Analysis
-
max time kernel
140s -
max time network
142s -
platform
windows7_x64 -
resource
win7-en -
submitted
06-09-2021 11:49
Static task
static1
Behavioral task
behavioral1
Sample
EXCEL.exe
Resource
win7-en
General
-
Target
EXCEL.exe
-
Size
911KB
-
MD5
eefa3dd3a36a5decba3c42072ef0798e
-
SHA1
a51f4f499fc618b9dc36e079258ed3c087e2bae5
-
SHA256
862bf290697cfbd5cb41966b550e8b163aac94d6e07461c6e4353ea6fad62e83
-
SHA512
6e28230749c2938279e32d4c2631ea6193f28c2a5d5cd38f4176dc8e5e70a986db866e770ff32e4eaad3233b8e336f66877e1e2c70c9ef5ec2f3912f9df7d6a2
Malware Config
Extracted
xpertrat
3.0.10
Test
kapasky-antivirus.firewall-gateway.net:4000
L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0
Signatures
-
XpertRAT Core Payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/1964-100-0x0000000000401364-mapping.dmp xpertrat behavioral1/memory/1964-99-0x0000000000400000-0x0000000000443000-memory.dmp xpertrat -
NirSoft MailPassView 2 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral1/memory/1532-110-0x0000000000400000-0x000000000041B000-memory.dmp MailPassView behavioral1/memory/1532-111-0x0000000000411654-mapping.dmp MailPassView -
NirSoft WebBrowserPassView 2 IoCs
Password recovery tool for various web browsers
Processes:
resource yara_rule behavioral1/memory/1692-113-0x0000000000400000-0x0000000000459000-memory.dmp WebBrowserPassView behavioral1/memory/1692-114-0x0000000000442F04-mapping.dmp WebBrowserPassView -
Nirsoft 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1532-110-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft behavioral1/memory/1532-111-0x0000000000411654-mapping.dmp Nirsoft behavioral1/memory/1692-113-0x0000000000400000-0x0000000000459000-memory.dmp Nirsoft behavioral1/memory/1692-114-0x0000000000442F04-mapping.dmp Nirsoft behavioral1/memory/532-120-0x0000000000400000-0x0000000000415000-memory.dmp Nirsoft behavioral1/memory/532-121-0x000000000040C2A8-mapping.dmp Nirsoft -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe -
Processes:
resource yara_rule behavioral1/memory/1396-107-0x0000000000400000-0x0000000000426000-memory.dmp upx behavioral1/memory/564-117-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Deletes itself 1 IoCs
Processes:
notepad.exepid process 608 notepad.exe -
Processes:
EXCEL.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UACDisableNotify = "0" EXCEL.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
iexplore.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1669990088-476967504-438132596-1000\Software\Microsoft\Windows\CurrentVersion\Run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0 = "C:\\Users\\Admin\\AppData\\Roaming\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0.exe" iexplore.exe -
Processes:
EXCEL.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" EXCEL.exe -
Suspicious use of SetThreadContext 10 IoCs
Processes:
EXCEL.exeEXCEL.exeiexplore.exedescription pid process target process PID 736 set thread context of 2008 736 EXCEL.exe EXCEL.exe PID 2008 set thread context of 1252 2008 EXCEL.exe iexplore.exe PID 2008 set thread context of 1516 2008 EXCEL.exe iexplore.exe PID 2008 set thread context of 1560 2008 EXCEL.exe iexplore.exe PID 2008 set thread context of 1964 2008 EXCEL.exe iexplore.exe PID 1964 set thread context of 1396 1964 iexplore.exe iexplore.exe PID 1964 set thread context of 1532 1964 iexplore.exe iexplore.exe PID 1964 set thread context of 1692 1964 iexplore.exe iexplore.exe PID 1964 set thread context of 564 1964 iexplore.exe iexplore.exe PID 1964 set thread context of 532 1964 iexplore.