Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07-09-2024 17:39
Static task
static1
Behavioral task
behavioral1
Sample
PCCooker_x64.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
PCCooker_x64.exe
Resource
win10v2004-20240802-en
General
-
Target
PCCooker_x64.exe
-
Size
22.4MB
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
Malware Config
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
C:\Users\Public\Documents\RGNR_DF83F6B4.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
uGoUQjcjqoZsiRJZ
-
Install_directory
%AppData%
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 50 IoCs
Processes:
resource yara_rule behavioral1/files/0x000400000001cb58-1744.dat family_xworm behavioral1/files/0x000400000001cbbc-1796.dat family_xworm behavioral1/files/0x000400000001cbc3-1812.dat family_xworm behavioral1/memory/3028-1761-0x0000000000840000-0x0000000000850000-memory.dmp family_xworm behavioral1/memory/1204-1823-0x0000000000200000-0x0000000000210000-memory.dmp family_xworm behavioral1/memory/220-1829-0x0000000000EC0000-0x0000000000ED0000-memory.dmp family_xworm behavioral1/files/0x000400000001cbc6-1842.dat family_xworm behavioral1/files/0x000400000001cbd2-1856.dat family_xworm behavioral1/memory/2564-1870-0x0000000000CB0000-0x0000000000CC0000-memory.dmp family_xworm behavioral1/files/0x000400000001cbdc-1884.dat family_xworm behavioral1/memory/2984-1879-0x0000000000AE0000-0x0000000000AF0000-memory.dmp family_xworm behavioral1/files/0x000400000001cbe4-1897.dat family_xworm behavioral1/files/0x000400000001cbde-1896.dat family_xworm behavioral1/files/0x000400000001cbd6-1890.dat family_xworm behavioral1/memory/1736-1914-0x0000000000D90000-0x0000000000DA0000-memory.dmp family_xworm behavioral1/memory/1528-1924-0x0000000001280000-0x0000000001290000-memory.dmp family_xworm behavioral1/files/0x000400000001cbe8-1941.dat family_xworm behavioral1/memory/792-1927-0x0000000000EE0000-0x0000000000EF0000-memory.dmp family_xworm behavioral1/memory/2676-1926-0x0000000000220000-0x0000000000230000-memory.dmp family_xworm behavioral1/files/0x000400000001cc02-1949.dat family_xworm behavioral1/memory/3064-1954-0x0000000000B60000-0x0000000000B70000-memory.dmp family_xworm behavioral1/files/0x000400000001cc2c-1973.dat family_xworm behavioral1/memory/288-1953-0x0000000000050000-0x0000000000060000-memory.dmp family_xworm behavioral1/files/0x000400000001cc46-1981.dat family_xworm behavioral1/memory/2740-2010-0x0000000000300000-0x0000000000310000-memory.dmp family_xworm behavioral1/files/0x000400000001cc5a-2019.dat family_xworm behavioral1/memory/2544-2009-0x0000000000C90000-0x0000000000CA0000-memory.dmp family_xworm behavioral1/memory/2592-2004-0x0000000000CB0000-0x0000000000CC0000-memory.dmp family_xworm behavioral1/memory/1776-1997-0x0000000001150000-0x0000000001160000-memory.dmp family_xworm behavioral1/files/0x000400000001cc48-1995.dat family_xworm behavioral1/files/0x000400000001cc22-1980.dat family_xworm behavioral1/files/0x000400000001cc67-2048.dat family_xworm behavioral1/files/0x000400000001cc6f-2063.dat family_xworm behavioral1/files/0x000400000001cc7b-2076.dat family_xworm behavioral1/memory/1904-2039-0x0000000000DE0000-0x0000000000DF0000-memory.dmp family_xworm behavioral1/memory/2276-2083-0x0000000001370000-0x0000000001380000-memory.dmp family_xworm behavioral1/memory/3044-2093-0x0000000000B40000-0x0000000000B50000-memory.dmp family_xworm behavioral1/files/0x000400000001ccd6-2102.dat family_xworm behavioral1/files/0x000400000001ccdc-2101.dat family_xworm behavioral1/memory/1324-2091-0x0000000000ED0000-0x0000000000EE0000-memory.dmp family_xworm behavioral1/files/0x000400000001ccde-2109.dat family_xworm behavioral1/files/0x000400000001ccdd-2115.dat family_xworm behavioral1/memory/2540-2142-0x0000000000D80000-0x0000000000D90000-memory.dmp family_xworm behavioral1/files/0x000400000001ccdf-2134.dat family_xworm behavioral1/files/0x000400000001cce0-2129.dat family_xworm behavioral1/memory/3012-2165-0x0000000000BF0000-0x0000000000C00000-memory.dmp family_xworm behavioral1/memory/1080-2174-0x0000000000850000-0x0000000000860000-memory.dmp family_xworm behavioral1/memory/2172-2167-0x0000000000A50000-0x0000000000A60000-memory.dmp family_xworm behavioral1/memory/1672-2179-0x0000000000BD0000-0x0000000000BE0000-memory.dmp family_xworm behavioral1/memory/2044-2182-0x00000000002B0000-0x00000000002C0000-memory.dmp family_xworm -
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7826) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 4352 powershell.exe 4508 powershell.exe 5764 powershell.exe 5944 powershell.exe 5888 powershell.exe 5472 powershell.exe 4480 powershell.exe 5068 powershell.exe 5900 powershell.exe 4284 powershell.exe 4812 powershell.exe 7300 powershell.exe 8168 powershell.exe 6296 powershell.exe 6736 powershell.exe 4208 powershell.exe 4316 powershell.exe 5460 powershell.exe 4840 powershell.exe 6160 powershell.exe 8092 powershell.exe 5260 powershell.exe 4616 powershell.exe 4388 powershell.exe 4220 powershell.exe 7900 powershell.exe 5940 powershell.exe 6480 powershell.exe 8164 powershell.exe 5476 powershell.exe 7200 powershell.exe 7032 powershell.exe 5492 powershell.exe 4516 powershell.exe 7208 powershell.exe 3816 powershell.exe 6044 powershell.exe 4748 powershell.exe 5308 powershell.exe 4860 powershell.exe 4192 powershell.exe 7724 powershell.exe 4328 powershell.exe 5332 powershell.exe 7432 powershell.exe 5056 powershell.exe 5904 powershell.exe 4400 powershell.exe 5448 powershell.exe 5316 powershell.exe 3996 powershell.exe 4548 powershell.exe 7444 powershell.exe 4756 powershell.exe 7268 powershell.exe 6868 powershell.exe 8088 powershell.exe 4816 powershell.exe 3880 powershell.exe 5440 powershell.exe 5036 powershell.exe 7836 powershell.exe 7172 powershell.exe 5932 powershell.exe -
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 28 IoCs
Processes:
17.exe1.exe16.exe12.exe3.exe13.exe4.exe25.exe10.exe8.exe22.exe7.exe19.exe15.exe5.exe18.exe14.exe2.exe20.exe21.exe6.exeasena.exe11.exe24.exeexplorer.exe23.exe9.exedescription ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 17.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 16.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 12.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 25.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 10.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 8.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 22.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 7.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 19.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 15.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 18.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 14.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 20.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 21.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RGNR_DF83F6B4.txt asena.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 11.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 24.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\1352984d.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 22.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 9.exe -
Executes dropped EXE 30 IoCs
Processes:
4363463463464363463463463.exea76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exeasena.exeBomb.exeCryptoWall.exe25.exe24.exe23.exe22.exe21.exe19.exe20.exe18.exe17.exe16.exe15.exe14.exe13.exe12.exe11.exe10.exe9.exe8.exe7.exe6.exe5.exe3.exe4.exe1.exe2.exepid Process 1872 4363463463464363463463463.exe 2384 a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe 1792 asena.exe 2808 Bomb.exe 2792 CryptoWall.exe 3028 25.exe 1204 24.exe 220 23.exe 2984 22.exe 2564 21.exe 1736 19.exe 2676 20.exe 792 18.exe 1528 17.exe 3064 16.exe 288 15.exe 1776 14.exe 2592 13.exe 2740 12.exe 2544 11.exe 1904 10.exe 2276 9.exe 1324 8.exe 3044 7.exe 2540 6.exe 3012 5.exe 2172 3.exe 1672 4.exe 1080 1.exe 2044 2.exe -
Loads dropped DLL 7 IoCs
Processes:
PCCooker_x64.exepid Process 1900 PCCooker_x64.exe 1900 PCCooker_x64.exe 1900 PCCooker_x64.exe 1900 PCCooker_x64.exe 1900 PCCooker_x64.exe 1900 PCCooker_x64.exe 1900 PCCooker_x64.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\1352984 = "C:\\1352984d\\1352984d.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*352984 = "C:\\1352984d\\1352984d.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\1352984d = "C:\\Users\\Admin\\AppData\\Roaming\\1352984d.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*352984d = "C:\\Users\\Admin\\AppData\\Roaming\\1352984d.exe" explorer.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
asena.exedescription ioc Process File opened (read-only) \??\E: asena.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 7 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 18 ip-api.com 19 ip-api.com 20 ip-api.com 21 ip-api.com 22 ip-api.com 5 ip-addr.es 7 myexternalip.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
asena.exedescription ioc Process File opened for modification \??\PHYSICALDRIVE0 asena.exe -
Drops file in Program Files directory 64 IoCs
Processes:
