Analysis

  • max time kernel
    504s
  • max time network
    448s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-01-2024 14:39

General

  • Target

    902afe35c6ca794e8b436dad7edf142d2492abe3907055e4bd5e85ce6f617016.exe

  • Size

    334KB

  • MD5

    4d8bdcee20a3de89ba08bd09cd4ea642

  • SHA1

    cc4ddf3a821eb13db3d45ed7e4b0b2ed35c2a22e

  • SHA256

    902afe35c6ca794e8b436dad7edf142d2492abe3907055e4bd5e85ce6f617016

  • SHA512

    024944b3910f72e80d1436627812fefb7bd4b4f3e9d541a747d549743a8edc5f279a0abf45fab6b3fc5ce47eea00b22958efa04513095c86c42efe24c450f28d

  • SSDEEP

    6144:bkv89W2QcboLPlZvqEKvSlvgXCBVnTDg3GV06rPnek63AW1g3yEXq:bk09XelZvqEKv8gXCBlPHeByyEXq

Malware Config

Extracted

Path

C:\odt\HOW_TO_BACK_FILES.html

Ransom Note
<html> <style type="text/css"> body { background-color: #f5f5f5; } h1, h3{ text-align: center; text-transform: uppercase; font-weight: normal; } /*---*/ .tabs1{ display: block; margin: auto; } .tabs1 .head{ text-align: center; float: top; padding: 0px; text-transform: uppercase; font-weight: normal; display: block; background: #81bef7; color: #DF0101; font-size: 30px; } .tabs1 .identi { font-size: 10px; text-align: center; float: top; padding: 15px; display: block; background: #81bef7; color: #DFDFDF; word-break: break-all; } .tabs .content { background: #f5f5f5; /*text-align: center;*/ color: #000000; padding: 25px 15px; font-size: 15px; font-weight: 400; line-height: 20px; } .tabs .content a { color: #df0130; font-size: 23px; font-style: italic; text-decoration: none; line-height: 35px; } .tabs .content .text{ padding: 25px; line-height: 1.2; } </style> <body> <div class="tabs1"> <div class="head" ><b>Your personal ID:</b></div> <div class="identi"> <span style="width:1000px; color: #ffffff; font-size: 10px;">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</span> <br> <!-- !!! dont changing this !!! --> </div> </div> <!-- --> <div class="tabs"> <!--tab--> <div class="tab"> <div id="tab-content1" class="content"> <div class="text"> <!--text data --> <b>/!\ YOUR COMPANY NETWORK HAS BEEN PENETRATED /!\</b><br> <b>All your important files have been encrypted!</b><br><br> <hr> Your files are safe! Only modified. (RSA+AES)<br><br> ANY ATTEMPT TO RESTORE YOUR FILES WITH THIRD-PARTY SOFTWARE<br> WILL PERMANENTLY CORRUPT IT.<br> DO NOT MODIFY ENCRYPTED FILES.<br> DO NOT RENAME ENCRYPTED FILES.<br><br> No software available on internet can help you. We are the only ones able to<br> solve your problem.<br><br> We gathered highly confidential/personal data. These data are currently stored on<br> a private server. This server will be immediately destroyed after your payment.<br> If you decide to not pay, we will release your data to public or re-seller.<br> So you can expect your data to be publicly available in the near future..<br><br> We only seek money and our goal is not to damage your reputation or prevent<br> your business from running.<br><br> You will can send us 2-3 non-important files and we will decrypt it for free<br> to prove we are able to give your files back.<br><br> <!--text data --> <hr> <b>Contact us for price and get decryption software.</b><br><br> <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion</a><br> * Note that this server is available via Tor browser only<br><br> Follow the instructions to open the link:<br> 1. Type the addres "https://www.torproject.org" in your Internet browser. It opens the Tor site.<br> 2. Press "Download Tor", then press "Download Tor Browser Bundle", install and run it.<br> 3. Now you have Tor browser. In the Tor Browser open <a>qd7pcafncosqfqu3ha6fcx4h6sr7tzwagzpcdcnytiw3b6varaeqv5yd.onion<br> </a> 4. Start a chat and follow the further instructions. <br> <hr> <b>If you can not use the above link, use the email:</b><br> <a href="[email protected] ">[email protected] </a> <br> <a href="[email protected] ">[email protected] </a> <br> <p>* To contact us, create a new free email account on the site: <a href="https://protonmail.com">protonmail.com <br> <b> IF YOU DON'T CONTACT US WITHIN 72 HOURS, PRICE WILL BE HIGHER.</b><br> </div> </div> </div> <!--tab--> <!--text data --> </div> </div> <!--tab--> </div> </div> </body> </html>

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Renames multiple (6521) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Deletes System State backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Deletes system backups 3 TTPs 1 IoCs

    Uses wbadmin.exe to inhibit system recovery.