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exeEXCEL.exeEXCEL.exepid process 1980 powershell.exe 1468 powershell.exe 2024 powershell.exe 1624 powershell.exe 1320 powershell.exe 324 powershell.exe 736 EXCEL.exe 736 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe 2008 EXCEL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1980 powershell.exe Token: SeIncreaseQuotaPrivilege 1980 powershell.exe Token: SeSecurityPrivilege 1980 powershell.exe Token: SeTakeOwnershipPrivilege 1980 powershell.exe Token: SeLoadDriverPrivilege 1980 powershell.exe Token: SeSystemProfilePrivilege 1980 powershell.exe Token: SeSystemtimePrivilege 1980 powershell.exe Token: SeProfSingleProcessPrivilege 1980 powershell.exe Token: SeIncBasePriorityPrivilege 1980 powershell.exe Token: SeCreatePagefilePrivilege 1980 powershell.exe Token: SeBackupPrivilege 1980 powershell.exe Token: SeRestorePrivilege 1980 powershell.exe Token: SeShutdownPrivilege 1980 powershell.exe Token: SeDebugPrivilege 1980 powershell.exe Token: SeSystemEnvironmentPrivilege 1980 powershell.exe Token: SeRemoteShutdownPrivilege 1980 powershell.exe Token: SeUndockPrivilege 1980 powershell.exe Token: SeManageVolumePrivilege 1980 powershell.exe Token: 33 1980 powershell.exe Token: 34 1980 powershell.exe Token: 35 1980 powershell.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeIncreaseQuotaPrivilege 1468 powershell.exe Token: SeSecurityPrivilege 1468 powershell.exe Token: SeTakeOwnershipPrivilege 1468 powershell.exe Token: SeLoadDriverPrivilege 1468 powershell.exe Token: SeSystemProfilePrivilege 1468 powershell.exe Token: SeSystemtimePrivilege 1468 powershell.exe Token: SeProfSingleProcessPrivilege 1468 powershell.exe Token: SeIncBasePriorityPrivilege 1468 powershell.exe Token: SeCreatePagefilePrivilege 1468 powershell.exe Token: SeBackupPrivilege 1468 powershell.exe Token: SeRestorePrivilege 1468 powershell.exe Token: SeShutdownPrivilege 1468 powershell.exe Token: SeDebugPrivilege 1468 powershell.exe Token: SeSystemEnvironmentPrivilege 1468 powershell.exe Token: SeRemoteShutdownPrivilege 1468 powershell.exe Token: SeUndockPrivilege 1468 powershell.exe Token: SeManageVolumePrivilege 1468 powershell.exe Token: 33 1468 powershell.exe Token: 34 1468 powershell.exe Token: 35 1468 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeIncreaseQuotaPrivilege 2024 powershell.exe Token: SeSecurityPrivilege 2024 powershell.exe Token: SeTakeOwnershipPrivilege 2024 powershell.exe Token: SeLoadDriverPrivilege 2024 powershell.exe Token: SeSystemProfilePrivilege 2024 powershell.exe Token: SeSystemtimePrivilege 2024 powershell.exe Token: SeProfSingleProcessPrivilege 2024 powershell.exe Token: SeIncBasePriorityPrivilege 2024 powershell.exe Token: SeCreatePagefilePrivilege 2024 powershell.exe Token: SeBackupPrivilege 2024 powershell.exe Token: SeRestorePrivilege 2024 powershell.exe Token: SeShutdownPrivilege 2024 powershell.exe Token: SeDebugPrivilege 2024 powershell.exe Token: SeSystemEnvironmentPrivilege 2024 powershell.exe Token: SeRemoteShutdownPrivilege 2024 powershell.exe Token: SeUndockPrivilege 2024 powershell.exe Token: SeManageVolumePrivilege 2024 powershell.exe Token: 33 2024 powershell.exe Token: 34 2024 powershell.exe Token: 35 2024 powershell.exe Token: SeDebugPrivilege 1624 powershell.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
EXCEL.exeiexplore.exepid process 2008 EXCEL.exe 1964 iexplore.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
EXCEL.exeEXCEL.exedescription pid process target process PID 736 wrote to memory of 1980 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1980 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1980 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1980 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1468 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1468 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1468 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1468 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 2024 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 2024 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 2024 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 2024 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1624 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1624 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1624 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1624 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1320 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1320 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1320 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 1320 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 324 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 324 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 324 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 324 736 EXCEL.exe powershell.