asena.exedescription ioc Process File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\de-DE\css\RSSFeeds.css asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099185.JPG asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0213449.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341645.JPG asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.registry_3.5.400.v20140428-1507.jar asena.exe File created C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\en-US\RGNR_DF83F6B4.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152704.WMF asena.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\js\RGNR_DF83F6B4.txt asena.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\AcroForm\PMP\AdobePDF417.pmp asena.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\Providers\Proximity\11.00\brt32.clx asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0332364.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\Discussion14.gta asena.exe File created C:\Program Files\VideoLAN\VLC\locale\ff\RGNR_DF83F6B4.txt asena.exe File opened for modification C:\Program Files\Windows Media Player\fr-FR\WMPSideShowGadget.exe.mui asena.exe File created C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\RGNR_DF83F6B4.txt asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\requests\playlist_jstree.xml asena.exe File opened for modification C:\Program Files\Windows Defender\en-US\MpAsDesc.dll.mui asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\43.png asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187881.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR30F.GIF asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Tehran asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.browser_5.5.0.165303.jar asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_underline.gif asena.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Document Parts\RGNR_DF83F6B4.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\button_left.gif asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\vlc.mo asena.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\ja-JP\sqloledb.rll.mui asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00633_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18214_.WMF asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface.nl_zh_4.4.0.v20140623020002.jar asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt_3.103.1.v20140903-1938.jar asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-multitabs.xml asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0341559.JPG asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PROTTPLV.XLS asena.exe File opened for modification C:\Program Files\7-Zip\Lang\gl.txt asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Paramaribo asena.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Troll asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_blue_partly-cloudy.png asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-sendopts.xml asena.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Nairobi asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\settings.html asena.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.sun.el_2.2.0.v201303151357.jar asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Ceuta asena.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\RICEPAPR\PREVIEW.GIF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00336_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00232_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB01741L.GIF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR9B.GIF asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\InkWatson.exe.mui asena.exe File opened for modification C:\Program Files\DVD Maker\ja-JP\DVDMaker.exe.mui asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsViewFrame.html asena.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmplayer.exe.mui asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00419_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101865.BMP asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18202_.WMF asena.exe File opened for modification C:\Program Files\Common Files\System\msadc\es-ES\msadcer.dll.mui asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\hu\LC_MESSAGES\vlc.mo asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL095.XML asena.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Groove.en-us\SETUP.XML asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0386267.JPG asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105388.WMF asena.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\reveal_hov.png asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\InkObj.dll.mui asena.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
CryptoWall.exea76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exeexplorer.exesvchost.exevssadmin.exenotepad.exePCCooker_x64.exeasena.exe4363463463464363463463463.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoWall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCCooker_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asena.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid Process 2904 vssadmin.exe 1928 vssadmin.exe -
Processes:
4363463463464363463463463.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 4363463463464363463463463.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid Process 7228 notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid Process 3816 powershell.exe 3880 powershell.exe 4616 powershell.exe 4352 powershell.exe 4344 powershell.exe 4860 powershell.exe 4748 powershell.exe 5092 powershell.exe 4724 powershell.exe 4192 powershell.exe 4548 powershell.exe 4220 powershell.exe 5068 powershell.exe 4236 powershell.exe 4440 powershell.exe 4852 powershell.exe 5572 powershell.exe 4388 powershell.exe 4804 powershell.exe 4824 powershell.exe 4908 powershell.exe 5460 powershell.exe 4400 powershell.exe 5448 powershell.exe 5448 powershell.exe 5824 powershell.exe 4492 powershell.exe 5824 powershell.exe 4492 powershell.exe 4480 powershell.exe 4480 powershell.exe 5056 powershell.exe 4876 powershell.exe 5332 powershell.exe 5316 powershell.exe 6096 powershell.exe 4508 powershell.exe 4208 powershell.exe 344 powershell.exe 4328 powershell.exe 5492 powershell.exe 5932 powershell.exe 4632 powershell.exe 4812 powershell.exe 5308 powershell.exe 5888 powershell.exe 6044 powershell.exe 4736 powershell.exe 5900 powershell.exe 5020 powershell.exe 5972 powershell.exe 5480 powershell.exe 5764 powershell.exe 5764 powershell.exe 3996 powershell.exe 5476 powershell.exe 5884 powershell.exe 4940 powershell.exe 4316 powershell.exe 4196 powershell.exe 5660 powershell.exe 4840 powershell.exe 5440 powershell.exe 4756 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
CryptoWall.exeexplorer.exepid Process 2792 CryptoWall.exe 2724 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exevssvc.exe4363463463464363463463463.exe23.exe25.exe24.exe21.exe22.exe19.exe17.exe18.exe20.exe16.exe15.exe14.exe13.exe12.exe11.exe10.exe9.exe7.exe8.exe6.exedescription pid Process Token: SeIncreaseQuotaPrivilege 2892 wmic.exe Token: SeSecurityPrivilege 2892 wmic.exe Token: SeTakeOwnershipPrivilege 2892 wmic.exe Token: SeLoadDriverPrivilege 2892 wmic.exe Token: SeSystemProfilePrivilege 2892 wmic.exe Token: SeSystemtimePrivilege 2892 wmic.exe Token: SeProfSingleProcessPrivilege 2892 wmic.exe Token: SeIncBasePriorityPrivilege 2892 wmic.exe Token: SeCreatePagefilePrivilege 2892 wmic.exe Token: SeBackupPrivilege 2892 wmic.exe Token: SeRestorePrivilege 2892 wmic.exe Token: SeShutdownPrivilege 2892 wmic.exe Token: SeDebugPrivilege 2892 wmic.exe Token: SeSystemEnvironmentPrivilege 2892 wmic.exe Token: SeRemoteShutdownPrivilege 2892 wmic.exe Token: SeUndockPrivilege 2892 wmic.exe Token: SeManageVolumePrivilege 2892 wmic.exe Token: 33 2892 wmic.exe Token: 34 2892 wmic.exe Token: 35 2892 wmic.exe Token: SeIncreaseQuotaPrivilege 2892 wmic.exe Token: SeSecurityPrivilege 2892 wmic.exe Token: SeTakeOwnershipPrivilege 2892 wmic.exe Token: SeLoadDriverPrivilege 2892 wmic.exe Token: SeSystemProfilePrivilege 2892 wmic.exe Token: SeSystemtimePrivilege 2892 wmic.exe Token: SeProfSingleProcessPrivilege 2892 wmic.exe Token: SeIncBasePriorityPrivilege 2892 wmic.exe Token: SeCreatePagefilePrivilege 2892 wmic.exe Token: SeBackupPrivilege 2892 wmic.exe Token: SeRestorePrivilege 2892 wmic.exe Token: SeShutdownPrivilege 2892 wmic.exe Token: SeDebugPrivilege 2892 wmic.exe Token: SeSystemEnvironmentPrivilege 2892 wmic.exe Token: SeRemoteShutdownPrivilege 2892 wmic.exe Token: SeUndockPrivilege 2892 wmic.exe Token: SeManageVolumePrivilege 2892 wmic.exe Token: 33 2892 wmic.exe Token: 34 2892 wmic.exe Token: 35 2892 wmic.exe Token: SeBackupPrivilege 2616 vssvc.exe Token: SeRestorePrivilege 2616 vssvc.exe Token: SeAuditPrivilege 2616 vssvc.exe Token: SeDebugPrivilege 1872 4363463463464363463463463.exe Token: SeDebugPrivilege 220 23.exe Token: SeDebugPrivilege 3028 25.exe Token: SeDebugPrivilege 1204 24.exe Token: SeDebugPrivilege 2564 21.exe Token: SeDebugPrivilege 2984 22.exe Token: SeDebugPrivilege 1736 19.exe Token: SeDebugPrivilege 1528 17.exe Token: SeDebugPrivilege 792 18.exe Token: SeDebugPrivilege 2676 20.exe Token: SeDebugPrivilege 3064 16.exe Token: SeDebugPrivilege 288 15.exe Token: SeDebugPrivilege 1776 14.exe Token: SeDebugPrivilege 2592 13.exe Token: SeDebugPrivilege 2740 12.exe Token: SeDebugPrivilege 2544 11.exe Token: SeDebugPrivilege 1904 10.exe Token: SeDebugPrivilege 2276 9.exe Token: SeDebugPrivilege 3044 7.exe Token: SeDebugPrivilege 1324 8.exe Token: SeDebugPrivilege 2540 6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PCCooker_x64.exeasena.exeCryptoWall.exeexplorer.exeBomb.exedescription pid Process procid_target PID 1900 wrote to memory of 1872 1900 PCCooker_x64.exe 30 PID 1900 wrote to memory of 1872 1900 PCCooker_x64.exe 30 PID 1900 wrote to memory of 1872 1900 PCCooker_x64.exe 30 PID 1900 wrote to memory of 1872 1900 PCCooker_x64.exe 30 PID 1900 wrote to memory of 2384 1900 PCCooker_x64.exe 31 PID 1900 wrote to memory of 2384 1900 PCCooker_x64.exe 31 PID 1900 wrote to memory of 2384 1900 PCCooker_x64.exe 31 PID 1900 wrote to memory of 2384 1900 PCCooker_x64.exe 31 PID 1900 wrote to memory of 1792 1900 PCCooker_x64.exe 33 PID 1900 wrote to memory of 1792 1900 PCCooker_x64.exe 33 PID 1900 wrote to memory of 1792 1900 PCCooker_x64.exe 33 PID 1900 wrote to memory of 1792 1900 PCCooker_x64.exe 33 PID 1900 wrote to memory of 2808 1900 PCCooker_x64.exe 34 PID 1900 wrote to memory of 2808 1900 PCCooker_x64.exe 34 PID 1900 wrote to memory of 2808 1900 PCCooker_x64.exe 34 PID 1900 wrote to memory of 2808 1900 PCCooker_x64.exe 34 PID 1900 wrote to memory of 2792 1900 PCCooker_x64.exe 35 PID 1900 wrote to memory of 2792 1900 PCCooker_x64.exe 35 PID 1900 wrote to memory of 2792 1900 PCCooker_x64.exe 35 PID 1900 wrote to memory of 2792 1900 PCCooker_x64.exe 35 PID 1792 wrote to memory of 2892 1792 asena.exe 36 PID 1792 wrote to memory of 2892 1792 asena.exe 36 PID 1792 wrote to memory of 2892 1792 asena.exe 36 PID 1792 wrote to memory of 2892 1792 asena.exe 36 PID 1792 wrote to memory of 2904 1792 asena.exe 38 PID 1792 wrote to memory of 2904 1792 asena.exe 38 PID 1792 wrote to memory of 2904 1792 asena.exe 38 PID 1792 wrote to memory of 2904 1792 asena.exe 38 PID 2792 wrote to memory of 2724 2792 CryptoWall.exe 40 PID 2792 wrote to memory of 2724 2792 CryptoWall.exe 40 PID 2792 wrote to memory of 2724 2792 CryptoWall.exe 40 PID 2792 wrote to memory of 2724 2792 CryptoWall.exe 40 PID 2724 wrote to memory of 2828 2724 explorer.exe 44 PID 2724 wrote to memory of 2828 2724 explorer.exe 44 PID 2724 wrote to memory of 2828 2724 explorer.exe 44 PID 2724 wrote to memory of 2828 2724 explorer.exe 44 PID 2724 wrote to memory of 1928 2724 explorer.exe 45 PID 2724 wrote to memory of 1928 2724 explorer.exe 45 PID 2724 wrote to memory of 1928 2724 explorer.exe 45 PID 2724 wrote to memory of 1928 2724 explorer.exe 45 PID 2808 wrote to memory of 3028 2808 Bomb.exe 47 PID 2808 wrote to memory of 3028 2808 Bomb.exe 47 PID 2808 wrote to memory of 3028 2808 Bomb.exe 47 PID 2808 wrote to memory of 1204 2808 Bomb.exe 48 PID 2808 wrote to memory of 1204 2808 Bomb.exe 48 PID 2808 wrote to memory of 1204 2808 Bomb.exe 48 PID 2808 wrote to memory of 220 2808 Bomb.exe 49 PID 2808 wrote to memory of 220 2808 Bomb.exe 49 PID 2808 wrote to memory of 220 2808 Bomb.exe 49 PID 2808 wrote to memory of 2984 2808 Bomb.exe 50 PID 2808 wrote to memory of 2984 2808 Bomb.exe 50 PID 2808 wrote to memory of 2984 2808 Bomb.exe 50 PID 2808 wrote to memory of 2564 2808 Bomb.exe 51 PID 2808 wrote to memory of 2564 2808 Bomb.exe 51 PID 2808 wrote to memory of 2564 2808 Bomb.exe 51 PID 2808 wrote to memory of 2676 2808 Bomb.exe 52 PID 2808 wrote to memory of 2676 2808 Bomb.exe 52 PID 2808 wrote to memory of 2676 2808 Bomb.exe 52 PID 2808 wrote to memory of 1736 2808 Bomb.exe 53 PID 2808 wrote to memory of 1736 2808 Bomb.exe 53 PID 2808 wrote to memory of 1736 2808 Bomb.exe 53 PID 2808 wrote to memory of 792 2808 Bomb.exe 54 PID 2808 wrote to memory of 792 2808 Bomb.exe 54 PID 2808 wrote to memory of 792 2808 Bomb.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCCooker_x64.exe"C:\Users\Admin\AppData\Local\Temp\PCCooker_x64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384
-
-
C:\Users\Admin\AppData\Local\Temp\asena.exe"C:\Users\Admin\AppData\Local\Temp\asena.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2904
-
-
C:\Windows\SysWOW64\notepad.exeC:\Users\Public\Documents\RGNR_DF83F6B4.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:7228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bomb.exe"C:\Users\Admin\AppData\Local\Temp\Bomb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\25.exe"C:\Users\Admin\AppData\Local\Temp\25.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3028 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\25.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3880
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '25.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7200
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8164
-
-
-
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\24.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '24.exe'4⤵PID:5612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:5156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5260
-
-
-
C:\Users\Admin\AppData\Local\Temp\23.exe"C:\Users\Admin\AppData\Local\Temp\23.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\23.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4860
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '23.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5972
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:7520
-
-
-
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\22.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '22.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5900
-
-
-
C:\Users\Admin\AppData\Local\Temp\21.exe"C:\Users\Admin\AppData\Local\Temp\21.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\21.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4352
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '21.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4388
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4632
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6160
-
-
-
C:\Users\Admin\AppData\Local\Temp\20.exe"C:\Users\Admin\AppData\Local\Temp\20.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\20.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4876
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '20.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7172
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5904
-
-
-
C:\Users\Admin\AppData\Local\Temp\19.exe"C:\Users\Admin\AppData\Local\Temp\19.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\19.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '19.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5460
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3996
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7900
-
-
-
C:\Users\Admin\AppData\Local\Temp\18.exe"C:\Users\Admin\AppData\Local\Temp\18.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\18.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '18.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5056
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4284
-
-
-
C:\Users\Admin\AppData\Local\Temp\17.exe"C:\Users\Admin\AppData\Local\Temp\17.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\17.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '17.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6296
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:7012
-
-
-
C:\Users\Admin\AppData\Local\Temp\16.exe"C:\Users\Admin\AppData\Local\Temp\16.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\16.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4192
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '16.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5472
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:5124
-
-
-
C:\Users\Admin\AppData\Local\Temp\15.exe"C:\Users\Admin\AppData\Local\Temp\15.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:288 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\15.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '15.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4508
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7724
-
-
-
C:\Users\Admin\AppData\Local\Temp\14.exe"C:\Users\Admin\AppData\Local\Temp\14.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\14.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4908
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '14.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5764
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8168
-
-
-
C:\Users\Admin\AppData\Local\Temp\13.exe"C:\Users\Admin\AppData\Local\Temp\13.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\13.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4208
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '13.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5476
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:7132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7836
-
-
