Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 16:37
Static task
static1
Behavioral task
behavioral1
Sample
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe
Resource
win10v2004-20241007-en
General
-
Target
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe
-
Size
896KB
-
MD5
b464444a180c10a26843bc549cd87601
-
SHA1
545b633847b6148c0016f58fc2d9a949778b0433
-
SHA256
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048
-
SHA512
b2f849290ce0948f3f43336818c9448b6538ef14dbeae122943d91a159acb8cf81976bb84f9c7f313c64943cdc7b02f9d3b804866c5befdc0cf260e01595a1f0
-
SSDEEP
24576:mn9Cgx+s7vOBnRtyy3/DaIiZD7kFOoLGV0EFemOoZ0IZ:UwgvezycbtI4OH0EFePo2IZ
Malware Config
Extracted
remcos
RemoteHost
eadzagba1.duckdns.org:4877
-
audio_folder
MicRecords
-
audio_record_time
5
-
connect_delay
0
-
connect_interval
1
-
copy_file
remcos.exe
-
copy_folder
Remcos
-
delete_file
false
-
hide_file
false
-
hide_keylog_file
false
-
install_flag
true
-
keylog_crypt
false
-
keylog_file
logs.dat
-
keylog_flag
false
-
keylog_folder
remcos
-
mouse_option
false
-
mutex
Rmc-8XMYGH
-
screenshot_crypt
false
-
screenshot_flag
false
-
screenshot_folder
Screenshots
-
screenshot_path
%AppData%
-
screenshot_time
10
-
take_screenshot_option
false
-
take_screenshot_time
5
Signatures
-
Remcos family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid Process 2832 powershell.exe 2820 powershell.exe 2592 powershell.exe 2716 powershell.exe -
Executes dropped EXE 3 IoCs
Processes:
remcos.exeremcos.exeremcos.exepid Process 3064 remcos.exe 2152 remcos.exe 2156 remcos.exe -
Loads dropped DLL 2 IoCs
Processes:
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exepid Process 2520 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2520 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
remcos.execbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-8XMYGH = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-8XMYGH = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Rmc-8XMYGH = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Rmc-8XMYGH = "\"C:\\ProgramData\\Remcos\\remcos.exe\"" remcos.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exeremcos.exedescription pid Process procid_target PID 2404 set thread context of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 3064 set thread context of 2156 3064 remcos.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exeremcos.exepowershell.exepowershell.exeschtasks.exeremcos.execbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exepowershell.exepowershell.exeschtasks.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language remcos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid Process 3036 schtasks.exe 2776 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exepowershell.exepowershell.exeremcos.exepowershell.exepowershell.exepid Process 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 2592 powershell.exe 2716 powershell.exe 3064 remcos.exe 3064 remcos.exe 3064 remcos.exe 3064 remcos.exe 3064 remcos.exe 3064 remcos.exe 2832 powershell.exe 2820 powershell.exe 3064 remcos.exe 3064 remcos.exe 3064 remcos.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exepowershell.exepowershell.exeremcos.exepowershell.exepowershell.exedescription pid Process Token: SeDebugPrivilege 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe Token: SeDebugPrivilege 2716 powershell.exe Token: SeDebugPrivilege 2592 powershell.exe Token: SeDebugPrivilege 3064 remcos.exe Token: SeDebugPrivilege 2832 powershell.exe Token: SeDebugPrivilege 2820 powershell.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.execbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exeremcos.exedescription pid Process procid_target PID 2404 wrote to memory of 2592 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 30 PID 2404 wrote to memory of 2592 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 30 PID 2404 wrote to memory of 2592 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 30 PID 2404 wrote to memory of 2592 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 30 PID 2404 wrote to memory of 2716 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 32 PID 2404 wrote to memory of 2716 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 32 PID 2404 wrote to memory of 2716 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 32 PID 2404 wrote to memory of 2716 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 32 PID 2404 wrote to memory of 2776 