Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 08:56
Behavioral task
behavioral1
Sample
6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe
Resource
win10v2004-20241007-en
General
-
Target
6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe
-
Size
4.6MB
-
MD5
951ea841732871d4dd799fdf1fdf57d1
-
SHA1
70d47ead9a8e584a2b0f6b872847bb4d90c7fa62
-
SHA256
6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7
-
SHA512
57526b4da9f9172ae96bf122d635f871f8f24e653500d2c10ca6bdd6502c6db8b1b40252e0d4c4624383453aea719e34309294bd3547e45e6af08678fa2e7dc1
-
SSDEEP
98304:9nsmtk2aPOmZb0bHkeaRs4WpcF8uztWOiiROB4/Oo1sRFu:hLBmZb0bEds4XFR0OiC/GTu
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 5 IoCs
pid Process 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 4628 Synaptics.exe 1480 ._cache_Synaptics.exe 3724 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe -
Checks processor information in registry 2 TTPs 7 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_Synaptics.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4020 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3724 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 3724 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 4504 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe -
Suspicious use of SetWindowsHookEx 9 IoCs
pid Process 4020 EXCEL.EXE 4020 EXCEL.EXE 1480 ._cache_Synaptics.exe 4020 EXCEL.EXE 4020 EXCEL.EXE 4020 EXCEL.EXE 4020 EXCEL.EXE 4020 EXCEL.EXE 4020 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 5060 wrote to memory of 1748 5060 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 82 PID 5060 wrote to memory of 1748 5060 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 82 PID 5060 wrote to memory of 1748 5060 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 82 PID 5060 wrote to memory of 4628 5060 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 83 PID 5060 wrote to memory of 4628 5060 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 83 PID 5060 wrote to memory of 4628 5060 6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 83 PID 4628 wrote to memory of 1480 4628 Synaptics.exe 84 PID 4628 wrote to memory of 1480 4628 Synaptics.exe 84 PID 4628 wrote to memory of 1480 4628 Synaptics.exe 84 PID 1748 wrote to memory of 3724 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 86 PID 1748 wrote to memory of 3724 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 86 PID 1748 wrote to memory of 3724 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 86 PID 1748 wrote to memory of 4504 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 87 PID 1748 wrote to memory of 4504 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 87 PID 1748 wrote to memory of 4504 1748 ._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe"C:\Users\Admin\AppData\Local\Temp\6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe"C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe"C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe" --local-service3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3724
-
-
C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe"C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe" --local-control3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:4504
