Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 13:10
Static task
static1
Behavioral task
behavioral1
Sample
PCCookerx64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PCCookerx64.exe
Resource
win10v2004-20240802-en
General
-
Target
PCCookerx64.exe
-
Size
22.4MB
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
Malware Config
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
C:\Users\Public\Documents\RGNR_9F2668B3.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
uGoUQjcjqoZsiRJZ
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
stealc
cry
http://193.176.190.41
-
url_path
/2fa883eebd632382.php
Extracted
stealc
default
http://193.176.190.41
-
url_path
/2fa883eebd632382.php
Extracted
redline
LogsDiller Cloud (TG: @logsdillabot)
147.45.47.36:14537
Signatures
-
Detect Xworm Payload 50 IoCs
resource yara_rule behavioral1/files/0x000500000001c8b4-611.dat family_xworm behavioral1/files/0x000500000001c8dc-623.dat family_xworm behavioral1/memory/1284-625-0x00000000001F0000-0x0000000000200000-memory.dmp family_xworm behavioral1/files/0x000400000001c95a-634.dat family_xworm behavioral1/memory/2156-631-0x0000000001140000-0x0000000001150000-memory.dmp family_xworm behavioral1/files/0x000400000001c9e6-650.dat family_xworm behavioral1/memory/2840-657-0x0000000000C90000-0x0000000000CA0000-memory.dmp family_xworm behavioral1/memory/1632-652-0x0000000000BD0000-0x0000000000BE0000-memory.dmp family_xworm behavioral1/files/0x000400000001cb2d-674.dat family_xworm behavioral1/files/0x000400000001cb56-681.dat family_xworm behavioral1/memory/756-685-0x0000000000940000-0x0000000000950000-memory.dmp family_xworm behavioral1/files/0x000400000001cba0-707.dat family_xworm behavioral1/files/0x000400000001cb77-706.dat family_xworm behavioral1/files/0x000400000001cc03-770.dat family_xworm behavioral1/files/0x000400000001cbf7-763.dat family_xworm behavioral1/memory/1664-773-0x00000000009D0000-0x00000000009E0000-memory.dmp family_xworm behavioral1/memory/640-797-0x00000000009E0000-0x00000000009F0000-memory.dmp family_xworm behavioral1/memory/3024-796-0x00000000010C0000-0x00000000010D0000-memory.dmp family_xworm behavioral1/files/0x000400000001cbe7-748.dat family_xworm behavioral1/files/0x000400000001cbb1-747.dat family_xworm behavioral1/memory/2216-800-0x0000000001050000-0x0000000001060000-memory.dmp family_xworm behavioral1/memory/1864-802-0x0000000000880000-0x0000000000890000-memory.dmp family_xworm behavioral1/memory/1956-699-0x0000000000BF0000-0x0000000000C00000-memory.dmp family_xworm behavioral1/memory/1272-813-0x0000000000FE0000-0x0000000000FF0000-memory.dmp family_xworm behavioral1/files/0x000400000001cc78-827.dat family_xworm behavioral1/files/0x000400000001cc7e-837.dat family_xworm behavioral1/memory/472-844-0x0000000000230000-0x0000000000240000-memory.dmp family_xworm behavioral1/files/0x000400000001cc80-863.dat family_xworm behavioral1/memory/2012-871-0x00000000009B0000-0x00000000009C0000-memory.dmp family_xworm behavioral1/files/0x000400000001cc82-889.dat family_xworm behavioral1/memory/224-897-0x0000000000250000-0x0000000000260000-memory.dmp family_xworm behavioral1/memory/2588-896-0x0000000000EE0000-0x0000000000EF0000-memory.dmp family_xworm behavioral1/files/0x000400000001cc8b-911.dat family_xworm behavioral1/files/0x000400000001cc8d-917.dat family_xworm behavioral1/files/0x000400000001cc95-932.dat family_xworm behavioral1/files/0x000400000001cd51-953.dat family_xworm behavioral1/files/0x000400000001cccc-952.dat family_xworm behavioral1/files/0x000400000001cd4d-968.dat family_xworm behavioral1/memory/2380-970-0x00000000000B0000-0x00000000000C0000-memory.dmp family_xworm behavioral1/memory/928-928-0x0000000001170000-0x0000000001180000-memory.dmp family_xworm behavioral1/memory/2264-974-0x0000000000A40000-0x0000000000A50000-memory.dmp family_xworm behavioral1/memory/2392-926-0x0000000000B00000-0x0000000000B10000-memory.dmp family_xworm behavioral1/files/0x000400000001ccb5-935.dat family_xworm behavioral1/files/0x000400000001cd2b-947.dat family_xworm behavioral1/files/0x000400000001cd55-1022.dat family_xworm behavioral1/memory/2364-993-0x00000000002B0000-0x00000000002C0000-memory.dmp family_xworm behavioral1/memory/2972-983-0x0000000000010000-0x0000000000020000-memory.dmp family_xworm behavioral1/memory/2064-982-0x0000000000110000-0x0000000000120000-memory.dmp family_xworm behavioral1/memory/1928-1042-0x0000000001000000-0x0000000001010000-memory.dmp family_xworm behavioral1/memory/2524-1039-0x0000000001180000-0x0000000001190000-memory.dmp family_xworm -
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysarddrvs.exe -