  • Modifies Installed Components in the registry 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 26 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Interacts with shadow copies 2 TTPs 1 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Kills process with taskkill 14 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 48 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 4 IoCs
  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3344
      • C:\Users\Admin\AppData\Local\Temp\902afe35c6ca794e8b436dad7edf142d2492abe3907055e4bd5e85ce6f617016.exe
        "C:\Users\Admin\AppData\Local\Temp\902afe35c6ca794e8b436dad7edf142d2492abe3907055e4bd5e85ce6f617016.exe"
        2⤵
        • Suspicious use of NtCreateUserProcessOtherParentProcess
        • Adds Run key to start application
        • Enumerates connected drives
        • Drops file in Program Files directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:3084
        • C:\Windows\SysWOW64\cmd.exe
          \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c rem Kill \"SQL\"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4444
          • C:\Windows\system32\cmd.exe
            C:\Windows\sysnative\cmd.exe /c rem Kill \"SQL\"
            4⤵
              PID:1400
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5052
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4588
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sqlbrowser.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3928
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sql writer.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:5044
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sql writer.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2808
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sql writer.exe
                5⤵
                • Kills process with taskkill
                PID:3172
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlserv.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4784
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlserv.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4864
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sqlserv.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:5056
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3020
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3972
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im msmdsrv.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:1404
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:2320
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:228
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im MsDtsSrvr.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:2040
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3388
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4120
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im sqlceip.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:920
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:4944
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4080
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im fdlauncher.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:3860
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im Ssms.exe
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3884
            • C:\Windows\system32\cmd.exe
              C:\Windows\sysnative\cmd.exe /c taskkill -f -im Ssms.exe
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:2728
              • C:\Windows\system32\taskkill.exe
                taskkill -f -im Ssms.exe
                5⤵
                • Kills process with taskkill
                • Suspicious use of AdjustPrivilegeToken
                PID:4828
          • C:\Windows\SysWOW64\cmd.exe
            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE
            3⤵
              PID:4140
              • C:\Windows\system32\cmd.exe
                C:\Windows\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE
                4⤵
                  PID:2580
                  • C:\Windows\system32\taskkill.exe
                    taskkill -f -im SQLAGENT.EXE
                    5⤵
                    • Kills process with taskkill
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1216
              • C:\Windows\SysWOW64\cmd.exe
                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdhost.exe
                3⤵
                  PID:4116
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\sysnative\cmd.exe /c taskkill -f -im fdhost.exe
                    4⤵
                      PID:4304
                      • C:\Windows\system32\taskkill.exe
                        taskkill -f -im fdhost.exe
                        5⤵
                        • Kills process with taskkill
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4280
                  • C:\Windows\SysWOW64\cmd.exe
                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe
                    3⤵
                      PID:1528
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe
                        4⤵
                          PID:3852
                          • C:\Windows\system32\taskkill.exe
                            taskkill -f -im ReportingServicesService.exe
                            5⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4460
                      • C:\Windows\SysWOW64\cmd.exe
                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msftesql.exe
                        3⤵
                          PID:1436
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\sysnative\cmd.exe /c taskkill -f -im msftesql.exe
                            4⤵
                              PID:4928
                              • C:\Windows\system32\taskkill.exe
                                taskkill -f -im msftesql.exe
                                5⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2772
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTABACKUP -deleteOldest
                                  6⤵
                                    PID:2080
                                    • C:\Windows\system32\wbadmin.exe
                                      wbadmin DELETE SYSTEMSTABACKUP -deleteOldest
                                      7⤵
                                      • Drops file in Windows directory
                                      PID:2068
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
                                  5⤵
                                    PID:1172
                                    • C:\Windows\system32\vssadmin.exe
                                      vssadmin.exe Delete Shadows /All /Quiet
                                      6⤵
                                      • Interacts with shadow copies
                                      PID:3056
                              • C:\Windows\SysWOW64\cmd.exe
                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe
                                3⤵
                                  PID:1916
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe
                                    4⤵
                                      PID:5080
                                      • C:\Windows\system32\taskkill.exe
                                        taskkill -f -im pg_ctl.exe
                                        5⤵
                                        • Kills process with taskkill
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:4616
                                  • C:\Windows\SysWOW64\cmd.exe
                                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -impostgres.exe
                                    3⤵
                                      PID:2100
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\sysnative\cmd.exe /c taskkill -f -impostgres.exe
                                        4⤵
                                          PID:4864
                                          • C:\Windows\system32\taskkill.exe
                                            taskkill -f -impostgres.exe
                                            5⤵
                                            • Kills process with taskkill
                                            PID:2216
                                      • C:\Windows\SysWOW64\cmd.exe
                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQLServerADHelper100
                                        3⤵
                                          PID:4660
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\sysnative\cmd.exe /c net stop MSSQLServerADHelper100
                                            4⤵
                                              PID:1312
                                              • C:\Windows\system32\net.exe
                                                net stop MSSQLServerADHelper100
                                                5⤵
                                                  PID:1728
                                                  • C:\Windows\system32\net1.exe
                                                    C:\Windows\system32\net1 stop MSSQLServerADHelper100
                                                    6⤵
                                                      PID:1612
                                              • C:\Windows\SysWOW64\cmd.exe
                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$ISARS
                                                3⤵
                                                  PID:1936
                                                  • C:\Windows\system32\cmd.exe
                                                    C:\Windows\sysnative\cmd.exe /c net stop MSSQL$ISARS
                                                    4⤵
                                                      PID:228
                                                      • C:\Windows\system32\net.exe
                                                        net stop MSSQL$ISARS
                                                        5⤵
                                                          PID:4160
                                                          • C:\Windows\system32\net1.exe
                                                            C:\Windows\system32\net1 stop MSSQL$ISARS
                                                            6⤵
                                                              PID:4396
                                                      • C:\Windows\SysWOW64\cmd.exe
                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$MSFW
                                                        3⤵
                                                          PID:3632