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\12.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4236
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '12.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5440
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:7244
-
-
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\11.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '11.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5884
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:3864
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8088
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\10.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '10.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:8092
-
-
-
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4812
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7268
-
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1324 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\8.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4328
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '8.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4816
-
-
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '7.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:5956
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '6.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5480
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7432
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7444
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:3012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5068
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '5.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6736
-
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:1672 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5944
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6868
-
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2172 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '3.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6096
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4196
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:7124
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2044 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4400
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:7676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7032
-
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:1080 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:7340
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\syswow64\svchost.exe-k netsvcs4⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1928
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Direct Volume Access
1Indicator Removal
2File Deletion
2Modify Registry
2Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt
Filesize27KB
MD5ce6d1feca2a3778a7a560e82851791f3
SHA1a84e3fa34b7fd6ddaeea5d8e28e563543ce700bc
SHA25651376d0752071530432aa3353fedc687635493fe26423f1e5c9a3837c6ecb8b3
SHA5121d2b6c1945c569dd77ac5c5cdaa34efcaca647fc1861d3a0e6b1e572b27800ae8e37528657618d092dc18b170abcfad9252bd573d9866b7ecb8e79f5ff91c8cb
-
Filesize
635B
MD5d8da199c9f980bf02909177045115612
SHA10c2dc5501617609f079b304838c231c3fc869881
SHA256d112d9a42d9a8b93506e668c0f6cdeca3368a081a7645a7805fb8cdd95dc6fac
SHA5123c99f42d807eba81ec0307c655bc3e8797097c966301206f1601c134d1d5eb680ff69e1a1da3e703add9233c82f85647e8cd75ba92e549ff0fba407b163e46d3
-
Filesize
634B
MD5e382dd6536bd957c2a8720d93aa2cf6f
SHA1ed04d0bc2ca8a0d2621c6a66053b93b202f4d26f
SHA256d05f74b39544acbc69a57175d892b4c06bbee0fd1f6fc75d5fde217d6373bf70
SHA512e304176f83ba04743d630f71c7b5c735199483219f979fb0500725944d68d1d5d1c56e641880f9dff65a93eaf6d0dd3faa9668ba6e153745b990441095214205
-
Filesize
862B
MD50fcbe4d46fe30291a45bbe80dfc53e70
SHA160faa89845b88b8f32bf484438180aad77da4255
SHA256760b869b1b19bfe9b8e0579ab81e48804bd58b9d187b704b390064ee7ec43af5
SHA5126bb72fe46b81d7b1af430aa929e45da11351e0dc63168798484d8542f622bd3ee9a0d9466b008e3371883b735f78ae40d855d0155c337edbc7281c065b2f4039
-
Filesize
743B
MD55ab38fe9485ed169e1df9293a1aa163c
SHA17a451e7d18930c67b78059c43e53e8745a0faacb
SHA256121178316951d0790c7a048dc53a19f691d568c4d683f06c072e4d4035be9d22
SHA5126994b665bd3f0c50127a052f250bb6043cf798906e0bebeb2006d12543dbe3f09522124be4777ed6062c04d360f6fe1b6533f4f6524458fbe5fcc0dcae690907
-
Filesize
239KB
MD5b14f6d0e1c82a608c6d636f6ebddfb94
SHA112cb9ec9753d5800ef05d61ba11942174a5df49d
SHA25621b37440cf5b7bc9419f63a8ede8a3024650178ebcfbaf38343e1c38f61682ad
SHA51268a9e1e8328621ca48b5b07e419c576ba788dce14179ea244cfa137594b9ec01a3cee926edff00385eaf4dae78b3c30aadb1b14a7ca85c15e82a2b5a33b1349b
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\BG_ADOBE.GIF
Filesize24KB
MD523b1c7f12d4e3d40db75fd6e5aaeb500
SHA11d8fed78a992dad288ff9e9d7238705afc92caa4
SHA2561b304b40303033e5a99d678d6711435fea09e5678283659f403903d4d073dbdd
SHA512138b0a1069517519cc514c45d7443c61cca423b0fdafe9cf6e02dc2fbe3477b50d55ee13ddfdb1aae850ff9e9ca99f966e8cbdba8097b2acb83964ce901f155a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\BUTTON.GIF
Filesize706B
MD58a53e329a108f9b1cfeb73e7b84574e1
SHA181ae011167a5149983371c3bf77fe4b3e65348d4
SHA256fb2a522c54d817e4e10749562ef65037777a7e814bfd9f1b17e620561e1675ad
SHA5121c8f336958a52760142d6bfc6497b3a31bf4282cb763b02ffe89ac2ff17e95f68c6cb34e6e14a704ad652a696d085aee64b7b580648c235d8580e537dc5e8f64
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_OFF.GIF
Filesize1017B
MD507d26ebc48adf67d577ed3e4076cbaed
SHA1428bf4d92e73f5e0e4c63022dd7df865c3971f43
SHA256c3110b630854cfa3f9b8f2046d0fb571a12fe7fd5398947b05b60190bef5dbf8
SHA51294a1b1301c23f3c90e0f0100fb408d7a39f4f2cd2290c7f2df6bfab92a1ed4f37838cbfeb21a851fc94e99f5203a1c3c77f5a59b54fc1b52596437819d9479ee
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_ON.GIF
Filesize1KB
MD56eee81226c306b63ab50f2ef62a55899
SHA11086d0bc1ef9c6676370a5d8e94444c6a11620ef
SHA256856acdb78907e12e0ca06728713a66a5f2c29cdd808872fb9e6aaa26050b4a63
SHA512efc7cd2caee26c50dbb3371c09b3ccf77685b0032b20fdb29b2e3339f9fe21455f28e38a20783cfcb8983ae1c2101986e8afc4ad3602027bb69879fded75559b
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Casual.gif
Filesize6KB
MD595b9a2c2ec678f8170186d64f95ca631
SHA1d42df87a4984ad82a99e273554f472087fc8b6e3
SHA2560ec3c33b3c7a820ff53a7dcfa23b4158a25adc5435a7708b00af562b9121c9cb
SHA512df88ede774c8cc3ef6c78acec6c0773701bd19e355d287f14f30741adf2c53bd7fd231cf4b68387a1f79b6b1580dc52cb513595387003efafd944bacc5fd6c26
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Country.gif
Filesize31KB
MD5dd18d23c20ccb318f747ca659bd6771c
SHA19709ecb7af7237ec9079f4de072f22eb6c4e91fc
SHA2562ff886e603c70db15b71ad18cb5bfbf39902b3b33623911cb49667bfc0851cf4
SHA512c72afd0b98ff8bbbb1afb4380ebacc14202aaa88134ba205c290152081864788afd18c41c84f0ec2689f6a80adf606c329eb627665cc18c2b8171377975f434a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif
Filesize5KB
MD5f1be11bc66688b3b3d776e11578ba933
SHA19996233f30a690eb5193b4e7ea75dccbb0cd67f9
SHA25623e2bf479024e3b7e13b439f8a64e523fd80e930b0962f430db113b818a3cf5e
SHA512642d42086c26e1e9c8828b1996ef0acabebef6b7c6cbddcef715ce754dcae7004a759aad2769d4642948053d847030bb08c91d8e7a843e36ea2d560bb5044c66
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_GreenTea.gif
Filesize22KB
MD577d33d915c1ad8a21af41f09c65569c2
SHA140d693a52879d3321bd2cd39efc58375970b420d
SHA256b5276cb8684b8021a1a03b011b949975526833bf800d6a02756712c2d70563d6
SHA512ab10be73c243222025abeea95141abd5c80ba9611001cdcce27325376d5764a37c156864753b947f860341cfc3a226631ce21d49a2a33ea0988e97efce60746d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Groove.gif
Filesize627B
MD5281193e03ddaab5350d60e2d5dde460b
SHA1f12af7da68ae7023bcdc6b7da893112c808e6b0b
SHA256ad5439158db215ae017f6fea51143582514b81aaf31373df229ff90f7a4a53ac
SHA5127d8f7650eb799882dec2e00b255cb8b3999e0682039176c9a6e1158542b8efb32c4484496d5de01b7d1624a9397363dda582348d3e00ccd02ad8442fe4314ce3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_LightSpirit.gif
Filesize8KB
MD5153adb735860ac1dcfba1c6a6c294d48
SHA1476f7f43ff13014c0c9d89b95599ff8b15f0d01e
SHA2568861122670fc28a9fd667e496eeeb5a3e03eb5758e46e14e55f97b82b5a31994
SHA5127ebe0dd08e3d140bcf220af6cd2b9954c39b88754f56adb9d5333253f57a865434080e1769ddd1afe5e714e43ade8c4fb9e34a96be69de53f074bd2a947c0897
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_OliveGreen.gif
Filesize15KB
MD5366207bc784d6a0cd731d6a1e4acb5d1
SHA132f15807313260856c0131f158d46a100327f3bc
SHA2567e3236e0aa06234898c62110a2efd5024ebea7735eadf4fe3cf3bbba94951f83
SHA512855fa55eaf0b38ae8879b45740f23bd559708781c09ae18178d863a0f6c912b5d05eef45702cb54e3149025825e393f20aa2c8a2c7e67f7317772c48be766951
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Premium.gif
Filesize6KB
MD5d846d623a01aa301064221976e2ddbd8
SHA162e21d3aa88ac91674e20a3f64b95f0e13f1a386
SHA256c9c728674c043690601cd256f1f02f410a40171e71311c4b2ac57afb98fea326
SHA5121363bb1c4c89d8bbac12c64c82c277fe370924cf7b2ab9bd122f0d553bfd3a908b9cf4e39be8cd9fcc525a56c8f19bad76000fc15d6b45d2396674d2cf937e0c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_SlateBlue.gif
Filesize20KB
MD566353e9ede6b0c14c0c8bf412ff495d0