Phorphiex payload 3 IoCs
resource yara_rule behavioral1/files/0x000600000001d707-20259.dat family_phorphiex behavioral1/files/0x0003000000021234-20275.dat family_phorphiex behavioral1/files/0x0003000000021238-20283.dat family_phorphiex -
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 5 IoCs
resource yara_rule behavioral1/memory/3728-20451-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/3728-20450-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/3728-20454-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/3728-20457-0x0000000000400000-0x0000000000452000-memory.dmp family_redline behavioral1/memory/3728-20456-0x0000000000400000-0x0000000000452000-memory.dmp family_redline -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe -
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7825) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4240 powershell.exe 5800 powershell.exe 6968 powershell.exe 4820 powershell.exe 6340 powershell.exe 7060 powershell.exe 5724 powershell.exe 5992 powershell.exe 6112 powershell.exe 4408 powershell.exe 3804 powershell.exe 4284 powershell.exe 4652 powershell.exe 5308 powershell.exe 4576 powershell.exe 5100 powershell.exe 5728 powershell.exe 4760 powershell.exe 2720 powershell.exe 4468 powershell.exe 4336 powershell.exe 5928 powershell.exe 5700 powershell.exe 4804 powershell.exe 6548 powershell.exe 4588 powershell.exe 5580 powershell.exe 3484 powershell.exe 4428 powershell.exe 6748 powershell.exe 6756 powershell.exe 2120 powershell.exe 4608 powershell.exe 4612 powershell.exe 5456 powershell.exe 3704 powershell.exe 6700 powershell.exe 5696 powershell.exe 4308 powershell.exe 5828 powershell.exe 6320 powershell.exe 5276 powershell.exe 4356 powershell.exe 6604 powershell.exe 4932 powershell.exe 6728 powershell.exe 6052 powershell.exe 3368 powershell.exe 3692 powershell.exe 3660 powershell.exe 3488 powershell.exe 4712 powershell.exe 4572 powershell.exe 4552 powershell.exe 6060 powershell.exe 6620 powershell.exe 6804 powershell.exe 5644 powershell.exe 6992 powershell.exe 4656 powershell.exe 5500 powershell.exe 3416 powershell.exe 6528 powershell.exe 4548 powershell.exe -
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 28 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 12.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 19.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RGNR_9F2668B3.txt asena.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 17.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 21.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 10.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 11.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 20.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 24.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 22.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 22.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 15.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 18.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\d5fd211c.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 25.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 14.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 16.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 7.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 2.exe -
Executes dropped EXE 47 IoCs
pid Process 2388 4363463463464363463463463.exe 1616 a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe 2704 asena.exe 2808 Bomb.exe 2984 CryptoWall.exe 1284 25.exe 2156 24.exe 2840 23.exe 1632 22.exe 756 21.exe 1956 20.exe 640 19.exe 1664 18.exe 2216 17.exe 3024 16.exe 1272 15.exe 1864 14.exe 2012 13.exe 472 12.exe 224 11.exe 2588 10.exe 928 9.exe 2392 8.exe 2380 7.exe 2524 6.exe 2264 4.exe 2972 5.exe 2064 2.exe 2364 3.exe 1928 1.exe 5556 twztl.exe 6956 pei.exe 5876 syscapvbrd.exe 3512 m.exe 5620 1.exe 5448 sysmablsvr.exe 6824 2402916523.exe 5016 sysarddrvs.exe 4060 66d42cc8dfeef_build.exe 6952 t1.exe 4792 66d1eb58f2491_stealc_cry.exe 1860 66d1ec0485e55_stealc_default.exe 4132 Utility.exe 6336 s.exe 5772 mobiletrans.exe 4912 DiskUtility.exe 5192 66bf6c4aecd75_crypted.exe -
Loads dropped DLL 29 IoCs
pid Process 2536 PCCookerx64.exe 2536 PCCookerx64.exe 2536 PCCookerx64.exe 2536 PCCookerx64.exe 2536 PCCookerx64.exe 2536 PCCookerx64.exe 2536 PCCookerx64.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 6956 pei.exe 6956 pei.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe 2388 4363463463464363463463463.exe -
