Analysis
-
max time kernel
138s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-02-2025 03:55
Static task
static1
Behavioral task
behavioral1
Sample
PO#4590OQ.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO#4590OQ.exe
Resource
win10v2004-20250129-en
General
-
Target
PO#4590OQ.exe
-
Size
1.3MB
-
MD5
7f7068a82f43b3e5769e26fab1faa7da
-
SHA1
237a64bbd29b1ef2ab180b57f3ad0b3a8fc9328c
-
SHA256
9851d62bf33dbe25f0502a068bde8acabdb58fe5230a31ac0942efe685f1f54b
-
SHA512
b7b4d6ca01093cb6365aa79c2119d55b9b6d25ffb7065101a7a891da0eb5842393284c9e46d021f94645220eb5357d88f454970839dcea4c8d2f11492f19b21c
-
SSDEEP
24576:5we0qDl5kbFWwASTXbsAAD4XNMEZZKO1p5UYeiysUJGcj23a2tjXQHwtk:5wNqDl5koRSPJAeOESO1bUYeiysUAcj/
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Xred family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 4 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 844 powershell.exe 2720 powershell.exe 2840 powershell.exe 1604 powershell.exe -
Executes dropped EXE 4 IoCs
pid Process 2776 ._cache_PO#4590OQ.exe 1564 Synaptics.exe 1812 Synaptics.exe 2460 ._cache_Synaptics.exe -
Loads dropped DLL 5 IoCs
pid Process 2632 PO#4590OQ.exe 2632 PO#4590OQ.exe 2632 PO#4590OQ.exe 1812 Synaptics.exe 1812 Synaptics.exe -
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Accesses Microsoft Outlook profiles 1 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_PO#4590OQ.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_PO#4590OQ.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_PO#4590OQ.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" PO#4590OQ.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 4 checkip.dyndns.org 8 reallyfreegeoip.org 9 reallyfreegeoip.org 16 reallyfreegeoip.org -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2348 set thread context of 2632 2348 PO#4590OQ.exe 37 PID 1564 set thread context of 1812 1564 Synaptics.exe 46 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_PO#4590OQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#4590OQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#4590OQ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2832 schtasks.exe 648 schtasks.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2400 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2348 PO#4590OQ.exe 2720 powershell.exe 2840 powershell.exe 2776 ._cache_PO#4590OQ.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1564 Synaptics.exe 1604 powershell.exe 844 powershell.exe 1564 Synaptics.exe 2460 ._cache_Synaptics.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 2348 PO#4590OQ.exe Token: SeDebugPrivilege 2720 powershell.exe Token: SeDebugPrivilege 2840 powershell.exe Token: SeDebugPrivilege 2776 ._cache_PO#4590OQ.exe Token: SeDebugPrivilege 1564 Synaptics.exe Token: SeDebugPrivilege 1604 powershell.exe Token: SeDebugPrivilege 844 powershell.exe Token: SeDebugPrivilege 2460 ._cache_Synaptics.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2400 EXCEL.EXE -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2720 2348 PO#4590OQ.exe 31 PID 2348 wrote to memory of 2720 2348 PO#4590OQ.exe 31 PID 2348 wrote to memory of 2720 2348 PO#4590OQ.exe 31 PID 2348 wrote to memory of 2720 2348 PO#4590OQ.exe 31 PID 2348 wrote to memory of 2840 2348 PO#4590OQ.exe 33 PID 2348 wrote to memory of 2840 2348 PO#4590OQ.exe 33 PID 2348 wrote to memory of 2840 2348 PO#4590OQ.exe 33 PID 2348 wrote to memory of 2840 2348 PO#4590OQ.exe 33 PID 2348 wrote to memory of 2832 2348 PO#4590OQ.exe 35 PID 2348 wrote to memory of 2832 2348 PO#4590OQ.exe 35 PID 2348 wrote to memory of 2832 2348 PO#4590OQ.exe 35 PID 2348 wrote to memory of 2832 2348 PO#4590OQ.exe 35 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2348 wrote to memory of 2632 2348 PO#4590OQ.exe 37 PID 2632 wrote to memory of 2776 2632 PO#4590OQ.exe 38 PID 2632 wrote to memory of 2776 2632 PO#4590OQ.exe 38 PID 2632 wrote to memory of 2776 2632 PO#4590OQ.exe 38 PID 2632 wrote to memory of 2776 2632 PO#4590OQ.exe 38 PID 2632 wrote to memory of 1564 2632 PO#4590OQ.exe 39 PID 2632 wrote to memory of 1564 2632 PO#4590OQ.exe 39 PID 2632 wrote to memory of 1564 2632 PO#4590OQ.exe 39 PID 2632 wrote to memory of 1564 2632 PO#4590OQ.exe 39 PID 1564 wrote to memory of 1604 1564 Synaptics.exe 40 PID 1564 wrote to memory of 1604 1564 Synaptics.exe 40 PID 1564 wrote to memory of 1604 1564 Synaptics.exe 40 PID 1564 wrote to memory of 1604 1564 Synaptics.exe 40 PID 1564 wrote to memory of 