Analysis
-
max time kernel
147s -
max time network
146s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250113-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250113-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
22-01-2025 02:03
Static task
static1
Behavioral task
behavioral1
Sample
wincr.dll
Resource
win10ltsc2021-20250113-en
General
-
Target
zupamos.exe
-
Size
20KB
-
MD5
2fc1dbe65a6b4ead4752b540c5c9c61a
-
SHA1
2dae131b54d2b37691bc64e061bdd9472f2903dd
-
SHA256
45253335297071d1d74939210bbc5644dc7d3749ca1e3d9b5c004c1fbb108a41
-
SHA512
3633aea567d37479e57ce3f82e67abf106626df780ddca050a5cbc4c48e2655d34a52e79b8eae392c948197d5439adab270068ed3fe5ff254cf1b3b280949344
-
SSDEEP
384:oRbzlc27TQFUYOG7Tz1QkxRxRUnJa2XACW:oTciTQF5QkxRE/3W
Malware Config
Extracted
lumma
https://suggestyuoz.biz/api
Signatures
-
Lumma family
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\8b55d74b-46d8-46fd-91d8-0a1ed4253643.tmp setup.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\SetupMetrics\20250122020412.pma setup.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zupamos.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 384 msedge.exe 384 msedge.exe 1236 msedge.exe 1236 msedge.exe 4704 identity_helper.exe 4704 identity_helper.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe 2764 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 11 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe 1236 msedge.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1236 msedge.exe 1236 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1236 wrote to memory of 3976 1236 msedge.exe 94 PID 1236 wrote to memory of 3976 1236 msedge.exe 94 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 3832 1236 msedge.exe 95 PID 1236 wrote to memory of 384 1236 msedge.exe 96 PID 1236 wrote to memory of 384 1236 msedge.exe 96 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97 PID 1236 wrote to memory of 2400 1236 msedge.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\zupamos.exe"C:\Users\Admin\AppData\Local\Temp\zupamos.exe"1⤵
- System Location Discovery: System Language Discovery
PID:4108
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\Desktop\CompleteDeny.htm1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x144,0x148,0x14c,0x120,0x150,0x7ff80f8146f8,0x7ff80f814708,0x7ff80f8147182⤵PID:3976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2176 /prefetch:22⤵PID:3832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2304 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:384
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2880 /prefetch:82⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3736 /prefetch:12⤵PID:5044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3760 /prefetch:12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵PID:2684
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --configure-user-settings --verbose-logging --system-level --msedge --force-configure-user-settings2⤵
- Drops file in Program Files directory
PID:4936 -
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\MsEdgeCrashpad --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0x264,0x268,0x26c,0x240,0x270,0x7ff79ea85460,0x7ff79ea85470,0x7ff79ea854803⤵PID:4732