                                                          • C:\Windows\system32\cmd.exe
                                                            C:\Windows\sysnative\cmd.exe /c net stop MSSQL$MSFW
                                                            4⤵
                                                              PID:3584
                                                              • C:\Windows\system32\net.exe
                                                                net stop MSSQL$MSFW
                                                                5⤵
                                                                  PID:3824
                                                                  • C:\Windows\system32\net1.exe
                                                                    C:\Windows\system32\net1 stop MSSQL$MSFW
                                                                    6⤵
                                                                      PID:1540
                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$ISARS
                                                                3⤵
                                                                  PID:4072
                                                                  • C:\Windows\system32\cmd.exe
                                                                    C:\Windows\sysnative\cmd.exe /c net stop SQLAgent$ISARS
                                                                    4⤵
                                                                      PID:436
                                                                      • C:\Windows\system32\net.exe
                                                                        net stop SQLAgent$ISARS
                                                                        5⤵
                                                                          PID:3860
                                                                          • C:\Windows\system32\net1.exe
                                                                            C:\Windows\system32\net1 stop SQLAgent$ISARS
                                                                            6⤵
                                                                              PID:4056
                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$MSFW
                                                                        3⤵
                                                                          PID:4788
                                                                          • C:\Windows\system32\cmd.exe
                                                                            C:\Windows\sysnative\cmd.exe /c net stop SQLAgent$MSFW
                                                                            4⤵
                                                                              PID:3784
                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLBrowser
                                                                            3⤵
                                                                              PID:5104
                                                                              • C:\Windows\system32\cmd.exe
                                                                                C:\Windows\sysnative\cmd.exe /c net stop SQLBrowser
                                                                                4⤵
                                                                                  PID:4404
                                                                                  • C:\Windows\system32\net.exe
                                                                                    net stop SQLBrowser
                                                                                    5⤵
                                                                                      PID:3384
                                                                                      • C:\Windows\system32\net1.exe
                                                                                        C:\Windows\system32\net1 stop SQLBrowser
                                                                                        6⤵
                                                                                          PID:892
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop REportServer$ISARS
                                                                                    3⤵
                                                                                      PID:1716
                                                                                      • C:\Windows\system32\cmd.exe
                                                                                        C:\Windows\sysnative\cmd.exe /c net stop REportServer$ISARS
                                                                                        4⤵
                                                                                          PID:4200
                                                                                          • C:\Windows\system32\net.exe
                                                                                            net stop REportServer$ISARS
                                                                                            5⤵
                                                                                              PID:1268
                                                                                              • C:\Windows\system32\net1.exe
                                                                                                C:\Windows\system32\net1 stop REportServer$ISARS
                                                                                                6⤵
                                                                                                  PID:4484
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLWriter
                                                                                            3⤵
                                                                                              PID:4544
                                                                                              • C:\Windows\system32\cmd.exe
                                                                                                C:\Windows\sysnative\cmd.exe /c net stop SQLWriter
                                                                                                4⤵
                                                                                                  PID:468
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                3⤵
                                                                                                  PID:2492
                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                    C:\Windows\sysnative\cmd.exe /c bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                    4⤵
                                                                                                      PID:1728
                                                                                                      • C:\Windows\system32\bcdedit.exe
                                                                                                        bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures
                                                                                                        5⤵
                                                                                                        • Modifies boot configuration data using bcdedit
                                                                                                        PID:3232
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No
                                                                                                    3⤵
                                                                                                      PID:1344
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wmic.exe SHADOWCOPY /nointeractive
                                                                                                      3⤵
                                                                                                        PID:1420
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTABACKUP -deleteOldest
                                                                                                        3⤵
                                                                                                          PID:2772
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP
                                                                                                          3⤵
                                                                                                            PID:536
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c wbadmin delete backup -keepVersion:0 -quiet
                                                                                                            3⤵
                                                                                                              PID:864
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              \\?\C:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c vssadmin.exe Delete Shadows /All /Quiet
                                                                                                              3⤵
                                                                                                                PID:4928
                                                                                                              • C:\Windows\SysWOW64\cipher.exe
                                                                                                                cipher /w:\\?\F:
                                                                                                                3⤵
                                                                                                                • Enumerates connected drives
                                                                                                                PID:220
                                                                                                              • C:\Windows\SysWOW64\cipher.exe
                                                                                                                cipher /w:\\?\C:
                                                                                                                3⤵