SHA18008337df41d692ecf9db9b927ab5e9f0aeb241d
SHA2563d1cfcd775e5b15753067fbee7f42a80dc140fd0a23b722fa94a41044db7c5e4
SHA5129109c45954c77fdfba4b464fdf599e0f40beada96171f0c9953460c7c10ddf63dbd59389fc88e4df07b922db8362ef8dd208e3112275c00c5abd55fea51eb91f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif
Filesize6KB
MD517db973866a47b3d81985571e74a8632
SHA1151822a7fb82e49fdd0d1dc6d100388fb25fae10
SHA25617d28e59702e44fe9bc10dbbc2624345e40f55af504a762eb24c315d150b9a81
SHA5124bcea5219d861cca6dd07d1839c6d045935c266e35d6a3e249ecc80b7f5e8f85098a18f046bef665720bc2452066f4bb138065409d9535ffc663b7ec3001533a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_VelvetRose.gif
Filesize15KB
MD575db844c01714d6c84ad56a4140c97f5
SHA1f519500dad4c718b7db417276de94232c92980b4
SHA256a9bd4f913a854d405fe7f368f2eac1a96a4e97aeb24646446e1e3650d875b714
SHA512cbe4f4f423f5eda0fd9d934dc418b73754d4ce810e70c2650d6f34480a46dfef5e9bd1c7a122b5c39d9ab3c000bbf7d2cd774f62ade5d88b8c7e501d4ec27b8d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrow.jpg
Filesize3KB
MD5dfd3b834572ab4ac00abe5de336d33f3
SHA15ee60de3527c9aac70f98de2075ae81ed6c01130
SHA25677f78508f059162b19998889e4c26180354954dd353a91fe0d3dad1a9b869076
SHA5128a0560f736ec81f54b104b15bba0d46a2b90192677a2f495874f0fafcbb72aa1939f2ddb9b1c4b1c11989f37d84707d8d55259294da971e3c96619890fa32165
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp
Filesize2KB
MD5bf55c2e2cd53b9c0fd07cf88b369ec1e
SHA179793b1d82027a59582afa866d2cb405a6acf565
SHA256cda19620f9439c5426f9251679fc4e780be16e6d2478ef958ad955acff867b8c
SHA5122999c8e1e8b6386d5e9f3e31beaa7956cb5c49e9681fbeae3329abda608bb05b3d410e604b0f165f2e3d12b9d53ccee8dfe1fe01e459a6b7e4008b1574c616e4
-
Filesize
839B
MD5f6f25154f74888f005c726251adb0d17
SHA104db34f2086137342e17484806baffee85e7ed07
SHA256f989c295083ab199700e4c8459f09677d2072799ce63939b514a9c111c23d816
SHA51246d13b74de74b95e51380b4e40a1ec5fa61fa6a90af67bd892e64550dab57738cbb222064bebc8201f6ce3965634d7dc09f0c0e841f9a32647b2a953f6d222b8
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormToolImages.jpg
Filesize7KB
MD5e6ad928dae5acef8c70a8a76002b7703
SHA14814b633e1f064d26cacf41a68a4420fa5d56381
SHA256136b5008fa67153332ffb07a8af2b134f9654ad4340b6e0af0fc4a370e37ff4c
SHA5127bda06252026bb04ff7f04297f3d3d0eedbe8c21709969fbc08a55efb06cc39a62adc50056c5730aa8d216b0ac24f022d3ab8d1041b66994a2f5445171861e74
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\HEADER.GIF
Filesize776B
MD51d60c751b4dcfee483247b6ffab00d7e
SHA140d1dae9c395dcbd837c4e44dafabdce3ce42ff2
SHA256d310cb317d4b734d3a67cfde0ca33dabf5887165a25a370c7970ae730932bf7b
SHA512d323c1ed5904a45cea89a9bc778608874995a7081a1b9320a890e3821434c77a6bcad6b350b23877d000f0e14bdba476ad0df565e6442f14de3e1efda4a0f840
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\background.gif
Filesize844B
MD5ad87fce6bb5cbfd29eea975e987a83bf
SHA15148aeea9dbbd09df268881af71bcb173dc1d6f9
SHA256b90828043353e3e41fc293a4f3570f3b7173e0b2e8fd6794a93c29350b5b08f7
SHA5122844513c1812b5bda0d97dcfa4744b452beda349ed67c51b4e83dc8faff8d668cdb4802e68893c6a6b98f3683767e8b78de85118b9f1a03ab0a0f5bb26ed777c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\HEADER.GIF
Filesize888B
MD5f5d700ba3f194ae906c863665e1fe6e0
SHA118540c14f3cec3fc2bea697acd6a512653331a13
SHA25636c7e0b027487edd37b697f299cd933863b632d9f37af4c324db49b185a1a340
SHA512da6b81c4ac4420961ee0c2f2aad9ae70abe06e064eb83074f7b3bc3c460eebd367314dde5092a28dba72eb5cdfe008f72b2f0a37bbb3d45ce25ff2836f8f9e03
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\HEADER.GIF
Filesize669B
MD56b3614dd435696a97f5f08210c5e868d
SHA1ad47354e2d5d9a434e0c5e27c1854c941194ef17
SHA256034b333203b3cd132a2ac8ad286511718ee93e6f6b78c26bec1cc7537af142f5
SHA512461968c95a69d1e70ef7974a305421e09b7dd9ff286f4653bf9c7d59d3c41ba2a8e8463074c2e6d1d0dcff37834b8408962420b8e396af1e884c2fbab56c7c03
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\HEADER.GIF
Filesize961B
MD51f7a3786c07b14d91c9e3bcf4371c84a
SHA13a9fc339a63a40ba04b17475496bf3cc9f3f9005
SHA25688b2fc1206e97ae3486aa771097a17cc0c5372f6d2c33282e802ff9541bb485e
SHA51218631bad571a70fd81e8201451060c8f4a8f3c67c4ecf482f4c75e91b551a9745e3504eb733134fc7971ff2fa40bb4a055c20809124e9fba9dff5a7e074a962d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_OFF.GIF
Filesize983B
MD563ebb418241facf7841c81767d089952
SHA101af41ddd68fd3d3fa89aa0348ae1999e474e008
SHA256ecb5802821b93662ebc63db183cb00ecf7106e99498b05481cea501cf6d7e314
SHA512705f728b74894e1777e461963e9e00a3601d85d5f21e3e35599731bfb7592398792fc00aafd4a2355b33a773c2f9e190af786a490d142f5203f76462ad315a38
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_ON.GIF
Filesize788B
MD59063d74b176cfac5c83779a5181091f8
SHA183ccb8b08d29c7f2d9edc1bdf82b085855819b26
SHA256053382f489c0a1fae0c8d688e3a7b21c3bd479001ef2901f50afa4134d25ccf2
SHA51239c3ea22bf605e11a69da18a170ef039f1ead822d085f9cd83bc415ea43b725c511b13080416d1aca58e15eb0595e503d14c447323627dec5e11030f7df17d66
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\HEADER.GIF
Filesize2KB
MD59fa10a80f69da61ebb23174481bd61f5
SHA10e37d02d814ea153b510be4a57b18cb1a0d2a09b
SHA256fe1e1164c93ff0528158373503a81b8b8716b9f4f78b066de142d14ff5d5d07b
SHA512b89ecd8a531fd7a71c51329ab16149c68e6655fa14080583c626df9e5484a5bb7e35593aa8e74b8d69b96f3ba7e2972b1e44b0ea40bd698585227f8f599751e9
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF
Filesize3KB
MD58df706ab9cf907394b520061d5d3d081
SHA10c6eb773307b92a8db6f81f5c39472f1e2d1ac79
SHA2562754f32ce6e7b847bb156eedf6d0d902939df6e975d3945133e704a85db5fb9f
SHA5121775be4f2e9b571ed65e169959fe6dc2222431c231995ee3913322b17643ebe6064b34e7ce87140093fd26d2307d295b52a8f2794f3fdaf147cc891cfcc0f89c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_OFF.GIF
Filesize983B
MD50769180ff2f586fe421abaf6635efdc2
SHA1dcedb421a7a083e57d510889bb94a751aa1486ea
SHA2564ccfa3924159d4fd20feca00c518f538e0c23d3f8dd5f50726faa58d7a71f2a5
SHA512036dfcb80080f27290d97476380892f8072a1dfe092df14a8d43441d786f36d0c1bb9a05f88cbe0465f42c07d32772d38c29d7b5a7507982a20eccb1fb9b2591
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_ON.GIF
Filesize785B
MD59b4eb29d2fff90e87bc43f6b383bf5d2
SHA15894a477a4266078de0a5f27af56593340e7f0c9
SHA2569716cf3615db8142b898bb89319cc9b395e5c318a53465dc2fa759e2bb9bc50f
SHA51255e4f2bec006d4308dd3baa0936685e7e34c423dfd912707eac823c3ebeda619fa7681f14e82668a78a65b4efc7298a328d0fbefae95204cd5e071553d2983f0
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif
Filesize754B
MD5fdb74116f161cf37cb5693ccffd3862a
SHA1b8138ebf12af86ce65345c98bc289299bc301236
SHA2569daefb1dc2fbded2b6a4036897aff0cc094d0cab616716f749e0f828b981d5dd
SHA5125288098ff8e6e3b66f3adc1cb78c3f9ae0467532619caa2c070962caae14f00514df161c088044086f83329cfd56488c739dc47069e11435a63588aa1f0b2bfc
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF
Filesize885B
MD581fd5c1ffdedd16f7588e8b0558f482e
SHA1e80b26e54c40e538e66fe9bb1f6bc7094be897a7
SHA256f52fe9bbef17cad28bf08592a34e0ec98e89b6f1b47a7ed5f28291e4341d874b
SHA512ebe3070518c1c5e0743ba02db82c31cd2615c52ef42e3ccb565227281b1c2c0eee6ff2ebf5555e196e7ef02ca372df24835b0a056eb63a7e2cd791716412cce1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_ON.GIF
Filesize885B
MD5b730e36b6e9eb738f6bb3b2b64c75e5f
SHA101487ccf7b97fd30e9d29db1b6be6b68a557f7ed
SHA256fb5d8ee8aea95b0d97981f5202f1fd0d57134a29717a81f8bd594069464111d2
SHA512ebaaab3b9db2ae1813f3dbe46b3f7517e4f196d59a63a476d0e162bd071b7452928c0223c51294a30a033d3c9635d7d6f8edea5e3042739d20fa128cae40eea3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\background.gif
Filesize7KB
MD555c03fafa868f5c1b5952e1bb647f6f6
SHA131971a3c2509e587bf05c19980d792ca0f5efa06
SHA25645f98c4c7a05e9a2c4df8699dfd1df1e0fe801b46d98027e41c5cd9b5bd55cb7
SHA512edfc64d69679ae17253380dfa4e2d86c8481ede8e9bba10ba42be7819e912513482404d572929a0571f507fd9dc4b5aac3127f878ad636985348c2d9a84b7000
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\BUTTON.GIF
Filesize949B
MD569ff8d6c108c9b41cbb63096e6a44a4e
SHA183b454ef2a83c0719ebb16fc04157e4842f0ca0d
SHA25699c0c136738321f67de52be11ac2a4295a4e5a40e9579fe2c9241c460d0ebb71
SHA512a17483f96311adae4545a59127697272184c37bfa9263c21ec955b19d287215a4dc60652394ec20e0619ca24049d564bca5d39cc3d032fb4f82cf4388919cbb2
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF
Filesize26KB
MD5f639f26aa53bb769504247b6a2007b06
SHA1920c3ba041545cebd203c3b120665b8377c4538a
SHA256316b6b61ac028ff7511a833f46aee53e2e76fbe7d95a10db6a95faa4439340d4
SHA5127c651010278fe12980a33c489bf3de13c7f9f730fc805db087b7a96c7bbc4bb8e528eb647138e0e2f6bd6a3ebdadd50534591db6cc525bd83900b8273a5b56ca
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\background.gif
Filesize1KB
MD571e522d5b7b74315deac751ac1ae2562
SHA1c5beff0dd4fe4a40c04a68bdc1366704295a7986
SHA25646e6582d23ac684d627cf599692cba3334369e421f71e1291d9c533c0ef28ccd
SHA5127414146773192458d9ea49962b3f7ef10d69e15943bf599037d42a73b06a3b9e166909ee761d366bde6ab6a03c10e3649378fd14cb45955cb7595f1d5da64d09
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\RTF_BOLD.GIF
Filesize1KB
MD5e4f2a1b00d03249902a02eec7e856d66
SHA13563b9bde9d4444839699b6155c9f0f8855d3d80
SHA2567c75d6c7118d8f7a2552827f591710168779317093eec1e5b04210b80c15e26a
SHA5128e2171a27d431e2ee6c0987a99e4c245fe9ff3dbf31476cb24f9f7e8a9d2b266e9cbcd0eddb940e0b0b82606597fad503418a0f08d7e3bf2c9b8e12c2ba0925e