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:4704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3384 /prefetch:12⤵PID:3420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2472 /prefetch:12⤵PID:776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5364 /prefetch:12⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4592 /prefetch:12⤵PID:5132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1316 /prefetch:12⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=13 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2684 /prefetch:12⤵PID:5744
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=4684 /prefetch:82⤵PID:5908
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.4355 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2472 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=16 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5560 /prefetch:12⤵PID:3748
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=17 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4316 /prefetch:12⤵PID:4484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2148,6120236421357591018,9719415859898871378,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=18 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3548 /prefetch:12⤵PID:420
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:788
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD57aea85a5d58b45db7a4d9dd361b1eb5d
SHA1c6844a476f9b8396b0db499d50303a0f34b8ddc6
SHA2561b33dfb5c90ef3794804742054d7fb9fcaf94b99dfabd14054df4cd81794c46e
SHA512f83d365e93c894d00c926c09d383b5805551a7c96595278131c3f5d44259713e5bb47a1d4259e452743a5c5040e8502c4e979a8ca076a4ea53d32722fb2b9057
-
Filesize
70KB
MD5e5e3377341056643b0494b6842c0b544
SHA1d53fd8e256ec9d5cef8ef5387872e544a2df9108
SHA256e23040951e464b53b84b11c3466bbd4707a009018819f9ad2a79d1b0b309bc25
SHA51283f09e48d009a5cf83fa9aa8f28187f7f4202c84e2d0d6e5806c468f4a24b2478b73077381d2a21c89aa64884df3c56e8dc94eb4ad2d6a8085ac2feb1e26c2ef
-
Filesize
180B
MD500a455d9d155394bfb4b52258c97c5e5
SHA12761d0c955353e1982a588a3df78f2744cfaa9df
SHA25645a13c77403533b12fbeeeb580e1c32400ca17a32e15caa8c8e6a180ece27fed
SHA5129553f8553332afbb1b4d5229bbf58aed7a51571ab45cbf01852b36c437811befcbc86f80ec422f222963fa7dabb04b0c9ae72e9d4ff2eeb1e58cde894fbe234f
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Network Persistent State~RFe592fb1.TMP
Filesize59B
MD52800881c775077e1c4b6e06bf4676de4
SHA12873631068c8b3b9495638c865915be822442c8b
SHA256226eec4486509917aa336afebd6ff65777b75b65f1fb06891d2a857a9421a974
SHA512e342407ab65cc68f1b3fd706cd0a37680a0864ffd30a6539730180ede2cdcd732cc97ae0b9ef7db12da5c0f83e429df0840dbf7596aca859a0301665e517377b
-
Filesize
5KB
MD567df39efada5568b5e65a1af67b2584f
SHA1c308c2488de87a042942ec3da3fd22b6f9e325a4
SHA2566fc3d268e160e858181be854ac4745492c4b9e01e09408d595217dd453497bc9
SHA512d557e698ff76aabb3dd37f536b535e216e4627259f70076c9fa6aabb4ba790f915cd7fe258a6d05250f0872e638cebbec4d847d0ebfc89efe395134197199c85
-
Filesize
5KB
MD5d15d7edc385cedfb7616df3c7130fe4f
SHA1619fbcae8721d88735aa9919192099c9b9e839f9
SHA25669938340ca5c0a574307440b8ec6dc7b988024d275bdfe2ff85ec48ce50deb51
SHA5124d5cfd8247d59b6fa9f850f8a3f9ba7dbb04c8d3c10503bc19dd364c3b040d90d06a8d4609a127042637b712eb3a9e196548298de690cc966ab589e352e51ea5
-
Filesize
5KB
MD5d08e7833e21a9faba40d6862042bdb52
SHA124defca257c290125517b71b7a9d5a98432c1300