                                                                                                                  PID:1152
                                                                                                                • C:\Windows\SysWOW64\cipher.exe
                                                                                                                  cipher /w:\\?\A:
                                                                                                                  3⤵
                                                                                                                  • Enumerates connected drives
                                                                                                                  PID:3384
                                                                                                              • C:\Users\Admin\AppData\Local\Temp\902afe35c6ca794e8b436dad7edf142d2492abe3907055e4bd5e85ce6f617016.exe
                                                                                                                \\?\C:\Users\Admin\AppData\Local\Temp\902afe35c6ca794e8b436dad7edf142d2492abe3907055e4bd5e85ce6f617016.exe -network
                                                                                                                2⤵
                                                                                                                • Adds Run key to start application
                                                                                                                • System policy modification
                                                                                                                PID:5100
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /c pause
                                                                                                                  3⤵
                                                                                                                    PID:2644
                                                                                                              • C:\Windows\system32\net.exe
                                                                                                                net stop SQLAgent$MSFW
                                                                                                                1⤵
                                                                                                                  PID:3884
                                                                                                                  • C:\Windows\system32\net1.exe
                                                                                                                    C:\Windows\system32\net1 stop SQLAgent$MSFW
                                                                                                                    2⤵
                                                                                                                      PID:688
                                                                                                                  • C:\Windows\system32\cmd.exe
                                                                                                                    C:\Windows\sysnative\cmd.exe /c bcdedit.exe /set {default} recoverynabled No
                                                                                                                    1⤵
                                                                                                                      PID:3188
                                                                                                                      • C:\Windows\system32\bcdedit.exe
                                                                                                                        bcdedit.exe /set {default} recoverynabled No
                                                                                                                        2⤵
                                                                                                                        • Modifies boot configuration data using bcdedit
                                                                                                                        PID:2040
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\sysnative\cmd.exe /c wbadmin delete backup -keepVersion:0 -quiet
                                                                                                                      1⤵
                                                                                                                        PID:4468
                                                                                                                        • C:\Windows\system32\wbadmin.exe
                                                                                                                          wbadmin delete backup -keepVersion:0 -quiet
                                                                                                                          2⤵
                                                                                                                          • Deletes system backups
                                                                                                                          PID:1220
                                                                                                                      • C:\Windows\system32\cmd.exe
                                                                                                                        C:\Windows\sysnative\cmd.exe /c wbadmin DELETE SYSTEMSTATEBACKUP
                                                                                                                        1⤵
                                                                                                                          PID:4216
                                                                                                                          • C:\Windows\system32\wbadmin.exe
                                                                                                                            wbadmin DELETE SYSTEMSTATEBACKUP
                                                                                                                            2⤵
                                                                                                                            • Deletes System State backups
                                                                                                                            PID:4112
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\sysnative\cmd.exe /c wmic.exe SHADOWCOPY /nointeractive
                                                                                                                          1⤵
                                                                                                                            PID:3904
                                                                                                                            • C:\Windows\System32\Wbem\WMIC.exe
                                                                                                                              wmic.exe SHADOWCOPY /nointeractive
                                                                                                                              2⤵
                                                                                                                              • Suspicious use of AdjustPrivilegeToken
                                                                                                                              PID:4660
                                                                                                                          • C:\Windows\system32\net1.exe
                                                                                                                            C:\Windows\system32\net1 stop SQLWriter
                                                                                                                            1⤵
                                                                                                                              PID:4588
                                                                                                                            • C:\Windows\system32\net.exe
                                                                                                                              net stop SQLWriter
                                                                                                                              1⤵
                                                                                                                                PID:4692
                                                                                                                              • C:\Windows\system32\vssvc.exe
                                                                                                                                C:\Windows\system32\vssvc.exe
                                                                                                                                1⤵
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                PID:4604
                                                                                                                              • C:\Windows\explorer.exe
                                                                                                                                explorer.exe
                                                                                                                                1⤵
                                                                                                                                • Modifies Installed Components in the registry
                                                                                                                                • Modifies registry class
                                                                                                                                • Suspicious use of AdjustPrivilegeToken
                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                • Suspicious use of SendNotifyMessage
                                                                                                                                PID:4864