844 1564 Synaptics.exe 42 PID 1564 wrote to memory of 844 1564 Synaptics.exe 42 PID 1564 wrote to memory of 844 1564 Synaptics.exe 42 PID 1564 wrote to memory of 844 1564 Synaptics.exe 42 PID 1564 wrote to memory of 648 1564 Synaptics.exe 44 PID 1564 wrote to memory of 648 1564 Synaptics.exe 44 PID 1564 wrote to memory of 648 1564 Synaptics.exe 44 PID 1564 wrote to memory of 648 1564 Synaptics.exe 44 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1564 wrote to memory of 1812 1564 Synaptics.exe 46 PID 1812 wrote to memory of 2460 1812 Synaptics.exe 47 PID 1812 wrote to memory of 2460 1812 Synaptics.exe 47 PID 1812 wrote to memory of 2460 1812 Synaptics.exe 47 PID 1812 wrote to memory of 2460 1812 Synaptics.exe 47 -
outlook_office_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe -
outlook_win_path 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676 ._cache_Synaptics.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KLToLsNsEmafCb.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2840
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KLToLsNsEmafCb" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E5D.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"C:\Users\Admin\AppData\Local\Temp\PO#4590OQ.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\._cache_PO#4590OQ.exe"C:\Users\Admin\AppData\Local\Temp\._cache_PO#4590OQ.exe"3⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\KLToLsNsEmafCb.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\KLToLsNsEmafCb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFC97.tmp"4⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:648
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"5⤵
- Executes dropped EXE
- Accesses Microsoft Outlook profiles
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- outlook_office_path
- outlook_win_path
PID:2460
-
-
-
-
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2400
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Scheduled Task/Job
1Scheduled Task
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD57f7068a82f43b3e5769e26fab1faa7da
SHA1237a64bbd29b1ef2ab180b57f3ad0b3a8fc9328c
SHA2569851d62bf33dbe25f0502a068bde8acabdb58fe5230a31ac0942efe685f1f54b
SHA512b7b4d6ca01093cb6365aa79c2119d55b9b6d25ffb7065101a7a891da0eb5842393284c9e46d021f94645220eb5357d88f454970839dcea4c8d2f11492f19b21c
-
Filesize
91KB
MD5b45e3c4c10da3da0c69e2f90dc3dfb10
SHA161a36473ced38978793a9af1aea1fc528eebe457
SHA256b6fe518ed8ca7ee32f79bb5dd52ab8250cc595d1aa8daec123cef383c6b0bdb6
SHA51244d0c2e0904702dd22c92004415ef3c821bf63de0fb0cc6d7cca41eab36f32531530dd5fdb48017fc5405c7554ae6387514ef3f4e74eea4b36a14d587742e15b
-
Filesize
20KB
MD50def6432fadffa39a55d952e8b510643
SHA12f0f276bc5ee0feceee2878f172cbda6ccd76b0b
SHA2568734750f2ef0b6dbb8d1484673c6babb7f4cce71074f815f0d6098d1cb5195bb
SHA512fef7a239529940a81e6afabc748779b8ac305d119dc8298dd9a04842863a094f77173f21775f2a58d0656005f33e39be74cc733a186ef1615888d93f5c1497f7
-
Filesize
23KB
MD59f4ff8cb44dcf41819b24ad3242012c5
SHA103ad432659d03bf45261d25bbd910955d72b3107
SHA256ece33d07d52988f41d3909c1018b0931786a3ccc0d2d99e46378a586fa294403
SHA51204428473b9ee47bdf3bd65e2e2b8f6723c55b8ee2050564b55a8fade51460b76a3b47e46406a3c837757a8dd922b3be165465fd9d609a2a7fdec4823416b6143
-
Filesize
17KB
MD5e566fc53051035e1e6fd0ed1823de0f9
SHA100bc96c48b98676ecd67e81a6f1d7754e4156044
SHA2568e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04
-
Filesize
1KB
MD5f21c9886323386e4175278b8d9a6dd22
SHA1b0199ff608d5dd10cbc5895ffca4b74f7d0e3790
SHA2569f3ed55093e46ceb0c355eb41cae61b73d153c74ddf985533d35e2b6b52239d4
SHA512afe3c212af73f5e7728c716d7eb4e55f6a6435ffa223eb3b00878be1009faf3b2161acc2d908499c90283eb963b8a379b6bcfd39915ab8117846b491f5118c39
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3V8RJSNYCB2619KBFDXP.temp
Filesize7KB
MD58a04aeed7c07a90504a9d993778825ab
SHA19432eebf7104b9ca84a1c6fc17e244f8df73ecef
SHA2560b2170d3214e8705ff3f1b31355ac1b05c55d687d94d897e219146202014364f
SHA512eaf7545ea51a8d4c12846a36a78cb0a9805286034eeb4f0456f33b023eb0135307e6450e612d19985990feaed506cfb06e9f3d3625cf5c4d80ef7af594e36f19
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b0d407862c37020194dc74fd5d019801
SHA1f262205535c756bb58b2f7b63af0a490b08b924e
SHA256a07e32aa97576510b8d0ff7a65268eee236bc4b399d6d46e7b210d7c34318409
SHA5129306fcaade26bf2c4e31b950a9e5f4ac0dc29fa8b64999148861fbea753b43d4b1f93cfcbe73f3f6fc3d64a3915f2ccd2434f18a7818b735a73f432e237a0394