Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-09-2024 15:38
Static task
static1
Behavioral task
behavioral1
Sample
396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe
Resource
win10v2004-20240802-en
General
-
Target
396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe
-
Size
5.1MB
-
MD5
aa1c1ce4915e430238dd1579fe0ee320
-
SHA1
6df35550b84eb4b2648a09ff2be348ee326e7e78
-
SHA256
396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53
-
SHA512
04d46c3d8f73941b017b8c64302eebffe7a77a39d63c83dfbc5f71e45d1824557ea174dcc36c9ec82a4a176ae72ef840457855a11724314d255775b548f19d2e
-
SSDEEP
98304:xXZvnKYEUwMXKCEXZvnKYEUwMXKC6XZvnKYEUwMXKC:xtnf3rXJEtnf3rXJ6tnf3rXJ
Malware Config
Extracted
remcos
Rain
nzobaku.ddns.net:8081
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
false
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-OVTDA2
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1708 powershell.exe 1928 powershell.exe 2716 powershell.exe 2984 powershell.exe -
Executes dropped EXE 7 IoCs
pid Process 1824 ._cache_396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 2876 Synaptics.exe 748 Synaptics.exe 1704 Synaptics.exe 1984 Synaptics.exe 1696 Synaptics.exe 1792 Synaptics.exe -
Loads dropped DLL 3 IoCs
pid Process 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1544 set thread context of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2728 schtasks.exe 2180 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 2716 powershell.exe 2984 powershell.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 1708 powershell.exe 1928 powershell.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe 2876 Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 2984 powershell.exe Token: SeDebugPrivilege 2876 Synaptics.exe Token: SeDebugPrivilege 1708 powershell.exe Token: SeDebugPrivilege 1928 powershell.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1824 ._cache_396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1544 wrote to memory of 2716 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 30 PID 1544 wrote to memory of 2716 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 30 PID 1544 wrote to memory of 2716 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 30 PID 1544 wrote to memory of 2716 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 30 PID 1544 wrote to memory of 2984 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 32 PID 1544 wrote to memory of 2984 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 32 PID 1544 wrote to memory of 2984 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 32 PID 1544 wrote to memory of 2984 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 32 PID 1544 wrote to memory of 2728 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 33 PID 1544 wrote to memory of 2728 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 33 PID 1544 wrote to memory of 2728 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 33 PID 1544 wrote to memory of 2728 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 33 PID 1544 wrote to memory of 1668 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 36 PID 1544 wrote to memory of 1668 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 36 PID 1544 wrote to memory of 1668 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 36 PID 1544 wrote to memory of 1668 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 36 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 1544 wrote to memory of 340 1544 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 37 PID 340 wrote to memory of 1824 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 38 PID 340 wrote to memory of 1824 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 38 PID 340 wrote to memory of 1824 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 38 PID 340 wrote to memory of 1824 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 38 PID 340 wrote to memory of 2876 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 39 PID 340 wrote to memory of 2876 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 39 PID 340 wrote to memory of 2876 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 39 PID 340 wrote to memory of 2876 340 396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe 39 PID 2876 wrote to memory of 1708 2876 Synaptics.exe 40 PID 2876 wrote to memory of 1708 2876 Synaptics.exe 40 PID 2876 wrote to memory of 1708 2876 Synaptics.exe 40 PID 2876 wrote to memory of 1708 2876 Synaptics.exe 40 PID 2876 wrote to memory