                                                                                                                              Network

                                                                                                                              MITRE ATT&CK Enterprise v15

                                                                                                                              Replay Monitor

                                                                                                                              Loading Replay Monitor...

                                                                                                                              Downloads

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\cef_200_percent.pak.alock

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                3fb35208306d945f160f49f4054bd2db

                                                                                                                                SHA1

                                                                                                                                e81aea0eb2ecfb94d3630c2dbde6d421b982d6b4

                                                                                                                                SHA256

                                                                                                                                59b8753c0a3c074aed1dc6f7ac10caded8046a550f9cfa9b69bd1ac5daf96447

                                                                                                                                SHA512

                                                                                                                                de2fb40fd75b904a460755906f21627159990c8f77a80969bd416e69f3353a35d8df41c1cd8a4673be300061c1df5c68c614d04c8bfb1db811d2e9c177311cd2

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\aic_file_icons.png

                                                                                                                                Filesize

                                                                                                                                52KB

                                                                                                                                MD5

                                                                                                                                fd314d12f4c4045a5b238a20218f79a1

                                                                                                                                SHA1

                                                                                                                                64ae179161c83fb449cf80560acaddab67037c64

                                                                                                                                SHA256

                                                                                                                                46815a73295141d1b048ec9dbb7c1be1f9457bc37b86a263d0ee4f2fff4160b4

                                                                                                                                SHA512

                                                                                                                                a7f7e6307f13092f743eb42a03be25bf71e42417a6c336a938775a84107a6cab4cd06b8d5e95131b60ed67f758087a5aa33f6311d1113a25b432c0346b753eaf

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_remove_18.svg

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                6fd47c0d70381d00d894d30132e541cd

                                                                                                                                SHA1

                                                                                                                                50c235d89ea5243737870c3e7a958456f0aa6feb

                                                                                                                                SHA256

                                                                                                                                4962b86bb6fd34a9eb4d884c0f03dfd2a30c1dacd9dbacf63d8d7613284d942b

                                                                                                                                SHA512

                                                                                                                                99b2b330bcd9f8184f70ab65abddc34ad6e5115b940cc1c50f3c89ee49e795155ef6fb9b44a4e11958acca114f86385491ef864063a2f4fe8d2347203a7de10d

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions.png

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                25b1b5369a856a9d4a7da2bcc6e51a0b

                                                                                                                                SHA1

                                                                                                                                21cabeb27bdfe98ce806598bf5aaf49c7e9578d0

                                                                                                                                SHA256

                                                                                                                                13fc6da856387bed91143d077b5a5cfefd42ea4f3cc2be38b8d1c85ffcf7c1c8

                                                                                                                                SHA512

                                                                                                                                91ae723536ad10d0e910057c937a93231c7edb328f48af925884b53db1344fa8e138eecae604b81e7877f2e095aa0176b1d792b7a9dd72ad85d0d633b997c6d3

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\selection-actions2x.png

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                fb28132accdfcdb0973cfe29083ac128

                                                                                                                                SHA1

                                                                                                                                4f9d2764f9ead6b9a6d8b26b9e0618cceb7f2c20

                                                                                                                                SHA256

                                                                                                                                c3185517235065ea88876e008a47ab8d2ecededcfaa492485422c95de0dbf813

                                                                                                                                SHA512

                                                                                                                                d14a60cda3734805a9f76d9357adb519bcaedbc27d4ae8698aabc38ddfd8434363a4b2867550256f07d19a26be3bcfedb370d202cd53ca2450a0d4ea4795d077

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\duplicate.svg

                                                                                                                                Filesize

                                                                                                                                3KB

                                                                                                                                MD5

                                                                                                                                71eb1630dcd5f00c25ffe4b3cd92d157

                                                                                                                                SHA1

                                                                                                                                8b0091466f10cbbb81ad28783ed45e9f6454c30c

                                                                                                                                SHA256

                                                                                                                                ba6c8d65711849656c7af11e11c7aa6731bae18c30ed028c2521492bc3f16997

                                                                                                                                SHA512

                                                                                                                                215ae4e3d7b65a3ff3e1128dd8b67777f461ff73d3421997aa60c2d7b0cbaacae3971becf36b39367680ecfe907515cec4cd439e3ecf1e800cb6c26d1897b55e

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\remove.svg

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                0a4a2db31e05c71a6b07af464aab4d87

                                                                                                                                SHA1

                                                                                                                                de84e00f91680e90a9e18755ca2badd90b04860e

                                                                                                                                SHA256

                                                                                                                                2f8fcac22a3affc409c8b6ee80b44b62138f3558a1609573b08906e7ed9dcc33

                                                                                                                                SHA512

                                                                                                                                6b0777a7124741e49b2a945c050cd92e8b9d83b5d022398e0aa5bab18bb6e488901b6ee66d19385b8d7a8ad56ae6a40a967a8b7ba2ec7a15d9bc6443a2e6cc21

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\root\ui-strings.js

                                                                                                                                Filesize

                                                                                                                                9KB

                                                                                                                                MD5

                                                                                                                                01dcacb94b8f7c23bfd8cfa693259e1a

                                                                                                                                SHA1

                                                                                                                                07d36b80d248d199595ef87c2caae5736f5e0dc1

                                                                                                                                SHA256

                                                                                                                                c5e6b0745c0de39d982f1080b5997df5cb63e21e077fbc433aa34930faba93a7

                                                                                                                                SHA512

                                                                                                                                b0cec552f5bfaf387a77a1650526e0e34df3439a570553d22b94437f4d47f00d0dfdf1adbe1bc54986ddcd921fc9ed3e6a9c229eafc484bd785017dffeab812b

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\he-il\ui-strings.js

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                d4a3ecd8c9c6c17d9ebeeb1af7479401