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:1480
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4020
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5951ea841732871d4dd799fdf1fdf57d1
SHA170d47ead9a8e584a2b0f6b872847bb4d90c7fa62
SHA2566f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7
SHA51257526b4da9f9172ae96bf122d635f871f8f24e653500d2c10ca6bdd6502c6db8b1b40252e0d4c4624383453aea719e34309294bd3547e45e6af08678fa2e7dc1
-
C:\Users\Admin\AppData\Local\Temp\._cache_6f2eab739a2daf67221a8b4f99201f2265bb4f1d39343f3be58454dbba5665c7.exe
Filesize3.9MB
MD530c9c57aa570088d745fac7bfd05b805
SHA1d579d18848859614e219afa6332d410e0ca71fc3
SHA2568cd552392bb25546ba58e73d63c4b7c290188ca1060f96c8abf641ae9f5a8383
SHA512182dc736cf09e8b4e063b29c839999ab28506a71e22173484f9dbc9bf9472456406aa0c8de542d85436200317175f9e32d65f1bb1e567b8c717860348fd3b52c
-
Filesize
22KB
MD5638b0cb9fa5a088254b5cef2f9bde402
SHA159fc7523be9eda8995dec5b6e2d35610950ce3bc
SHA256211a2bb23a6e15a8207b751dc130a7c164b5edbda44c0f1242a77880a61a9306
SHA5125c6bf2abec98df34063ebbbf31092e7ac7ef28506a4173538e0f3916a218f29ca29f80970cbc02816bf25b5a82a3e7863e98fbc341ce27415d9500c4f63ef35c
-
Filesize
385KB
MD51ce7d5a1566c8c449d0f6772a8c27900
SHA160854185f6338e1bfc7497fd41aa44c5c00d8f85
SHA25673170761d6776c0debacfbbc61b6988cb8270a20174bf5c049768a264bb8ffaf
SHA5127e3411be8614170ae91db1626c452997dc6db663d79130872a124af982ee1d457cefba00abd7f5269adce3052403be31238aecc3934c7379d224cb792d519753
-
Filesize
12KB
MD55585a968af0efd1639388aa9bfdeb407
SHA1b2f0a1598ff9b38f14a42301a833d0910a9acc8a
SHA2563aaaab06668b11c0ea9e8c37390bd038ebd8a1239b6dd51ba1d7534001b8bd07
SHA512695bf190c14cab000a0351ad4fc332d1395c5bc88ccbb9334301bcd3a1a48e3a50a0920ef487ac9cfe9cada1f9162acbb905540969ee7b84d78166b8d7b4edc7
-
Filesize
16KB
MD5530e258d5c366f5c2ff46c828d418175
SHA1e2e8da21d6bd3c9ae44640c931409de0e1d2b505
SHA2561231e793220c186e6bc527757ee31960704cdc00ad1c27f6e0e249cb46fcf40f
SHA5123dcd85c1d3ed5aa3e6f610fd865f046a1e6bc088f3041a5062d068f20114c45448597e6f52e003a016234d2ffdc644b29a0aa82562189fc1637bc9719905fee1
-
Filesize
2KB
MD5f8dcd07b5f253fb6a6afc86e8bf08485
SHA1d86a192bd40ca36c917ecf06d108228fdd71d9ae
SHA256d57a45c6cfc29aec39396275cb399373789ff16526bc0b932683b65cf9dffcc3
SHA512d167971fbb91d3829b2c1f9a2e99b0882c2bc52d7259743056c1995b2c8acd980fdee6f190a3895a7e47caa00760ea1970c61ffdc7124762eca66108f51b9461
-
Filesize
2KB
MD58c51c9c10e47a8963e6bbe969afa21b6
SHA14f44a50f6990cf31201e3dec06f0c6deef24db79
SHA256516bb81f0152154914f0450dd540eae67c9b048eaff808c75ed5ad44dd35408b
SHA512fcdf1bb3b19d15c645b16d5cd10947eea035d02e49dce90907ea62d53bfb48025eb687d09262d7028c7994537fbc31adbfd5f6a817053d1c046fbda2f8279ae5
-
Filesize
424B
MD5c4afde1e097eb7e44883f48684f49a6e
SHA1a87b72532d32be99494a02e7457314c231059e28
SHA256d430a9822825ccb5dde1bd8110f3e4478aad91d578cef184c4eb41ba544d31de
SHA512fa1380848c7b7dc7e744a476326f65c2921ff3aeb041340d325aad2a3ddb05e9e9a5f0e20d964434df52e2d715f8893d09b6b7ea538b9ccd8048e61134a9bced
-
Filesize
612B
MD5b35425e037ef557bc18195861978d870
SHA1d3aa45cba4e8760dbdff24a7e877144337685ced
SHA256210881fb460b04ec46e35cc04801b0fce22855f6c9d7fd09dcb60d587549ad5c