-
Filesize
839B
MD520d77c0d89b062df24b79dc153b60aa4
SHA132e241c205a4052fed493cedcbd53487398a7a45
SHA25602b15909bf2793e5803cf66c0cf812809b873e8a35a3b085ef586f31acc41065
SHA51229fccfc7f6713172aca37b3f6912299122d4cb6cf9c375a8f7956b392d257bde43ff69e1df5e308e2e4f3af34d9afc731b55dead96c78f1cc581633d0cbcd591
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ViewHeaderPreview.jpg
Filesize3KB
MD5190cee3232ee31ec6877f49186b804de
SHA149f36bcb3fa1506df7dfae8716a24563d2f817bf
SHA2567a0f3086896c2ba65b4a5bc99e5a9e9854ab3cd98c5c2fd8f5928dbccfac481e
SHA512cf41a95a9b8b2acd23dafaae961a52b59c2a51757e9d16df90f7340ba95846d38e48d4e4005f86d7553fd870b3a4e9eaf7ba2a75910aae17e2dacd90209a29a1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\attention.gif
Filesize3KB
MD5f102af025efc9723ce4e86bb63b9e719
SHA140326fd6f7e340abf81b7b8af3959476470d9db5
SHA256a00ea969160776d389fb78a3b35dbf297c883f638b8c502403e826fdb704422d
SHA51202134c39dd95444f5671706cd039559ae475b4bd4821a6d5feb8acef1e7176fffd173f6d4af235658e29d1d167c108f03b390ba9f9035ad0e5b2fb1af4b4a683
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageBlank.gif
Filesize20KB
MD5d5457bcb2318b451cb422c50d5a0219b
SHA11a709983c6a3b132bb204196b7d32d58e4824fb7
SHA256fff13dda4947330d8274162bfffb8f447852aa20482d12d4663b36f3fd495e0f
SHA512c154525e0d40d7b383d2c6a6e2dcd77c2375fdd64422ae88ee1a255b1d1c9509d8247200697a1809db0c62cd67104721881209fdb45c401ab299bae3c4002650
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_choosefont.gif
Filesize1KB
MD59c48279c6806257fb9588f532daa4ddc
SHA10b68cd2d7dcfaa0a14536aadc6699b9e38dd26ce
SHA25643d2c69763ecde67d6d571dd1026a1a15dc60ff186df32751b5e68a34001df18
SHA51262aafcbdd26a31822442066d1f5151bff0a31b700ce9339f55947409188db866653ea11cc4c78b31f969d61465d2cb41cc369ca4f70c390516bfa730b36455a1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_italic.gif
Filesize1KB
MD5c949471e7c8492c03b3df47ac01b76e8
SHA16e478077a9ab7ba3f2228c9128854cd0b2445618
SHA2567492b8e96ec971cd6aeef79840aaad1dfbd83af28cb2d1a1bbb4c02bc4fbbf40
SHA512dbc8cf340d478630d8fdb8ef1fd76b993c38b877ca468bc80a6da93774457cf5d8fe263146f2b8c78e253c6e380831405e4153f81851cdff9d4dfe3f9e5a2742
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif
Filesize1KB
MD56680838cd59fab86f16ca6548dad80d8
SHA1824d1c46b8145425a122af7b66fdbd342e8777f1
SHA256cf97d1a60ecb164ad159de307138a1d2b84370c7c5c843422f51fb3c7844e9a2
SHA512b15d9a8bb12d7729d3ecf3c59f600e820f74166c8181845da56393ae013b10c78b6990e0ed7fd61d6e3011cfbc58a0e1ad4d561334b215b091a197684959bbd9
-
Filesize
1KB
MD55cac910989719a408cb931a149967114
SHA19f1d7c9ab16917c35a3f4b772f934a39d5b5d86b
SHA256ee55cbd06be56b94f87eadd31edac0785b292ecf285176657f7f628af2b613c0
SHA5127f4d22c6b2ce37d9757c966a1b8b57e6e2cf754a64543d18e56063fdc00c2b91ebbf2479af5523e11e604e439cb63bcfc665c9b9db5754475633fff13bb7518b
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\CALENDAR.GIF
Filesize1KB
MD535a34445c7512761dc40d86d84a919d5
SHA1fd35c13db610a2580a288e30e72fb607d6ec6e6a
SHA256983e18ab237df61d50eb46d994f0299fcc07d4736b5049c3b78f0112e77d6df0
SHA51218ca61f0d660997a8fd60d70d0d08f75af4536211e8a48d7564e48dbaca86a79bdc1bbef634b6fe3c6fb43ac342ea93933caa9d6148c1f4e4dd235f7536d0a93
-
Filesize
1KB
MD53a466acec451cceaded6aa8e99be38af
SHA17f20d1a642055104d35ca413264fd7d2f79f1c08
SHA25697dff60ce08a433d2530a31c09a7571a8d6c11f316ede5f404514c74f6c36b7d
SHA51236ddd72877304d7753ccaa0deacbe055707645732a4fb14dd83963f752ec78c050eace7123cb9b0145fc2d0821ec5378dd96b684c2802023033a97099284146a
-
Filesize
1KB
MD51bcc0fb6f751d0aa2b04a13dfa9e07db
SHA10885daf98e71a1a81971acdcf25ed5e63ce02348
SHA2564a7853b3d75b82f360bbb007a6b01cff4ed8b5248018566061ba8068f8f409af
SHA5125a8e4ae146c3493ebe86c485b241be01e736ae8987096becc3c3f81740123314f50c26d605908ecd659ae4e5b054ca7f09ef946ba3fd3271dac3141e44fc4c4c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIcons.jpg
Filesize5KB
MD594fe54a83af3e1b5ca81cab6c1608e2b
SHA1880e47b9f2d56f607e4f59765b67816fef893597
SHA25637ce0a692f884bfa055e81d01474af74be8a99f732d8988f609b03db3b1de933
SHA512c625da71dff7e774e8516a03fb02e814759554abeb2b8f56192a79f643b84e982445917ecc11415d87d1e5ccbce900a96ce03582a17d4062c4d8143d5b3cca72
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp
Filesize2KB
MD555a28e145c11d5024dab7f5e2fba7112
SHA1270cc346b9eca41ab0a12c9b342ea9c19f140367
SHA2564a3c36ca125fc43dbe516c0e711061784a3681b1e0dfb1c611f0f40adbc6b75f
SHA512f7e6967a117ca31f7f91606e597087d05f9828b098dbc2f6135e257bf1634d3a69270229973c5fafb8e798c9e96a224352dc3cc4652e5daf5311fe5f135c8450
-
Filesize
1KB
MD54c09e18e06e97077676fc80eb92ae8cb
SHA1a9649ef1d1995985d5606b004e5922d94f4caf4e
SHA256072a8ca3f89e67bd7ea3c92616f5c65e34bdc5fb581b732d37e591c9ebb747f4
SHA512c9651d4005692c4f7c135d295e56f5d38e718c885b839d5a891d3e2c2e45e9c5e82499997af7ce3537dab735c40ce8d6c0da582c28dea36a9d76b4e6d7a808f3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignleft.gif
Filesize1KB
MD5ee42f283adaa70cc474acfc87f231e51
SHA18fab046110206cd5893b1dec58f8ed93f46cc15b
SHA256dfc464288293b3026824c9a6f35eedda1f9a8e752c572242d8037a3f5bf2279f
SHA5125190b33eab2951b6b69e9c3f04a7ff42a04ced9a3c22978a65875275c7e80c9037ed2ba878d6ddf21c9b4df675215bb442841d8d85baeff21dcf8f486aebe421
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignright.gif
Filesize1KB
MD584072c2cff4cb9999e3e45534d7a88ea
SHA1982d753d18b61c6d109eb0cce0008fc06bb9814a
SHA2563d9874d1ec312b1f9306e557aa5daac58f086111e88778c19abeeba64b8dbd50
SHA512b0446d37324a0a277526cd265a38b0c655ffc8752f690f9adb80229a1db90079089add5da7687402dfe9bd31714dcb572b0b0d549140ffd34071797bdd7f28f3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_bullets.gif
Filesize1KB
MD566112418d57368b9d773b4c919f65055
SHA1dbe15421db2b5028aeb2b10a6161cca19d72e301
SHA25663e2e81016471498d9367fb83799fe50c6ab85ff4d60dfa07549322a8fdc48df
SHA512c546337a542c0a334589157638a353b46fa8fdb49833b2cffe8416ffc3b5e2d51ab05e9770a9497834bc2c230227c14240fe4b254518988704d692d1c0539620
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_center.gif
Filesize1KB
MD581cb9de74da279d861571f6b63b78f45
SHA113351720fa659c247658de57ab9115bb5b777200
SHA256a724f5ad314b64cf41a5ab01efcd54953f45204d9d25a652974be9606a8354e0
SHA512a8981768f43ddca9fb4d38018834e9df1b50167e2e2a361d7c2f78350af9c6d7201a74a66de2b2b9afdd7c1625923d2b902b4786d6bcf408efb59ef94c3b9c53
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif
Filesize1KB
MD5cd38919b09d140c9484601497177bf8c
SHA145a79e7b16dd36c4071414c34d0e5f446413c842
SHA256bae011766d86ac09b34738a029a2174ce9153dec26dd7689cefeba02de579e31
SHA51251212407de35b9f67a772bed8a14dffae03b390c6e8f7f2a917dec664e7546b80a2a9f6c3b90260e21fc0167ab9091ec3cbfe18ebd51b09ae3f5a767fe3a6b0a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_increaseindent.gif
Filesize1KB
MD5c3fb1493699892fe60e2bb73cf16d1da
SHA12af7d3104d4998b03be32dfc2afbc37784f04021
SHA256af48986defd3f739433e08bfe4b6f890e31362177ee0e0cd33b6c7a1e3bcb853
SHA512f17cbfaab79c2277b4e3f5fcf385bfb76875edead555ff322057aca0e83ff6b16ecca125f1c3c89400e1e489f8ed2b11f724d43f31d63e9bb0da72c6f26f3d80
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_justify.gif
Filesize1KB
MD5241918176723bd191ef57ba988db7146
SHA150a708a38ece4e086bffc2839ae95213330b8e39
SHA2566878a6ff77554913c796c0dbfb1aca7c11fea8141c79d7f531bf4f8d85f869c3
SHA5129aea0dee42ec065d0b2c90592aa75b3f31f69c6c49dc0187fceb2d84b0829d4f8fa103de743328091740366847ca65e351b538d79986deb51b085590a4e25312
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_pressed.gif
Filesize1KB
MD5f59a69d9fec5f85afcfd22aaef3568f5
SHA1f2be1a351eb7b78366e3be6ded349c1205cfd762
SHA256bdb7ef620358f7012503bea53386cde45424c0014d715e431ba5c9b9392939a3
SHA51292782d66ca6b5d94156bc6396071f03a3ee9f2f89bf30e6a56f2024a72296aea185f827bc8aa2cb00366f71fb80933bc7703541b7c79bf26afac4091f9e22bac
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\Microsoft.Office.InfoPath.xml
Filesize247KB
MD5a1905a2c83a6a20368bef4efcd1449aa
SHA1ca6c6649d17c7ac25f4a2ea41108419595b4f844
SHA256dde85b997c0f6a6bc7732f5bf46c88094e9615034ac0f9a562b198a2c39f2e67
SHA512b6124344e5e9a22e5353618c3f1b8ff8b5cd2a8108129e13cae6792be710325a86a624317847c96afd41b90517bded543ae70fa6ce1778a913a0ce372220cf41
-
Filesize
1KB
MD569c2d5cbecc8bc5b03c677deaa3d6525
SHA1ebb36c8f28cd9cdbf0e237d40c1a7ab05c6cfe01
SHA256c768ff467cffc7ee90ec88e75e8e59581e5c3e30fc0b05e011036fdee7d34111
SHA5129b2522bd090a069710c8c8ba166d97ef7ec30a1dd60965b30d2405299e126847d3fec36250257abd92579838db4c81b489166c2ba4a02b677ff4b7eb9d723a2c
-
Filesize
1KB
MD55316265673a28a08b17a6477e0b8309c
SHA118e7cf04fa36dc4c03f8755f39049d52a433fbc5
SHA256f8e448444e2fbc68d8467f2671625771dc68e6247665b7f5fa2c02be195ef9c9
SHA512f9e813f722ade3ddc1811dd65461eeb1084e3a0b1f5d4e4bbcce377c46898db97564abc58d72a8491e1db2d64bdac83309e93d0663abeacee705161a5fd49431
-
Filesize
6KB
MD52691d7a03ee452ffcfaf02329f37b766
SHA18395594ccbc5e235845082348cdc03a70fea0685
SHA2561d01e2d80e36f808faacc849f22d6e8b2ee1dda301643778e07cef1b62b0e0f5
SHA512b52bec5348a001e4b7f0a7d46161c3734f78bb99c3daf6c8561857575bea32b7ca0749aaf18b9740806f2f93225ec0d229f4b136578f3738e0be07fd5d4801a4
-
Filesize
674B
MD5c729193aac1cd0bbe5591694c04bb97f
SHA165f47a68aaa63a5baee2939ff09e35bea19ed7a2