                                                                                                                                SHA1

                                                                                                                                b6214e50b8dcdadf9d9f6bbcae7a09580a83bd31

                                                                                                                                SHA256

                                                                                                                                bcf2d5b282b2a939cd178bb23f4e78fd1952c3659a3d6bb1d94f69026f528b4c

                                                                                                                                SHA512

                                                                                                                                1f239e50cfd387421b2ed0f575f4fc2fccd5ce038ea81ee5c92022fff5d35944269d265adb63a059336f249e4971689658b59980bb700f2195b75080cf5532c8

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\convertpdf-rna-tool-view.js

                                                                                                                                Filesize

                                                                                                                                377KB

                                                                                                                                MD5

                                                                                                                                84f58f2aed76447a92724822555d3e0a

                                                                                                                                SHA1

                                                                                                                                4cf95b242b23125e70f45fa216f113c339d9ce5c

                                                                                                                                SHA256

                                                                                                                                266c7e0614b3c32f63177b16187f6f7ecc702b788cadb38f9324426e2e60ab5a

                                                                                                                                SHA512

                                                                                                                                b199e2d61931c5645bde35a182459498fea692db2d104c912a29e1424070ac7f4e025a93cc8408def30c14fedabda4e6265bbc84e128f326276222521f874065

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\example_icons2x.png

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                3a9687a4f7b0de91028626fd35710aef

                                                                                                                                SHA1

                                                                                                                                5e87a21d93c9b7774a9760a87b5747faea3ee54a

                                                                                                                                SHA256

                                                                                                                                227b15c733fed5f3f94d114232b672368bd5433847101839744681685a129410

                                                                                                                                SHA512

                                                                                                                                3534ce13c5b6df0680ce40dc3af5786b0597c2325c2a7543b15b46a9b959262aab33bdb121f05bfe7df4253d66a7b5217cd2b1f4f207adc5b73ec68f5243415e

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon.png

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                7a6e5b169fa3e967365293bfc8ebfd65

                                                                                                                                SHA1

                                                                                                                                17ad84de2f9203d8e413132e870d10fc5ed246cc

                                                                                                                                SHA256

                                                                                                                                ade098e696bc598992556d3b5065225bce00831b0c8aad9974f713b3fb089f27

                                                                                                                                SHA512

                                                                                                                                0d190966603fe3871d0a9ef13f531cdd97796530a75c776140ec903166ea55b3ce09d0a19a663790895708ef25b2fc4aeac47e6562f78ef96541fd0327e4b1cc

                                                                                                                              • C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\rhp_world_icon_2x.png

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                1fd56d9a6b17f8275e00b971d3cbe05e

                                                                                                                                SHA1

                                                                                                                                e2cd5234ab09e65530016ef83a4a6fa623cf2cad

                                                                                                                                SHA256

                                                                                                                                371e8a62fef14c66c460d1ed7b63fec15fc17756689dacf4ede385b2d39c460f

                                                                                                                                SHA512

                                                                                                                                0a45944603e50b57c1a6618803ed58a71cc4ae8018528382ea690c24467f67f71d2822c2d260a4a4e583bd1914795953638e52db2e3d3104a2de5638b8580f9a

                                                                                                                              • C:\Program Files\Java\jdk-1.8\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                f561a901a8bec5c568763ee8979f5924

                                                                                                                                SHA1

                                                                                                                                f6f180c79a37266cf5b3a633754ca8d6901eda74

                                                                                                                                SHA256

                                                                                                                                85e9f8ae51dfda914f3575654fb18ae65f664e6044cfe0fbb5e1c2719ee0c18e

                                                                                                                                SHA512

                                                                                                                                95cd5160b4974a9fac14f927c9b2583b1ea71e95ae55a0e444f54a77f11da0c7663e44ef95733947561dcbcffc423bfae8d451ce1f0c9610df3da2df36eef980

                                                                                                                              • C:\Program Files\Java\jre-1.8\COPYRIGHT

                                                                                                                                Filesize

                                                                                                                                4KB

                                                                                                                                MD5

                                                                                                                                33e028b7aecd6389c69bfc262c48a24d

                                                                                                                                SHA1

                                                                                                                                e071b305d56e5ce130e24761c0e30a64363be8af

                                                                                                                                SHA256

                                                                                                                                64cf45dfd82969c94ea93f96c20995c691afc1ffc46cb53c797cecc74c4509b3

                                                                                                                                SHA512

                                                                                                                                7801146b77922c6bd20ce5e39221c12210a6fe59595fa8b743b8a746ee38c83d8e0f547235870bbbff19cec84e32caa51ce208f47ae15d50ee3c6d14a808d71a

                                                                                                                              • C:\Program Files\Java\jre-1.8\legal\javafx\directshow.md

                                                                                                                                Filesize

                                                                                                                                2KB

                                                                                                                                MD5

                                                                                                                                f8b143e867e407f58c3118069a6ca9eb

                                                                                                                                SHA1

                                                                                                                                1cfb8cdc522adf8ffad17324400d3c3814a3855a

                                                                                                                                SHA256

                                                                                                                                94fffebeb95e78172ce40080835fb65ffa481b2db8da8be961327f2853da1190

                                                                                                                                SHA512

                                                                                                                                598e51dedcba1b7880a94b7b3bee764e7d8c056c904ef92f86757c79f7018654ecfe0a70abd991eff7b37da3da2536dd62634bafae8a41e32f0684b3c311b2fe

