C:\Users\Admin\AppData\Local\Temp\EXCLUSION.EXE"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B3F4.tmp\B3F5.tmp\B3F6.bat C:\Users\Admin\AppData\Local\Temp\EXCLUSION.EXE"3⤵
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Remove-MpPreference -ExclusionExtension ".exe"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\PUBBEANS.EXE"C:\Users\Admin\AppData\Local\Temp\PUBBEANS.EXE"2⤵
- Executes dropped EXE
PID:2748
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {CB03DE4F-6825-4AF5-BAE7-E520D6BEA5E9} S-1-5-21-2703099537-420551529-3771253338-1000:XECUDNCD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Roaming\Microsoft\speech\voices\COM Surrogate.exe"C:\Users\Admin\AppData\Roaming\Microsoft\speech\voices\COM Surrogate.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144B
MD5b6b3386737f7aac25b3bbe3d9e401ca5
SHA156799602f71f31ebe34f3064eb251c57cc90e4ff
SHA2563a1ccedf61cd0760b70d153c760650b3cc89629fc8defae3e2cefabfcf5c3c46
SHA512d7f6c01b9d9e4faec84eeac943033cae76aab676136396fa61a6dca16f4613c8906d2982d9bbf08999ea5353a6de1def4e0569ad601cface3b1bde0853b05014
-
Filesize
12KB
MD51371bc13031cccf40f774498c1b237ed
SHA1c264fde57d5d0dd3a0baced76748c183ddd8ccb6
SHA256915a0a6d2c065dee5cc83917df842e0ebe455482578100dea1380d7d9080a82a
SHA5126b93090b2a4190b031bfb97524099fe456e550a6639cc5341e201f4cf51f449ad522854a7302c3943d59d94755ea9e6e24d8d1b222d7674455ce70083279311f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD52a1b5be84ccbb4747228d90774fa636e
SHA1d2d39b2fb92f213f0bd3cb68a81651955a694ffb
SHA256762237c047fd52b719c1490381cfa12876fa68b357485f8afb7ab240c86caa4a
SHA51256c10db6ea71757c7ded290a2b13ec796ef60541b29b393d19f303397045425328b97881c90ab622c312227a9d0c56b3c14e80ab34f0f5ad954408175fbecb3f
-
Filesize
357B
MD5a2b76cea3a59fa9af5ea21ff68139c98
SHA135d76475e6a54c168f536e30206578babff58274
SHA256f99ef5bf79a7c43701877f0bb0b890591885bb0a3d605762647cc8ffbf10c839
SHA512b52608b45153c489419228864ecbcb92be24c644d470818dfe15f8c7e661a7bcd034ea13ef401f2b84ad5c29a41c9b4c7d161cc33ae3ef71659bc2bca1a8c4ad
-
Filesize
913KB
MD50f1c7991b1c30ed0626cf60660edc373
SHA1e8b918d39ead158f83d95bcd676611d2a9a88aa2
SHA256927f3d315f024beb4cd71ec36a465b75f39a21027b69140777e4d96a70556165
SHA512275eb9b90f17b6cafd8b81787881cfc2740e946996b64b483c3a18416471bf3d49b40781bbf86f2161e5525089cf38456975c65e0c756c3df37886bb6105453c
-
Filesize
502KB
MD5a507f854876e33aac0eea1898bb48ac9
SHA1cffe8ac84871c5b43b42fbb217e499bc1d5ec498
SHA2569ceb5ea5cdb7eb88147becd0693d9b77a65ceabd6e7eea8dcc85ae1cb23a2680
SHA5120808c1c3063c4375903ae879459bcd2255b99e594b752f093ea187403736668d69aa0d6fc71ecc302b7563a155d26843adbe6875692da45a6cac1a7db20a46d4
-
Filesize
120KB
MD5c28c98d39d0e7c62db6f3fbead74a442
SHA1a48dc75de49c2e22917054f3189940ddb438520b
SHA256506eb6c4080a854c610dc343ea0a67d10f419a6b5239d0a57f2fa48498e08ad6
SHA512e0e3961a9b5e8f0eeab9780507476c2b7507c074f19575e69e4373f62694ab828127b2b8ca1e239a3798ce5194fcfc0923ba8a2014e502a79e69fd6c0bcb9528
-
Filesize
635KB
MD54b5f6b74a31359f8914e140c67463a6e
SHA1ca1d9ef98d5e25239b4fc5d47905d645ae45971a
SHA2569bb520fe2dcc27773cbb9be2360e020ea13569f7a6f3192106a8a964621ffb4c
SHA512fd08a490b9cabd805702dc9f1765b3f346ea54f218060e77d4fd2021da5d6105cf8868abf9e2c03b2cca5667d9d7b6419bd23537bdb0893a4ccb1c5d6808bb3e
-
Filesize
9KB
MD5913967b216326e36a08010fb70f9dba3
SHA17b6f8c2eb5b443e03c212b85c2f0edb9c76ad2bf
SHA2568d880758549220154d2ff4ee578f2b49527c5fb76a07d55237b61e30bcc09e3a
SHA512c6fcb98d9fd509e9834fc3fba143bd36d41869cc104fbce5354951f0a6756156e34a30796baaa130dd45de3ed96e039ec14716716f6da4569915c7ef2d2b6c33