SHA5122273b0d686a7f52555552cb36a8d55b8cd46a8c60db4e29951db07b7b16519423b6a034d292eacc8bd1cc95990ccb197aad5a3840f7681daddeec6b01976ff9a
-
Filesize
669B
MD5df13613c7ace6a37657e90cc7057ec0c
SHA14b19c93dd41657cea9b3a0b8b38b63e32b1b3df9
SHA256fff2c2ec23ef7e5e13644401f9094a3b4b0b47fddd149325040f6c3c5f89315a
SHA512cb19b8fa7b40b1c7e0d93a8da35688b17ce2d43f23393d1f9a2c288fe7a899d6e0ec6689386924e43f516f63f69cb1ba0a50a42d45c783812a18c2738938e157
-
Filesize
716B
MD5ea5fa1c06268ba2309b96b90d00dc269
SHA10972001f0920187bae502a475174abecfad07f7c
SHA256eced5221cadbe7e4ebec7250a157c33bbdd9fb4c3b44133e96f6255183dfbda3
SHA512720d0d7fe16adbf48a4611a7eccffeeef563ddb65d3873033ce5f14838cd8aac3bbac7244719209333cd204dc3fe09a9950ca6a196fdede7aac77cc58bb18a2d
-
Filesize
1003B
MD58b7ba7f4e7706f7b7b72c98f0739e332
SHA13da1b4bda4ae5a752bcd766d594e12e1a1ebff83
SHA256eb56d2d4db14073a07119bb1bfa9b1df10310013e5e2e72b09f175699c0cecfe
SHA512800be09dc5f36852dde839437d74c4c9455bc64e27ae66aff5bb777418225daaab3df63b3ab90be0086dbcf76ea2bf9eea27c05670e6c3bc74931ca38f1d4863
-
Filesize
1KB
MD5820bcd77789ee73ba2f47b0d3efa6b1c
SHA172e3366f2b831aa89451d473db387d38f00551f6
SHA256542012b5d1a09802adc9e347852613151aa7354a63d7904d0212a4331df7f785
SHA51217ec7d2e3c32cdf774474d98663b172499e96114ed9d485180a3125a6fae4e4c6d6edff25c5941cab82cf63b8a32e26541c640de1af153e5aaeac7092c803b92
-
Filesize
1KB
MD598e903881ab8ac85fcba6d00d8e05107
SHA19edcb0182f374710b81f713b4fa78db8db9ff2f6
SHA2562118e5ae23fa20fd733843da45bc10d4b6fc8cfceb3e3eab52a73b815ac1550b
SHA512479f0f9f6f0d87dd0c74455404dca8824da9a4f9e9accfd75841919dcbfdda247e16436746705c7179a20b6551ed36bdd1ce90f57d009d4974e79972b5675bda
-
Filesize
6KB
MD5128d916cf907efc6ef71505324c0ca30
SHA14578795ae8d58a9fd964a57821397b55618fdebd
SHA2567cdedd7d145d1d8bc32276bfe22e68d99d7a1499881417fa7accb3674830edc8
SHA51216f2ff91093ff15ee7095b5f00be9cb2f28efa81ac8ac3998dbbe437f6b6834b9515bf1cf37fb7626be69d8f9812f540e78146eebb89a344ea7981937088da09
-
Filesize
6KB
MD52205149969034e3089fccc393ebc3376
SHA158095fa2dbb72b098e90934f4bac5a64ed072d41
SHA256f1fff9eee81859c5ae7acd8922fd9f3a94fff7c4434ee082ea53c6e60da0b674
SHA512b5090b319ef60554b2cce8272af15d0fc8d28596035ae0bd0fd0148b6a3f40f2c618496d7e87e8c4a5cea3ea69abc3c248530a9c8935c36736c5827b078b148e
-
Filesize
7KB
MD569e0f8db527b21b0e2d4e29ee14b1560
SHA114e17a37cd431a7f024fe2dd192a394af2847e38
SHA2562ab1031935d26daf206c46c2547491a402bfa4a9b59c184161b3becbad5c2d74
SHA512dc18be913fd7db7de00929b9749f40d8343e2898be556d4000bfbab5db993ecc9a16fdd6679a0bc2d371c15324827a202a919c9846be26682953e201d4f940b0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize4KB
MD5a8eccecf0868c484fe0617db7c11cd71
SHA171729168a40604c9775efcfe23d8658faab895aa
SHA25664b7f0d8e6f34c452e1398b3fd52d7e190c07b6413101c18d0bd8fffb3d3b9a4
SHA5129de9eba26e990dd42948ad580ea3ed2a431cd4f257af0fbadc8709719bef49cd9afd4bd02fdbeff550f50b8ecf981c6038b1d164a8e8fe31023d947f5b100428
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\75fdacd8330bac18.customDestinations-ms
Filesize3KB
MD5068338b8ee4f4ec508d547c9ee9f8079
SHA1d7b71c9df9744b8de083802056b837c5d6e2d80d
SHA2565f2ce3fcdf1861f381090e583d0defe40cb0a13ee154445d43afdb2e397e09fe
SHA512e8b14f2ca7342bb8a255b1fc85bc31632606a3a83fb72a84d2327a22ca38a57bfb50e12b33142e2ad9d8a262a06ab9b445e4a8697912646d610df1eb2e00778c