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 736 wrote to memory of 2008 736 EXCEL.exe EXCEL.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1252 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1516 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1560 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1964 2008 EXCEL.exe iexplore.exe PID 2008 wrote to memory of 1964 2008 EXCEL.exe iexplore.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
EXCEL.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" EXCEL.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\EXCEL.exe"C:\Users\Admin\AppData\Local\Temp\EXCEL.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName youtube.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1468 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName facebook.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName outlook.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection -ComputerName google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:324 -
C:\Users\Admin\AppData\Local\Temp\EXCEL.exeC:\Users\Admin\AppData\Local\Temp\EXCEL.exe2⤵
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2008 -
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\EXCEL.exe3⤵PID:1252
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\EXCEL.exe3⤵PID:1516
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\EXCEL.exe3⤵PID:1560
-
C:\Program Files (x86)\Internet Explorer\iexplore.exeC:\Users\Admin\AppData\Local\Temp\EXCEL.exe3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\notepad.exenotepad.exe4⤵
- Deletes itself
PID:608 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\oigetytud0.txt"4⤵PID:1396
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\oigetytud1.txt"4⤵PID:1532
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\oigetytud2.txt"4⤵PID:1692
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\oigetytud3.txt"4⤵PID:564
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe/stext "C:\Users\Admin\AppData\Roaming\L3Q7J4T2-J8A6-L6O4-W4G3-U5J7D0W2W5F0\oigetytud4.txt"4⤵PID:532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
MD5
f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD58ff59a39feae834f4574a358122a4a8b
SHA11d9b29d097fdcecf31b41f77ca9710cfb7322b8f
SHA256d0efae4e1476e615da7d5947cb8f2def0d95705bee735d264cd099fefd5b23c1
SHA5122cee2487fd686f8d6c4bdbd6c7895d83123ce98cec15ea7b8bbf7a3889150cbfdce76e243c73709a0ebf020a16e5eaef22c931e222e9c141f0f403cacfa5ee88
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD58ff59a39feae834f4574a358122a4a8b
SHA11d9b29d097fdcecf31b41f77ca9710cfb7322b8f
SHA256d0efae4e1476e615da7d5947cb8f2def0d95705bee735d264cd099fefd5b23c1
SHA5122cee2487fd686f8d6c4bdbd6c7895d83123ce98cec15ea7b8bbf7a3889150cbfdce76e243c73709a0ebf020a16e5eaef22c931e222e9c141f0f403cacfa5ee88
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD58ff59a39feae834f4574a358122a4a8b
SHA11d9b29d097fdcecf31b41f77ca9710cfb7322b8f
SHA256d0efae4e1476e615da7d5947cb8f2def0d95705bee735d264cd099fefd5b23c1
SHA5122cee2487fd686f8d6c4bdbd6c7895d83123ce98cec15ea7b8bbf7a3889150cbfdce76e243c73709a0ebf020a16e5eaef22c931e222e9c141f0f403cacfa5ee88
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD58ff59a39feae834f4574a358122a4a8b
SHA11d9b29d097fdcecf31b41f77ca9710cfb7322b8f
SHA256d0efae4e1476e615da7d5947cb8f2def0d95705bee735d264cd099fefd5b23c1
SHA5122cee2487fd686f8d6c4bdbd6c7895d83123ce98cec15ea7b8bbf7a3889150cbfdce76e243c73709a0ebf020a16e5eaef22c931e222e9c141f0f403cacfa5ee88
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
MD58ff59a39feae834f4574a358122a4a8b
SHA11d9b29d097fdcecf31b41f77ca9710cfb7322b8f
SHA256d0efae4e1476e615da7d5947cb8f2def0d95705bee735d264cd099fefd5b23c1
SHA5122cee2487fd686f8d6c4bdbd6c7895d83123ce98cec15ea7b8bbf7a3889150cbfdce76e243c73709a0ebf020a16e5eaef22c931e222e9c141f0f403cacfa5ee88
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e