of 1928 2876 Synaptics.exe 42 PID 2876 wrote to memory of 1928 2876 Synaptics.exe 42 PID 2876 wrote to memory of 1928 2876 Synaptics.exe 42 PID 2876 wrote to memory of 1928 2876 Synaptics.exe 42 PID 2876 wrote to memory of 2180 2876 Synaptics.exe 44 PID 2876 wrote to memory of 2180 2876 Synaptics.exe 44 PID 2876 wrote to memory of 2180 2876 Synaptics.exe 44 PID 2876 wrote to memory of 2180 2876 Synaptics.exe 44 PID 2876 wrote to memory of 748 2876 Synaptics.exe 46 PID 2876 wrote to memory of 748 2876 Synaptics.exe 46 PID 2876 wrote to memory of 748 2876 Synaptics.exe 46 PID 2876 wrote to memory of 748 2876 Synaptics.exe 46 PID 2876 wrote to memory of 1704 2876 Synaptics.exe 47 PID 2876 wrote to memory of 1704 2876 Synaptics.exe 47 PID 2876 wrote to memory of 1704 2876 Synaptics.exe 47 PID 2876 wrote to memory of 1704 2876 Synaptics.exe 47 PID 2876 wrote to memory of 1984 2876 Synaptics.exe 48 PID 2876 wrote to memory of 1984 2876 Synaptics.exe 48 PID 2876 wrote to memory of 1984 2876 Synaptics.exe 48 PID 2876 wrote to memory of 1984 2876 Synaptics.exe 48 PID 2876 wrote to memory of 1792 2876 Synaptics.exe 49 PID 2876 wrote to memory of 1792 2876 Synaptics.exe 49 PID 2876 wrote to memory of 1792 2876 Synaptics.exe 49 PID 2876 wrote to memory of 1792 2876 Synaptics.exe 49
Processes
-
C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SBYYcyqg.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SBYYcyqg" /XML "C:\Users\Admin\AppData\Local\Temp\tmp642F.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"2⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"C:\Users\Admin\AppData\Local\Temp\396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\._cache_396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"C:\Users\Admin\AppData\Local\Temp\._cache_396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1824
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1708
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\SBYYcyqg.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SBYYcyqg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB75D.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2180
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:748
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1704
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1984
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1792
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
PID:1696
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.1MB
MD5aa1c1ce4915e430238dd1579fe0ee320
SHA16df35550b84eb4b2648a09ff2be348ee326e7e78
SHA256396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53
SHA51204d46c3d8f73941b017b8c64302eebffe7a77a39d63c83dfbc5f71e45d1824557ea174dcc36c9ec82a4a176ae72ef840457855a11724314d255775b548f19d2e
-
Filesize
144B
MD5ec227b9c0ebfc20ab78a06c9f5c56816
SHA1b2595328dd6fba735bc67f9482cd78f4c64404d7
SHA2562fc57f93b288a4813ea9a3dd1897d4cd58fd4d9775c50190fb7dc42f493d95ef
SHA512ed3c0994a202f477ca575b961e4a3a0e356ccd8afcf1235fc4a527676bcbd06cea971eb6d2fe6e9382da613bf327c5449aeec7986a208aa19cf22cd87d282553
-
C:\Users\Admin\AppData\Local\Temp\._cache_396b9c091d6328765df31c29d2e6e5e28f2472d63052ec39447d4325b8f3bf53.exe
Filesize483KB
MD513e2266694c6d450ed6320e775ea6ca0
SHA12a700c9c8179aec8c1f3b5e51adf064655694202
SHA25614fafc8d570493d28077c853810754b4f5f7c803a58bf05456d4d197862191b4
SHA512121f24d2433bd3c0b60126259e12ce2c990aef48635f5297ec37db9ce3337301408b6b2f4562936d803341c40e4f68ed51ccc05319920c8d7b0300b007d8600e
-
Filesize
1KB
MD511c090463656a9c1dbcda767d4f28b40
SHA189d75d73215649a835eab23827f898d9fbb1e680
SHA2566be28036505d61ae829ff757d113bb098266ffb4faf1aba52b1a1ee92bbe7202
SHA512db8836a1a36097a85b84fc7da049d006825573c3e7255c6792107dc11fdf84a7379371aa687c4036d141af15c1b24b203cdc7eaa2eb4202a46d8dde9a4b0d506
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZTCXQ5T7WFNAOYLIJT10.temp
Filesize7KB
MD5473ad76336fc81ef8ed8c3f6f6b8abb8
SHA1bcda914a6bfb05f75148a5fd21d5c529fd579a41
SHA25676efcdc916aa0b2170307012f5c676cb1df836203895eb7d1125842347906fed
SHA51263239ab7c17161f7f7d1b4955fb1acf961aba2dd6a597886a6639a23a1f50ccdfaa90bd99f8c9281055c15af578f13001fa0de534e50288ace27a8177eebc1fe
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD590cc7bb86e97a778afbc72fab2687830
SHA1959c617813664fac9f1d664150fc27dcf05ec24d
SHA256ff4670174ee69778016e8ef951fef2131bc78748b679ae3e1a97827d6ebdf12f
SHA512dd584ae31708abcb3ca36263f066386c691386b90e818f389f252f85d8c2f1001d1f7c3128bf13bad06b8c734910cb100ac0f8a3a30b684a1c4df1af1cd26d15