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 34 PID 2404 wrote to memory of 2776 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 34 PID 2404 wrote to memory of 2776 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 34 PID 2404 wrote to memory of 2776 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 34 PID 2404 wrote to memory of 2860 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 36 PID 2404 wrote to memory of 2860 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 36 PID 2404 wrote to memory of 2860 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 36 PID 2404 wrote to memory of 2860 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 36 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2404 wrote to memory of 2520 2404 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 37 PID 2520 wrote to memory of 3064 2520 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 38 PID 2520 wrote to memory of 3064 2520 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 38 PID 2520 wrote to memory of 3064 2520 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 38 PID 2520 wrote to memory of 3064 2520 cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe 38 PID 3064 wrote to memory of 2832 3064 remcos.exe 39 PID 3064 wrote to memory of 2832 3064 remcos.exe 39 PID 3064 wrote to memory of 2832 3064 remcos.exe 39 PID 3064 wrote to memory of 2832 3064 remcos.exe 39 PID 3064 wrote to memory of 2820 3064 remcos.exe 41 PID 3064 wrote to memory of 2820 3064 remcos.exe 41 PID 3064 wrote to memory of 2820 3064 remcos.exe 41 PID 3064 wrote to memory of 2820 3064 remcos.exe 41 PID 3064 wrote to memory of 3036 3064 remcos.exe 42 PID 3064 wrote to memory of 3036 3064 remcos.exe 42 PID 3064 wrote to memory of 3036 3064 remcos.exe 42 PID 3064 wrote to memory of 3036 3064 remcos.exe 42 PID 3064 wrote to memory of 2152 3064 remcos.exe 45 PID 3064 wrote to memory of 2152 3064 remcos.exe 45 PID 3064 wrote to memory of 2152 3064 remcos.exe 45 PID 3064 wrote to memory of 2152 3064 remcos.exe 45 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46 PID 3064 wrote to memory of 2156 3064 remcos.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2592
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rJxVpYQDxuAdz.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rJxVpYQDxuAdz" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4C3C.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"2⤵PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"C:\Users\Admin\AppData\Local\Temp\cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Remcos\remcos.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\rJxVpYQDxuAdz.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2820
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\rJxVpYQDxuAdz" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF834.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3036
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
PID:2152
-
-
C:\ProgramData\Remcos\remcos.exe"C:\ProgramData\Remcos\remcos.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2156
-
-
-
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
896KB
MD5b464444a180c10a26843bc549cd87601
SHA1545b633847b6148c0016f58fc2d9a949778b0433
SHA256cbcd738e4acad1d80148a67af4dca082e19f2d411f14fd0aa41d1c9c98fe5048
SHA512b2f849290ce0948f3f43336818c9448b6538ef14dbeae122943d91a159acb8cf81976bb84f9c7f313c64943cdc7b02f9d3b804866c5befdc0cf260e01595a1f0
-
Filesize
1KB
MD504f3e4d03a06b2c6422b99b44292bc3d
SHA10552510ec789caff2bffbeaa0d1a2097d224d399
SHA2563cbe9536b8fd4a7d6a34af650c6cd156af33193bfbe5ec999304470c54841406
SHA51219913cb535929e784d52bcffbd1b41c9ea5aefbb886dce4deb15d813a8ceda824d54943e74a0a9616d26310fe59a73841c1baa86b2002b3d5b1d16681704cb4a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AHSH9E38U7FD19ZMZODZ.temp
Filesize7KB
MD57641747285a7cc7b1635375dc3aca89c
SHA185c2c9709c505dc56ab30a9fc09ed77829289f06
SHA256c1894c404ded9ff3ff70f5a042fdd032ca8215b86024004ec0199ca9b0e6a65b
SHA5127f8c846d36d94f316a904677c2e002b2f0a901a5e12b789f8789fc0ff8d1fc779458221e08ab911d4d9c90c3ebceae3bd12aeb33315feb11f2fd64793456b147
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5d731d58609998cedd38bc74490f100fd
SHA1eab1bb15b563af7a66ef50beb36a5d1b94610e14
SHA256bcd63deb0eead12c0d98a6fc37691550dd429b87cf1ff7e6051c3c836a9b7b27
SHA512c5553da329fc3bd82e35c5f42e3b1b61828bc8f62180495f0f4a581e8cb30ebc248c46a1f12747dfd1d2e2520cca9eb74c5cd1a1965a4cc4b2839eb9fcb8900e