resource yara_rule behavioral1/files/0x000300000002125e-20393.dat upx behavioral1/memory/4132-20396-0x0000000000400000-0x000000000045A000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\d5fd211 = "C:\\d5fd211c\\d5fd211c.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*5fd211 = "C:\\d5fd211c\\d5fd211c.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\d5fd211c = "C:\\Users\\Admin\\AppData\\Roaming\\d5fd211c.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*5fd211c = "C:\\Users\\Admin\\AppData\\Roaming\\d5fd211c.exe" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syscapvbrd.exe" twztl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" 1.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: asena.exe -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-addr.es 7 myexternalip.com 17 ip-api.com 18 ip-api.com -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PHYSICALDRIVE0 asena.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4792 set thread context of 6636 4792 66d1eb58f2491_stealc_cry.exe 310 PID 1860 set thread context of 4304 1860 66d1ec0485e55_stealc_default.exe 313 PID 5192 set thread context of 3728 5192 66bf6c4aecd75_crypted.exe 321 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_zh_CN.jar asena.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Sydney asena.exe File opened for modification C:\Program Files\Microsoft Games\Chess\it-IT\Chess.exe.mui asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00837_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Solutions_Person.css asena.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt asena.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm asena.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\ParentMenuButtonIconSubpict.png asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\Part\Contacts.accdt asena.exe File created C:\Program Files\Java\jdk1.7.0_80\include\win32\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\de-DE\slideShow.html asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Essential.eftx asena.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\hint_down.png asena.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\RGNR_9F2668B3.txt asena.exe File created C:\Program Files (x86)\Common Files\System\Ole DB\fr-FR\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0183174.WMF asena.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\msader15.dll.mui asena.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-next-over-select.png asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Africa\Accra asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\PICTPH.POC asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195248.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL00256_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21518_.GIF asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\28.png asena.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLUEPRNT\PREVIEW.GIF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00350_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0299587.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18241_.WMF asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-templates.jar asena.exe File opened for modification C:\Program Files\Windows Media Player\it-IT\wmlaunch.exe.mui asena.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\it-IT\css\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\it-IT\PhotoAcq.dll.mui asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\license.html asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Trek.thmx asena.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\fr-FR\PhotoAcq.dll.mui asena.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Canary asena.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\PhotoViewer.dll.mui asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE03470_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLAPPT.FAE asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.CA.XML asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Palmer asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.nl_zh_4.4.0.v20140623020002.jar asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\lib\jfluid-server.jar asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD02097_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\GRDEN_01.MID asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18218_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBFTSCM\SCHEME05.CSS asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PSRCHSRN.DAT asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\macTSFrame.png asena.exe File opened for modification C:\Program Files\Java\jre7\lib\ext\localedata.jar asena.