SHA256afbee82e6a93f8eb6144ad245f8622b28d894a131d8b1a962e4916229d2e1fc9
SHA512046c4e4e68a4956aa2444667a8f34c47a545f9db5132e3731564a716abb178c6d95cde81b8c6a877ccaead1b0d93afd86a542353a0db80ad83bd2c59f663cfa0
-
Filesize
548B
MD511156b926585c63b5867198315508d1f
SHA149a5cbd22fd49d03d3d5aea9382a12bf148158e2
SHA256d918ae0d2533ce98c38efe2ec5e56f828b4571407aa54ca5caf56c08a62d1d4f
SHA51257dfc361ae370259d496350ce136ae1dc461a0987be0f6af6c03316ba71b243f8ea6ef84b717551123fab5b6901f7884935e64eb8e8c421f1c5a37f5e59f4ab0
-
Filesize
548B
MD53c3a7c7cc1e9708462f928d63406ac70
SHA163bf95f0bd7038a5b44eb752f5781cf788210c60
SHA256192fec5e3056e5f3abd548509d178dc77f325a990b456d45c4b76e015ec8fb87
SHA512c1b3246aa57d8d351ac8db579d7011a16967c17781d4090e3a73514221692bac7c0148fbf42b97318152045153f307f700a6dae0beed9e5077bcf2faeb062eb1
-
Filesize
548B
MD501758013aa865dcbf71551467ac24464
SHA1ae005ddd7c228b39a0183a851cdaa4af371b0c55
SHA25676785ca67627775c93c271048a867ef50359dd8798d71bf6e186680fbb19dd00
SHA5126f2829d6056997e8e35d6d8fdceb9a755c76eb5a4606bdcded44ea8f7406add538f366a4002aa63322dad8db3da7a153539f9cbd87e59aee31fcc33446ac0e5d
-
Filesize
548B
MD533251d40a8bf4b3cc7142052fd1330d2
SHA1992d61038c4c9d43bc82af85ab516984b8d69851
SHA256198722178cb2f6f263dd1efa020d558c97e26cf623ff28071f350e327ea608c9
SHA51221249c623f2c4fd1da1203e26f6d05338bd80a9895a6df804d619915fc635d8ff5bead2890ce51815378772f0fcd37af8658c71847c7c9c09a32d4095a877e3b
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD51b0460b3b61310b8ac5e244e58491bb8
SHA1ed615295ea7362bbc500fa07d57bda0e80e4c87f
SHA256cdf49c451b93efc6c6b6fece77360f9578d10969fd82194e3232b95868ee236a
SHA512f7452356f56ce3d0d9937b52e831fe28a56864b10fb1644e5b88ea0b052efd4d4bdda990f036b205e192322cff97ab56ea4b84e7ecc8bd55e19016a512ee72b8
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize9KB
MD5a033fc6ce22d78447f0d148fb40853a4
SHA128e3a865d312df1b8cfab27a61bf5f1c7b95b103
SHA25683fbf0a8edf0e8c9fb389165bbbc34f91ef6846a5b2ca8bf49b83f1592e6a90b
SHA512a05abc656793e3b2145ae8e95aefd0b3b1caabe2b3d9758af3797014e7801da1f549b7d039ca0fb13ee64f1447158f21e856c606fd33ddba0ca34364d1edc41d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf
Filesize578B
MD5ca4cf6acf18f895af374f7cb6b651a21
SHA1e3193cded209657a7f2e57ee4324a08e49df9908
SHA256fe7778acdb3edc776b16c28aaf1ad70014de04b5e4803a5c087c50e3b824522d
SHA5123bb1ff40d92621438793ac077524d83b300c0234b5c96094afdbd8e1633fd45cb361a0b1efdd3d160451bb766b031ea96aa28de00e5d88083a806ef46e913309
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt
Filesize11KB
MD595d02bc21df652bdcad3db8eada00a8f
SHA1d3a1857163e520d6335b0b29ac756d2ecaa50f7d
SHA2562c25f879aba0f477a96bcb98b9ab0ab2dee0d51ec6b3b2e4d174fc2e10f675d6
SHA512115496a3c4bc19030f58a0e3e97612e87bbafa51118452a0672935db60d8a774f6aa283886ea9ce3cb49b1ce44291cc13de297536114a1571ab53cc13e44f99c
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA
Filesize8KB
MD592d8aab521d1b5e77c1389db0b36f880
SHA1b6ef8486f7749cb8f8b146791b742b4bb37d14f3
SHA2569cdbfe7cff65a48e190ca243ccc02db348d28846b49f61e77bc1cd6cfdbe9dab
SHA51231e3e92ddf515827f6939cf5d6d3cf42ed529209b1c8f91cf76b03873579d12a4cbaa32e0e64b4a91501effa459b448e73237f033366c0088bb609e5483b21fd
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA
Filesize8KB
MD59a0b162dd96eb902470143cb31917ad1
SHA1ba350f5824d81002f76398bc95d0b782b05dee0f
SHA2567e5c38de3c8b444a88293118d353cd52a8df46c2493db76a4a801914034f035f
SHA5122be91d6ad3550202b7983351a1d555bb6c292a45ae463ddccd1d460abca6ca47876f6855b00c3a591d7c3da28e79611313a7c804dc8ab5939c338585222027ae
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\MANIFEST.MF
Filesize654B
MD5ffd5e672c3d588e62142a6529959585b
SHA133b3d8fa78c5f5586738e2133394ba27e32181fb
SHA256b7a03921a1551667f18b6514242ed6ba090cf37075dedec65fe55423a5a94ef1
SHA512b44ca2a3192e075f1be5dd428f288d6a7575b62cdbc19a3167ef3bad2b78e2d58d7f86a3f1705f499f56e604bb6072758c2e319f50c30e8e3db8aa84dfa77548
-
Filesize
3KB
MD53ed298a18f54b1ba76dd4228cb741d42
SHA13254f88f71050ddc4b6b7b938b89c0a25eca30b6
SHA25682b3cd4546ca48c7549f5493a49ba5b929a4a95e9ed127828f695bd397614ffc
SHA512a5e0c84bb8e8709b5cb346b24edcf6b39155e1c64ea69eaf6e5eabc2ccdf9f6f6e893d65b6302bd8e2132a97026b959677964c95e1cbc0e44e8cd4d556f6d377
-
Filesize
562B
MD503e5321872fe8208f70e08f4eb89c83e
SHA1951cc5b79ff9629ef5056652a7f42449e65c3459
SHA256cc8f9b38c12bbe0435bd4dfe3daff679afa7614474a8350a6c9b6fb7dd23c2f5
SHA512a42fb279acd5c7c264809c3955fa3614575c698fcfa330d55e00b256b4678b5e693b94db2460cab0ac0451d63ab1ce13902da37ea21744b4204deea84f7923c3
-
Filesize
109KB
MD542e365b4d83af60748ef72f8afaacf46
SHA1771d1324268f74e6e1b077eedafbf8f751e91655
SHA2567358b9a31459b8c3ced0172f86e54de72b77207f96f99ffde47cfd8990f161d3
SHA512b8da2793b678e0d12c4426b48e7b238d42eb46995ad814f9c98e1e757355f7485f041bb673a796e0de97c08cc47948f5d42eef52a998d28e3316bc1e154755c7
-
Filesize
173KB
MD5806842f7dbd2f22cbb3eb23df1295496
SHA13cba04c69ee19b185cf159b9e00c09863c96dee5
SHA25611c098654c5207feaf00b1a31f8301197ae6e156caef6a5ecd02f54dbe5e1713
SHA51250c8f6ef64c346c517af2186f7ff5a5c46b2ca428b2ff54f8246a38c8453ff8b5c4ce13a5451c658ea21f98e8cb8a2e6081450c3d50d9249f4cd6bb1897f405d
-
Filesize
4KB
MD580afd4253ec97984a1239614b1021f09
SHA1d93fb4a3dc074cec5f11cb22ee5377b8f9d53225
SHA256ee3360be6ab4b330703294f860c6733ea3396f1d58474a67fb0f472bc1cbeaf1
SHA51233bdca1a936848156174074a5995e25cff4c48142cdffdb458d69c4affb0d39725d0c03614ab069263c55ce08508b7477f13f11b54f70925ba896efa65fbda97
-
Filesize
548B
MD504f42eaa17bed4472f0c4c9a4611ddaf
SHA1e235d98e4a4f4c877eb21cbad06a094e68eac297
SHA256499a02f6b687892ea280129a1cde191d7e303c57742b2afbe2a659912ded3576
SHA5121d17529d1a73c577025d0fabe04fdf96c0a5e0f6c89a175739547c377d151b42a6760e272c60222b4f01e33644c475369d41aed6b9aa38934927dab4311cb07e
-
Filesize
1KB
MD582cd1939418aa648beeaeee704e6701c
SHA120faff7f00930b0ec91d925047cc2f7d06157112
SHA25662a10aeb51caf82f4e5f9479ee7a2819e1144f6c0984dc4d23781d91b1a59a1b
SHA5129233045550006298d7ac20093f8e809b0e17f9e1ba7c7ed73fd1cf8dc0e4e24233e6faf2195660f326ae478fc942125c58cc8d5dd97ad225d7ac6aef9b261c2a
-
Filesize
548B
MD56a53d81b844146e0bb0944f8bfbd9c6c
SHA1ade1399c8a35e8c70fc671449000eae5dee1e7ec
SHA25672f60e91a5d5a222d0801a614496eaf90859b6b2cc6f78f87aac0a88182c10ef
SHA51251440fcfa9a4f47ac78e51163dc9b0ff130be5c642771534181f386e175ffa1d6696bfd8818db3d3e5804d3513688d13cd5fcfbdcf80d8c4541726b81dbf5e22
-
Filesize
548B
MD56573aa4b5b8502a20d5a73c32cc99ff6
SHA15d96b83a60d12a64b546ddb9058aed05fd2ab39f
SHA25689968e2e2351dd052ea2daeff85ce6148e5375177c326e1e2d92217d4fc8703f
SHA5123e607f870e94b01b53ed85fbecd731c0e3115cba4741979accedb5080d8283f1400b06b9c8286543e734bc78d4d77b44402c3698255f84f0f2f666d384c9aae8
-
Filesize
548B
MD52e11d5f7c2f7836e9a24cd9d7728b4d7
SHA1fa31b361255e41ebafc0f8c6df559d9b2bb6854e
SHA2569ae520be350d4f5b82ffc7aad8d4c5719ea98a589278f9ed519dace746fe912a
SHA512b26142b9b44675ae9bca7529839b0f55ea2ce605f3864d2d423a1eac5a73c7444a3805bff7e764ceade8cc11e5d500eb912098bd70201284fcb85846a07d13e3
-
Filesize
548B
MD50069fb18ed9eab349d129f7dee659a2e
SHA1b70fd1409ab4eceaf8b0d521baf3187a0c784a84
SHA256c85908ce56608561e07b16c64f7a0a58cfbf07a4e665a427dd6990e46d266341
SHA512968d814fb67efbbe04e71f0677ff6bdc5d32192d29cb6f0ddceb5e676b2b0a0cd150dc982d26c99cf2b4e6307321e3725096ffeaa40dadb069d21e8342fdcdaa
-
Filesize
548B
MD50dd969fb386d280dc11b0e25feb220d5
SHA14912aed64dc02df65addd80cd94fffff713d923d
SHA2563bf874d82494cc1016527205257ee984198af45b5cc66a51fc1fd2e38bca52cc
SHA51224f31e2d3f610942230de0f2ba590779b94d23ef336df06afc1b38dae7b12593ac0b3e4c59b303847d958b7fcf4e99099627d74dbc6e64c6bc00c9973a6890c8
-
Filesize
548B
MD5d281df70eedbe1168bbed926b9015b09
SHA19be46bcdca982e5f6458e0e63fd9ada7910f71f9
SHA256fcd76c32ab4fc1b89db0183b578eef43262ef0b2f783b784813a344a7699c5d6
SHA512fc4fe00153da3c94006b2d3eb3da9ae9e6d398e4ff1d9062914a8971da2d8b0efb3b059e14544e46ecb752680ad06473a0efc83b9958b1277873cb1f41d51055
-
Filesize
584KB
MD5f69ee83b909483c75adfdb3c1357aad2
SHA14604684d6fcab4a722efcedf09abaa13419050d9
SHA256d8e22a1c64f64c88851ac7691661930112cbf428a76fc4573b986444aa4708ae
SHA512b2a4f0fd108d7cb98542daeb09827acfc7b82587c058a82af6a57d9366e369adb653ddd3937abee8d211dc7606cea4d81d87df636e1f81c9881000ef8aaf40e8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD518391b990354f085db9338ce828397f8
SHA1a05bdbb2953669340d9305ff254077776568777d
SHA25641436f9e7126d24655b23dd3703b1eb6066d16e7af221e6768648320ee408bd6
SHA512e95119aad83bfcb18156d11c247c39d105a0d5125b30c46dba365291745dce0790a5c57833dbeb254af50561fdecb533eaebf70f19ef19f147e3f578b282c087
-
Filesize
28KB
MD56dda4a5afdb0905336647f81a18ff8b4
SHA1e6f2aed33a0d4a22293be2a86f38a05d4ce6ab1c
SHA2562fb8aaec2d3e3cc1340095f5b6d063f9f1ec8359fa0df609df7460081cd8fbf3
SHA51228fdc56981c5bbc62d42f27ee1f0006e5a86ea611fccf764a6c45c41a8b6e5328028f18dcf9e9d22d0daf9c852bcf005757f6d2cbd5c113ef3176ab9825aa6d9
-
Filesize
37KB
MD58ec649431556fe44554f17d09ad20dd6
SHA1b058fbcd4166a90dc0d0333010cca666883dbfb1
SHA256d1faee8dabc281e66514f9ceb757ba39a6747c83a1cf137f4b284a9b324f3dc4
SHA51278f0d0f87b4e217f12a0d66c4dfa7ad7cf4991d46fdddfaeae47474a10ce15506d79a2145a3432a149386083c067432f42f441c88922731d30cd7ebfe8748460
-
Filesize
37KB
MD5d6f9ccfaad9a2fb0089b43509b82786b
SHA13b4539ea537150e088811a22e0e186d06c5a743d