SHA25645ac24bdd9cf8413555ae7a5e14fa3cf514250555092cf5b516ddd180c53ad7f
SHA51219ad94ba79df8be139d40615fe3def08de88eee007ef809a9b58cb5fec562a2dd3495019f210c2da9254db27065faec4b06cd222f5f2c5e85a9339d6809e0874
-
Filesize
5KB
MD56b6a62e166e05bae3bec43a56aeb5c83
SHA1001184465e32e3481bf3707ff770dc04c296492f
SHA2566138c705618474a78daceac2a6b3548e91f6092de25ddbd5a365b32fbfef39c3
SHA5127d08751045b8491f0ba885cbf735c836d7bb495d8dac1b96c44049ed88c42c04e14b614d52d6fd6d1637e38b39ec836996817af94fe8ad56f2c9af5b659d8ac3
-
Filesize
5KB
MD5d541dd2abb12a4bb93d97ce33cbfc7af
SHA121a1383032586d61ba470613d21e542ba243c373
SHA2566e1abacd4df2bc8b4f137f532c5b6a2dad81420a144225662118f4e04353ee66
SHA51292f6a653a300f3748925d330b82ea3bfb1b481f197219149d18ae7129e1a6a63067e188bccc1b2f6cc27922680c46a2edcd46b6a57cffa9937062c14ac14369a
-
Filesize
24KB
MD555ac5035daa44e5169d4454fa40900cb
SHA1a78cc59c2726ea59b71980fe2b80f4293af088e4
SHA2567f8b0f40d1a6a8010e8d365f6d92c1dbdafcaeabf1ee492d745864ce78f4f3ac
SHA512cfd5bac258a40a11f38346e74c8a43f18617c3742a83c51be6fd2caeec71c43c56a0684454b22b4adbb7caf7b3dc93cd7e0aaa5d4d7e7c528eda840374626c6d
-
Filesize
24KB
MD53197bce0fd2473291af7f959cb82b58f
SHA15747e270e0cb151ade7d29a1510ede74fc1e1a46
SHA256b05c79dd0ad7e33bdb5e71f2fea8aee06d415a97ce2e9da76cbfed9f7b6f2c4f
SHA51243e22facecb57e8a61671f4c6f76baf28f574291e46fda2d00fa00e6fc46800693947c2bb700976f983272f3c0f35f5ecce3f45ad4385ac9161a09460b2aa8ed
-
Filesize
41B
MD55af87dfd673ba2115e2fcf5cfdb727ab
SHA1d5b5bbf396dc291274584ef71f444f420b6056f1
SHA256f9d31b278e215eb0d0e9cd709edfa037e828f36214ab7906f612160fead4b2b4
SHA512de34583a7dbafe4dd0dc0601e8f6906b9bc6a00c56c9323561204f77abbc0dc9007c480ffe4092ff2f194d54616caf50aecbd4a1e9583cae0c76ad6dd7c2375b
-
Filesize
16B
MD5206702161f94c5cd39fadd03f4014d98
SHA1bd8bfc144fb5326d21bd1531523d9fb50e1b600a
SHA2561005a525006f148c86efcbfb36c6eac091b311532448010f70f7de9a68007167
SHA5120af09f26941b11991c750d1a2b525c39a8970900e98cba96fd1b55dbf93fee79e18b8aab258f48b4f7bda40d059629bc7770d84371235cdb1352a4f17f80e145
-
Filesize
16B
MD546295cac801e5d4857d09837238a6394
SHA144e0fa1b517dbf802b18faf0785eeea6ac51594b
SHA2560f1bad70c7bd1e0a69562853ec529355462fcd0423263a3d39d6d0d70b780443
SHA5128969402593f927350e2ceb4b5bc2a277f3754697c1961e3d6237da322257fbab42909e1a742e22223447f3a4805f8d8ef525432a7c3515a549e984d3eff72b23
-
Filesize
8KB
MD560c68027c5031292d83f11d583d054e0
SHA145de8f000c12cd1b4c8f495ce2afb128b4ad908a
SHA2567a059bdfa3dd9de71144996bd011e79a80bc2b6f942b5b1a72783eec4cb0a571
SHA5123b2ecfdd8150bfb7f3bbe12f1a6e66a107993c811246a151ef76971cfbe20edf268ee8a0021037b8f8f65e73f83191b1b65cbec1e320f3871d303d6f22289e40
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD568f9ef233d375b9c13bbfdb8cb35d5f9
SHA1a72e2182c1bc81524f18148b669f60df801c9af1
SHA25674f417fc5d574baf05873993f6e5ba3ee2231bc1b086621f17b157383563f4c3
SHA512563cc8106814ee5f17cb6efef0a1244026d99b3d809cc774a971771f30942fc9c95756eb45cc1de9c245b2958231343a170fffd57863407ede338aeaec625395
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ccba5a5986c77e43.customDestinations-ms
Filesize3KB
MD5947ca2026c30ec0080460b85e51eef14
SHA17b9a9eddec93db893cb59130d960b421e1586722
SHA256b7285b22ee31db104b4ccec01caea374e8a7c07527a921be9ea2d7abebfd5235
SHA512a6230a02816dc64e0ad6b8e617c14b946e1004f155123c389f911509a5e0aba36a56b457b899aae260f2b5174fbc399240ee5d95e537e0bb33c3031b61d2aa2d