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\oledbjvs.inc asena.exe File opened for modification C:\Program Files\Windows Media Player\Network Sharing\wmpnss_bw48.jpg asena.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\ICU\icudt26l.dat asena.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Stationery\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153047.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR31B.GIF asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator_1.1.0.v20131217-1203.jar asena.exe File created C:\Program Files\VideoLAN\VLC\locale\mk\LC_MESSAGES\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files\Windows Defender\it-IT\MsMpRes.dll.mui asena.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\it-IT\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\js\currency.js asena.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\RGNR_9F2668B3.txt asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\ja-JP\clock.html asena.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\sysmablsvr.exe m.exe File created C:\Windows\sysarddrvs.exe 1.exe File opened for modification C:\Windows\sysarddrvs.exe 1.exe File created C:\Windows\syscapvbrd.exe twztl.exe File opened for modification C:\Windows\syscapvbrd.exe twztl.exe File created C:\Windows\sysmablsvr.exe m.exe -
Launches sc.exe 10 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5948 sc.exe 4684 sc.exe 1776 sc.exe 5516 sc.exe 5912 sc.exe 5124 sc.exe 3784 sc.exe 1276 sc.exe 3268 sc.exe 6500 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 39 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysarddrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66d1eb58f2491_stealc_cry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DiskUtility.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syscapvbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoWall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66d1ec0485e55_stealc_default.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66bf6c4aecd75_crypted.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asena.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCCookerx64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language m.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 2764 vssadmin.exe 1572 vssadmin.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064 RegAsm.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064\Blob = 0b000000010000004800000054006900740061006e00690075006d00200052006f006f007400200043006500720074006900660069006300610074006500200041007500740068006f00720069007400790000000200000001000000cc0000001c0000006c00000001000000000000000000000000000000010000007b00340031003700340034004200450034002d0031003100430035002d0034003900340043002d0041003200310033002d004200410030004300450039003400340039003300380045007d00000000004d006900630072006f0073006f0066007400200045006e00680061006e006300650064002000430072007900700074006f0067007200610070006800690063002000500072006f00760069006400650072002000760031002e00300000000000030000000100000014000000f1a578c4cb5de79a370893983fd4da8b67b2b06420000000010000000a03000030820306308201eea003020102020867f7beb96a4c2798300d06092a864886f70d01010b0500302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f72697479301e170d3233303331343130333532305a170d3236303631373130333532305a302e312c302a06035504030c23546974616e69756d20526f6f7420436572746966696361746520417574686f7269747930820122300d06092a864886f70d01010105000382010f003082010a028201010086e4577a5861ce819177d005fa51d5515a936c610ccfcbde5332cd151da647ee881a245c9b02833b02af3d76fe20bd3bfaf7a20973e72ebd9440d09d8c3d2713bdf0d09feb9532acd7a42da2a952daa86a2a88ee427d30959d90bfba05276aa02998a6986fc01306629b79b8405d1f1fa6d9a42f827afc7566340dc2de27012b94bb4a27b3cb1c219a3cb2c14203f34451bd626520edd4dbcc414f593f2acbc48479f7143cbe139cfd129c913e5303dc20f94c44358901b69a848d7ea02e308a311560ac00ae009a29109aeed9713dd8919b97ed598058e17f0726c7a020f710abc06291dfaaf181c6be6a76c89cb68eb0b0ec1cd95f326c7e55588bfd76c5190203010001a328302630130603551d25040c300a06082b06010505070301300f0603551d130101ff040530030101ff300d06092a864886f70d01010b0500038201010070851293d757e982797dc5f7f27da894ef0cdb329f06a6096e0cf604b0e54711560ef40f5282082e210f55a3db41f312548b7611f5f0dacea3c78b13f6fc243c02b106665be69e184088415b273999b877bee353a248cec7eeb5a095c2174bc9526cafe3372c59dbfbe758134ed351e5147273fec68577ae4552a6f99ac80ca8d0ee422af528858c6be81cb0a8031ab0ae83c0eb5564f4e87a5c06295d3903eee2fdf92d62a7f4d4054deaa79bcaebda4e8b1a6efd42aef9d01c7075728cb13aa8557c85a72532b5e2d6c3e55041c9867ca8f562bbd2ab0c3710d83173ec3781d1dcaac5c6e07ee726624dfdc5814cffd336e17932f89beb9cf7fdbee9bebf61 RegAsm.