                                                                                                                              • C:\Program Files\Java\jre-1.8\legal\javafx\gstreamer.md

                                                                                                                                Filesize

                                                                                                                                35KB

                                                                                                                                MD5

                                                                                                                                eedf2db5962511b84ebe72e46e1b87b7

                                                                                                                                SHA1

                                                                                                                                a08645536592ed34cc4971f92773dbf2668b06c5

                                                                                                                                SHA256

                                                                                                                                fc54fa1ee0469b5669cb45b3d0458a05cc73d3a671e5bd1e359859974e4d3138

                                                                                                                                SHA512

                                                                                                                                4e3da277fc97dbd3e88e4d76af53198a2ce7fdb3eb69aeae24de7f6fcb3128ad5880158bcd361cdb1a1e473a6ed119406c14f265f93e34852a52aec99fee4dbd

                                                                                                                              • C:\Program Files\Java\jre-1.8\legal\javafx\icu_web.md

                                                                                                                                Filesize

                                                                                                                                25KB

                                                                                                                                MD5

                                                                                                                                93e3492b06307eb9d9b9e7525ee2aa85

                                                                                                                                SHA1

                                                                                                                                627b6afc5ce016d69ffc5e469e77a74d3ee962fd

                                                                                                                                SHA256

                                                                                                                                ee3469bc4359eb85352500b45e6608f0354a58b3f97af98160959f6ab900e621

                                                                                                                                SHA512

                                                                                                                                a7997aa6b92d2cd2f698a58984b63aafe5253b939f0c5bbf74d255590a3b65091edd758e206d3c79c5bd75ef9ffbfc5512b2850bd48f6840d975b63776753224

                                                                                                                              • C:\Program Files\Java\jre-1.8\lib\images\cursors\invalid32x32.gif

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                4c4664e77a2757bb18d54f94d9d5f903

                                                                                                                                SHA1

                                                                                                                                888e40f3c467306cb185367e53da312b623faa30

                                                                                                                                SHA256

                                                                                                                                bbb4aa5fd2f03b42b5c3c6bd35968a26c714d8148b3e9cb7308f2892e13e8dc8

                                                                                                                                SHA512

                                                                                                                                020c279fb992c075cf0becb17476afeb6fcf5f0129031d6b1f0f4a0b77392146b8f145fd9be9be15dc143e22cfb36a9090f7363a3bb2837ebab881078e61c88b

                                                                                                                              • C:\Program Files\Microsoft Office\root\Office16\1033\ClientOSub2019_eula.txt

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                d675c60d3cf632d3b7bbb67623f43009

                                                                                                                                SHA1

                                                                                                                                e0ac412c9abbe7746ba1ff9055623626da7fbb67

                                                                                                                                SHA256

                                                                                                                                aaac84808fa14eaac217d853417c7ee42965bb83c2046aeb098e1f170257cfff

                                                                                                                                SHA512

                                                                                                                                170a8e41e13da8f11ab1dbd0ffa35f633f8882bd9692f40d9d084f2f21171641f50b5f229c26b0b3f7aef8efa5bbec9baaad3fbee95f9ad58c7baae8d9ad3000

                                                                                                                              • C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_F_COL.HXK

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                dd5fb6d8833fd49265334dfee65d518e

                                                                                                                                SHA1

                                                                                                                                a6c3f1370b355a68e33d8ad9dd16ff8dae840e46

                                                                                                                                SHA256

                                                                                                                                8efaf7ce51090420b12b1701155f98d5d7712b24af9b56a6f2f804f8b7170ff3

                                                                                                                                SHA512

                                                                                                                                38ac53aba69ba0b01606eaf1bd54e1aa6a08370a2ad7c5bb60c934de6a5443c39c389aef02959ca178760acd32531e7af2343b2d05a99fef36b5d13165eb41b0

                                                                                                                              • C:\Program Files\Microsoft Office\root\Office16\1033\MSOUC_K_COL.HXK

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                6ff745fbb6dc78af6f84368ce4fea300

                                                                                                                                SHA1

                                                                                                                                c36244d965a05142c86c7acce5a6ec78fc059dee

                                                                                                                                SHA256

                                                                                                                                796f8aa693546e9cad13d3835f95a6ce2b25a7650b3042c75423afed6a529afb

                                                                                                                                SHA512

                                                                                                                                d76964022007e959c9c0ad836d5e3637f0b3c74b64c910466dbe04b4234039efcf378ede3b7e610fdab46cd5f3a0a8b21cd537bdef08754d7830f079f909f13b

                                                                                                                              • C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX45.exe.config

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                ef017cfc54f92fea3a2f7c088245e9d3

                                                                                                                                SHA1

                                                                                                                                41f26e47c243d342a9f229e5efd2ecd10fb0650c

                                                                                                                                SHA256

                                                                                                                                46b59bee591e48712141dc67e6690bc09bc7609cd798edcb18f178b5adc8e3d7

                                                                                                                                SHA512

                                                                                                                                222dd46f7e26c3ea4bae29e0a1987dfb99b6969f9c5fa22ab7491367db5196f74b2e30f57eaac4a10c044e99ce2aab00b634ddbebe2ba4298b7e7c0e5e075d24