SHA2569af50adf3be17dc18ab4efafcf6c6fb6110336be4ea362a7b56b117e3fb54c73
SHA5128af1d5f67dad016e245bdda43cc53a5b7746372f90750cfcca0d31d634f2b706b632413c815334c0acfded4dd77862d368d4a69fe60c8c332bc54cece7a4c3cd
-
Filesize
37KB
MD56c734f672db60259149add7cc51d2ef0
SHA12e50c8c44b336677812b518c93faab76c572669b
SHA25624945bb9c3dcd8a9b5290e073b70534da9c22d5cd7fda455e5816483a27d9a7d
SHA5121b4f5b4d4549ed37e504e62fbcb788226cfb24db4bfb931bc52c12d2bb8ba24b19c46f2ced297ef7c054344ef50b997357e2156f206e4d5b91fdbf8878649330
-
Filesize
37KB
MD57ac9f8d002a8e0d840c376f6df687c65
SHA1a364c6827fe70bb819b8c1332de40bcfa2fa376b
SHA25666123f7c09e970be594abe74073f7708d42a54b1644722a30887b904d823e232
SHA5120dd36611821d8e9ad53deb5ff4ee16944301c3b6bb5474f6f7683086cde46d5041974ec9b1d3fb9a6c82d9940a5b8aec75d51162999e7096154ad519876051fe
-
Filesize
37KB
MD5c76ee61d62a3e5698ffccb8ff0fda04c
SHA1371b35900d1c9bfaff75bbe782280b251da92d0e
SHA256fbf7d12dd702540cbaeeecf7bddf64158432ef4011bace2a84f5b5112aefe740
SHA512a76fee1eb0d3585fa16d9618b8e76b8e144787448a2b8ff5fbd72a816cbd89b26d64db590a2a475805b14a9484fc00dbc3642d0014954ec7850795dcf2aa1ee7
-
Filesize
37KB
MD5e6c863379822593726ad5e4ade69862a
SHA14fe1522c827f8509b0cd7b16b4d8dfb09eee9572
SHA256ae43886fee752fb4a20bb66793cdd40d6f8b26b2bf8f5fbd4371e553ef6d6433
SHA51231d1ae492e78ed3746e907c72296346920f5f19783254a1d2cb8c1e3bff766de0d3db4b7b710ed72991d0f98d9f0271caefc7a90e8ec0fe406107e3415f0107e
-
Filesize
37KB
MD5c936e231c240fbf47e013423471d0b27
SHA136fabff4b2b4dfe7e092727e953795416b4cd98f
SHA256629bf48c1295616cbbb7f9f406324e0d4fcd79310f16d487dd4c849e408a4202
SHA512065793554be2c86c03351adc5a1027202b8c6faf8e460f61cc5e87bcd2fe776ee0c086877e75ad677835929711bea182c03e20e872389dfb7d641e17a1f89570
-
Filesize
37KB
MD50ab873a131ea28633cb7656fb2d5f964
SHA1e0494f57aa8193b98e514f2bc5e9dc80b9b5eff0
SHA256a83e219dd110898dfe516f44fb51106b0ae0aca9cc19181a950cd2688bbeeed2
SHA5124859758f04fe662d58dc32c9d290b1fa95f66e58aef7e27bc4b6609cc9b511aa688f6922dbf9d609bf9854b619e1645b974e366c75431c3737c3feed60426994
-
Filesize
37KB
MD5c252459c93b6240bb2b115a652426d80
SHA1d0dffc518bbd20ce56b68513b6eae9b14435ed27
SHA256b31ea30a8d68c68608554a7cb610f4af28f8c48730945e3e352b84eddef39402
SHA5120dcfcddd9f77c7d1314f56db213bd40f47a03f6df1cf9b6f3fb8ac4ff6234ca321d5e7229cf9c7cb6be62e5aa5f3aa3f2f85a1a62267db36c6eab9e154165997
-
Filesize
37KB
MD5d32bf2f67849ffb91b4c03f1fa06d205
SHA131af5fdb852089cde1a95a156bb981d359b5cd58
SHA2561123f4aea34d40911ad174f7dda51717511d4fa2ce00d2ca7f7f8e3051c1a968
SHA5121e08549dfcbcfbe2b9c98cd2b18e4ee35682e6323d6334dc2a075abb73083c30229ccd720d240bcda197709f0b90a0109fa60af9f14765da5f457a8c5fce670a
-
Filesize
37KB
MD54c1e3672aafbfd61dc7a8129dc8b36b5
SHA115af5797e541c7e609ddf3aba1aaf33717e61464
SHA2566dac4351c20e77b7a2095ece90416792b7e89578f509b15768c9775cf4fd9e81
SHA512eab1eabca0c270c78b8f80989df8b9503bdff4b6368a74ad247c67f9c2f74fa0376761e40f86d28c99b1175db64c4c0d609bedfd0d60204d71cd411c71de7c20
-
Filesize
37KB
MD5012a1710767af3ee07f61bfdcd47ca08
SHA17895a89ccae55a20322c04a0121a9ae612de24f4
SHA25612d159181d496492a057629a49fb90f3d8be194a34872d8d039d53fb44ea4c3c
SHA512e023cac97cba4426609aeaa37191b426ff1d5856638146feab837e59e3343434a2bb8890b538fdf9391e492cbefcf4afde8e29620710d6bd06b8c1ad226b5ec4
-
Filesize
37KB
MD5f18f47c259d94dcf15f3f53fc1e4473a
SHA1e4602677b694a5dd36c69b2f434bedb2a9e3206c
SHA25634546f0ecf4cd9805c0b023142f309cbb95cfcc080ed27ff43fb6483165218c1
SHA512181a5aa4eed47f21268e73d0f9d544e1ceb9717d3abf79b6086584ba7bdb7387052d7958c25ebe687bfdcd0b6cca9d8cf12630234676394f997b80c745edaa38
-
Filesize
37KB
MD5a8e9ea9debdbdf5d9cf6a0a0964c727b
SHA1aee004b0b6534e84383e847e4dd44a4ee6843751
SHA256b388a205f12a6301a358449471381761555edf1bf208c91ab02461822190cbcf
SHA5127037ffe416710c69a01ffd93772044cfb354fbf5b8fd7c5f24a3eabb4d9ddb91f4a9c386af4c2be74c7ffdbb0c93a32ff3752b6ab413261833b0ece7b7b1cb55
-
Filesize
37KB
MD5296bcd1669b77f8e70f9e13299de957e
SHA18458af00c5e9341ad8c7f2d0e914e8b924981e7e
SHA2566f05cae614ca0e4751b2aaceea95716fd37a6bf3fae81ff1c565313b30b1aba2
SHA5124e58a0f063407aed64c1cb59e4f46c20ff5b9391a02ceff9561456fef1252c1cdd0055417a57d6e946ec7b5821963c1e96eaf1dd750a95ca9136764443df93d7
-
Filesize
37KB
MD57e87c49d0b787d073bf9d687b5ec5c6f
SHA16606359f4d88213f36c35b3ec9a05df2e2e82b4e
SHA256d811283c4e4c76cb1ce3f23528e542cff4747af033318f42b9f2deb23180c4af
SHA512926d676186ec0b58b852ee0b41f171729b908a5be9ce5a791199d6d41f01569bcdc1fddd067f41bddf5cdde72b8291c4b4f65983ba318088a4d2d5d5f5cd53af
-
Filesize
37KB
MD5042dfd075ab75654c3cf54fb2d422641
SHA1d7f6ac6dc57e0ec7193beb74639fe92d8cd1ecb9
SHA256b91fb228051f1720427709ff849048bfd01388d98335e4766cd1c4808edc5136
SHA512fada24d6b3992f39119fe8e51b8da1f6a6ca42148a0c21e61255643e976fde52076093403ccbc4c7cd2f62ccb3cdedd9860f2ac253bb5082fb9fe8f31d88200d
-
Filesize
37KB
MD5476d959b461d1098259293cfa99406df
SHA1ad5091a232b53057968f059d18b7cfe22ce24aab
SHA25647f2a0b4b54b053563ba60d206f1e5bd839ab60737f535c9b5c01d64af119f90
SHA5129c5284895072d032114429482ccc9b62b073447de35de2d391f6acad53e3d133810b940efb1ed17d8bd54d24fce0af6446be850c86766406e996019fcc3a4e6e
-
Filesize
37KB
MD5a83dde1e2ace236b202a306d9270c156
SHA1a57fb5ce8d2fe6bf7bbb134c3fb7541920f6624f
SHA25620ab2e99b18b5c2aedc92d5fd2df3857ee6a1f643df04203ac6a6ded7073d5e8
SHA512f733fdad3459d290ef39a3b907083c51b71060367b778485d265123ab9ce00e3170d2246a4a2f0360434d26376292803ccd44b0a5d61c45f2efaa28d5d0994df
-
Filesize
37KB
MD5c24de797dd930dea6b66cfc9e9bb10ce
SHA137c8c251e2551fd52d9f24b44386cfa0db49185a
SHA256db99f9a2d6b25dd83e0d00d657eb326f11cc8055266e4e91c3aec119eaf8af01
SHA5120e29b6ce2bdc14bf8fb6f8324ff3e39b143ce0f3fa05d65231b4c07e241814fb335ede061b525fe25486329d335adc06f71b804dbf4bf43e17db0b7cd620a7c6
-
Filesize
10KB
MD52a94f3960c58c6e70826495f76d00b85
SHA1e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
SHA2562fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
SHA512fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
Filesize
37KB
MD584c958e242afd53e8c9dae148a969563
SHA1e876df73f435cdfc4015905bed7699c1a1b1a38d
SHA256079d320d3c32227ba4b9acddf60bfcdf660374cb7e55dba5ccf7beeaedd2cdef
SHA5129e6cb07909d0d77ebb5b52164b1fa40ede30f820c9773ea3a1e62fb92513d05356dfef0e7ef49bf2ad177d3141720dc1c5edceb616cef77baec9acdd4bbc5bae
-
Filesize
37KB
MD527422233e558f5f11ee07103ed9b72e3
SHA1feb7232d1b317b925e6f74748dd67574bc74cd4d
SHA2561fa6a4dc1e7d64c574cb54ae8fd71102f8c6c41f2bd9a93739d13ff6b77d41ac
SHA5122d3f424a24e720f83533ace28270b59a254f08d4193df485d1b7d3b9e6ae53db39ef43d5fc7de599355469ad934d8bcb30f68d1aaa376df11b9e3dec848a5589
-
Filesize
37KB
MD5c84f50869b8ee58ca3f1e3b531c4415d
SHA1d04c660864bc2556c4a59778736b140c193a6ab2
SHA256fa54653d9b43eb40539044faf2bdcac010fed82b223351f6dfe7b061287b07d3
SHA512bb8c98e2dadb884912ea53e97a2ea32ac212e5271f571d7aa0da601368feabee87e1be17d1a1b7738c56167f01b1788f3636aac1f7436c5b135fa9d31b229e94
-
Filesize
37KB
MD57cfe29b01fae3c9eadab91bcd2dc9868
SHA1d83496267dc0f29ce33422ef1bf3040f5fc7f957
SHA2562c3bfb9cc6c71387ba5c4c03e04af7f64bf568bdbe4331e9f094b73b06bddcff
SHA512f6111d6f8b609c1fc3b066075641dace8c34efb011176b5c79a6470cc6941a9727df4ceb2b96d1309f841432fa745348fc2fdaf587422eebd484d278efe3aeac
-
Filesize
37KB
MD528c50ddf0d8457605d55a27d81938636
SHA159c4081e8408a25726c5b2e659ff9d2333dcc693
SHA256ebda356629ac21d9a8e704edc86c815770423ae9181ebbf8ca621c8ae341cbd5
SHA5124153a095aa626b5531c21e33e2c4c14556892035a4a524a9b96354443e2909dcb41683646e6c1f70f1981ceb5e77f17f6e312436c687912784fcb960f9b050fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
39KB
MD57529e3c83618f5e3a4cc6dbf3a8534a6
SHA10f944504eebfca5466b6113853b0d83e38cf885a
SHA256ec35c76ad2c8192f09c02eca1f263b406163470ca8438d054db7adcf5bfc0597
SHA5127eef97937cc1e3afd3fca0618328a5b6ecb72123a199739f6b1b972dd90e01e07492eb26352ee00421d026c63af48973c014bdd76d95ea841eb2fefd613631cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QSXI2TCDVAXFDEFRJDH0.temp
Filesize7KB
MD5c36ceac9b5735e52ab78e8bc07cc7479
SHA1333b798848b9cf61a190bb69550f63f807f3416b
SHA256a5140d98aa6c124a171a14bae2bfd5f839afe531d1bb7142d996b87b4cae7b57
SHA512adb134a2b9efc0dd810091064dba42bb3ca692881c74f9c1a6d6af6d2e4904a8275cc8f0b4aa8a7f98fc866edde6c794abce778f1ccd01e3d364ee1a6625d800
-
Filesize
3KB
MD50880547340d1b849a7d4faaf04b6f905
SHA137fa5848977fd39df901be01c75b8f8320b46322
SHA25684449f1e874b763619271a57bfb43bd06e9c728c6c6f51317c56e9e94e619b25
SHA5129048a3d5ab7472c1daa1efe4a35d559fc069051a5eb4b8439c2ef25318b4de6a6c648a7db595e7ae76f215614333e3f06184eb18b2904aace0c723f8b9c35a91
-
Filesize
81KB
MD54ce78257e6413f81a4140caa6d7362a2
SHA1617208d5a328d43a3996725cb506704546e73b14
SHA2560df2d292fc72a34ed6ea343b53fdfb221f10695ae73062ef874b4c57689b2fe7
SHA512e72a7fe602c6abe237fc9f66d523aa2d1ad3badf6f879006a8f1fc2dcc95f49bb4a212a0af9405be02c0656480c5ae052b77f9e9d57a26150e6115927c6f5b4b
-
Filesize
457KB
MD531f03a8fe7561da18d5a93fc3eb83b7d
SHA131b31af35e6eed00e98252e953e623324bd64dde
SHA2562027197f05dac506b971b3bd2708996292e6ffad661affe9a0138f52368cc84d
SHA5123ea7c13a0aa67c302943c6527856004f8d871fe146150096bc60855314f23eae6f507f8c941fd7e8c039980810929d4930fcf9c597857d195f8c93e3cc94c41d
-
\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe
Filesize159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d