                                                                                                                              • C:\Program Files\Microsoft Office\root\Office16\Bibliography\Style\SIST02.XSL

                                                                                                                                Filesize

                                                                                                                                246KB

                                                                                                                                MD5

                                                                                                                                35ded2246a97b530f5333946fe7a5dc4

                                                                                                                                SHA1

                                                                                                                                1cd1ac852ec52384664caf560c31ae0281ef3b8e

                                                                                                                                SHA256

                                                                                                                                dea4588b781d12b34113318468bab09ca6053c9789c4d327499308942257c400

                                                                                                                                SHA512

                                                                                                                                69829a53e2dde0571ac83dc588f858e98cbd8df1bd13e56f70ceffd4f2a610383c57b4132989f880313ebbff31fb647c1c5d8b917ee3f953001da8c919b8ed30

                                                                                                                              • C:\Program Files\Microsoft Office\root\Office16\PROOF\msgr8es.dub

                                                                                                                                Filesize

                                                                                                                                1KB

                                                                                                                                MD5

                                                                                                                                333ce0b5723622c61d3dbea42d4839fa

                                                                                                                                SHA1

                                                                                                                                c1d16a216e4473cfa6cbd3eac39d805c0f8915c2

                                                                                                                                SHA256

                                                                                                                                ea1d098cdcfa43ca5239a6bb2f47d5d86e241ff1431b10cbcf7c135f6293597e

                                                                                                                                SHA512

                                                                                                                                4e32d3a3eec600d6ebdaa1bc3626ec6b43bc7f45d0f7287d22b96cc3fc068287299192672b21a2bfc0c6b7e6e3b7aafb8fc2410b6b6ea50b3a05b4ebf6007efe

                                                                                                                              • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\1033\osmdp32.msi

                                                                                                                                Filesize

                                                                                                                                2.0MB

                                                                                                                                MD5

                                                                                                                                46078b456498ccc678857c5e5d4d2813

                                                                                                                                SHA1

                                                                                                                                d994291df4cf948a79776a891c434a736fedf412

                                                                                                                                SHA256

                                                                                                                                e6e0e93f409b39848a5dc7e3f77cdbe7785c05bb540883505186d018bef6dbc9

                                                                                                                                SHA512

                                                                                                                                3675caaad8cfb96c6b65bd645e9c2f1e615f7fa9853fdedcf3b391ce735279250fe4d2a2784806c8455750a12aae35dafd535222d0bf203fc83aa64e950be206

                                                                                                                              • C:\Program Files\VideoLAN\VLC\locale\fr\LC_MESSAGES\vlc.mo

                                                                                                                                Filesize

                                                                                                                                136KB

                                                                                                                                MD5

                                                                                                                                f9fb9d8cb58b91f9778d8e79597e2e6c

                                                                                                                                SHA1

                                                                                                                                b233d5d32ff1454ea1a59efbbfb2f65adec23cd7

                                                                                                                                SHA256

                                                                                                                                47eec2c718e9f8f633b910eed97c93787c1c400520ee17aadd900618dc518ea4

                                                                                                                                SHA512

                                                                                                                                b645c45191f73afaebc228fd3c2b7146606c83de25b9b4ec8e57737c27148ec403a329541d4dbd5333ca7998b42e68e4a7c08c75df24659e128a5d158a1a4243

                                                                                                                              • C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\vlc.mo

                                                                                                                                Filesize

                                                                                                                                64KB

                                                                                                                                MD5

                                                                                                                                90cef5c5d8155af5d930326e31282227

                                                                                                                                SHA1

                                                                                                                                f70ab9a592978d6a0c0fae1a159c737770d18510

                                                                                                                                SHA256

                                                                                                                                0511cd5d45d1ddee4688644edc732d2119d7d8e35f36311258bbe5ad8d57ac26

                                                                                                                                SHA512

                                                                                                                                e950cff1d1e8c1931f45734dacfe7d74dd42ae745cc21be3b176f167a98d609a0ece2e78462aef003aeaaee79e832d499a4202b8ee620acf827168fd094baa55

                                                                                                                              • C:\odt\HOW_TO_BACK_FILES.html

                                                                                                                                Filesize

                                                                                                                                5KB

                                                                                                                                MD5

                                                                                                                                f4e3e3d593cfffa33b4354dbad3bddc3

                                                                                                                                SHA1

                                                                                                                                329ffb69f111d99d640b0d84f488baf00a59fc4a

                                                                                                                                SHA256

                                                                                                                                f7d2e78e533d30f9e90772e641ad23d257abc282cc3e1b437ede570721622339

                                                                                                                                SHA512

                                                                                                                                f51f5d64c3c1528a0549f3245733581435529b3a4434ba60666aa703eef0d1a96a1c5776083e440998236d2b8a5ebe36c98dbdfe9cf14e3c64566ebaefe853c9