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 3864 notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3104 powershell.exe 3368 powershell.exe 3484 powershell.exe 3692 powershell.exe 3292 powershell.exe 4356 powershell.exe 3660 powershell.exe 4428 powershell.exe 4428 powershell.exe 4408 powershell.exe 4408 powershell.exe 4516 powershell.exe 4516 powershell.exe 4612 powershell.exe 4260 powershell.exe 3804 powershell.exe 5348 powershell.exe 5500 powershell.exe 6756 powershell.exe 6604 powershell.exe 4308 powershell.exe 4284 powershell.exe 6792 powershell.exe 6728 powershell.exe 6548 powershell.exe 6748 powershell.exe 4240 powershell.exe 4548 powershell.exe 6612 powershell.exe 6804 powershell.exe 6736 powershell.exe 5156 powershell.exe 5644 powershell.exe 6412 powershell.exe 6572 powershell.exe 5776 powershell.exe 4932 powershell.exe 2720 powershell.exe 4820 powershell.exe 6644 powershell.exe 6788 powershell.exe 6700 powershell.exe 4588 powershell.exe 5696 powershell.exe 4576 powershell.exe 4572 powershell.exe 5456 powershell.exe 6848 powershell.exe 5724 powershell.exe 6112 powershell.exe 6520 powershell.exe 4232 powershell.exe 5012 powershell.exe 3416 powershell.exe 6620 powershell.exe 6620 powershell.exe 6528 powershell.exe 6528 powershell.exe 5992 powershell.exe 5992 powershell.exe 6376 powershell.exe 6376 powershell.exe 6340 powershell.exe 6340 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2984 CryptoWall.exe 2936 explorer.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
pid Process 5016 sysarddrvs.exe 5876 syscapvbrd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2852 wmic.exe Token: SeSecurityPrivilege 2852 wmic.exe Token: SeTakeOwnershipPrivilege 2852 wmic.exe Token: SeLoadDriverPrivilege 2852 wmic.exe Token: SeSystemProfilePrivilege 2852 wmic.exe Token: SeSystemtimePrivilege 2852 wmic.exe Token: SeProfSingleProcessPrivilege 2852 wmic.exe Token: SeIncBasePriorityPrivilege 2852 wmic.exe Token: SeCreatePagefilePrivilege 2852 wmic.exe Token: SeBackupPrivilege 2852 wmic.exe Token: SeRestorePrivilege 2852 wmic.exe Token: SeShutdownPrivilege 2852 wmic.exe Token: SeDebugPrivilege 2852 wmic.exe Token: SeSystemEnvironmentPrivilege 2852 wmic.exe Token: SeRemoteShutdownPrivilege 2852 wmic.exe Token: SeUndockPrivilege 2852 wmic.exe Token: SeManageVolumePrivilege 2852 wmic.exe Token: 33 2852 wmic.exe Token: 34 2852 wmic.exe Token: 35 2852 wmic.exe Token: SeIncreaseQuotaPrivilege 2852 wmic.exe Token: SeSecurityPrivilege 2852 wmic.exe Token: SeTakeOwnershipPrivilege 2852 wmic.exe Token: SeLoadDriverPrivilege 2852 wmic.exe Token: SeSystemProfilePrivilege 2852 wmic.exe Token: SeSystemtimePrivilege 2852 wmic.exe Token: SeProfSingleProcessPrivilege 2852 wmic.exe Token: SeIncBasePriorityPrivilege 2852 wmic.exe Token: SeCreatePagefilePrivilege 2852 wmic.exe Token: SeBackupPrivilege 2852 wmic.exe Token: SeRestorePrivilege 2852 wmic.exe Token: SeShutdownPrivilege 2852 wmic.exe Token: SeDebugPrivilege 2852 wmic.exe Token: SeSystemEnvironmentPrivilege 2852 wmic.exe Token: SeRemoteShutdownPrivilege 2852 wmic.exe Token: SeUndockPrivilege 2852 wmic.exe Token: SeManageVolumePrivilege 2852 wmic.exe Token: 33 2852 wmic.exe Token: 34 2852 wmic.exe Token: 35 2852 wmic.exe Token: SeBackupPrivilege 2624 vssvc.exe Token: SeRestorePrivilege 2624 vssvc.exe Token: SeAuditPrivilege 2624 vssvc.exe Token: SeDebugPrivilege 2388 4363463463464363463463463.exe Token: SeDebugPrivilege 2156 24.exe Token: SeDebugPrivilege 1284 25.exe Token: SeDebugPrivilege 2840 23.exe Token: SeDebugPrivilege 1632 22.exe Token: SeDebugPrivilege 756 21.exe Token: SeDebugPrivilege 1956 20.exe Token: SeDebugPrivilege 640 19.exe Token: SeDebugPrivilege 2216 17.exe Token: SeDebugPrivilege 1664 18.exe Token: SeDebugPrivilege 3024 16.exe Token: SeDebugPrivilege 1272 15.exe Token: SeDebugPrivilege 1864 14.exe Token: SeDebugPrivilege 472 12.exe Token: SeDebugPrivilege 2012 13.exe Token: SeDebugPrivilege 2588 10.exe Token: SeDebugPrivilege 224 11.exe Token: SeDebugPrivilege 928 9.exe Token: SeDebugPrivilege 2392 8.exe Token: SeDebugPrivilege 2380 7.exe Token: SeDebugPrivilege 2972 5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2388 2536 PCCookerx64.exe 30 PID 2536 wrote to memory of 2388 2536 PCCookerx64.exe 30 PID 2536 wrote to memory of 2388 2536 PCCookerx64.exe 30 PID 2536 wrote to memory of 2388 2536 PCCookerx64.exe 30 PID 2536 wrote to memory of 1616 2536 PCCookerx64.exe 32 PID 2536 wrote to memory of 1616 2536 PCCookerx64.exe 32 PID 2536 wrote to memory of 1616 2536 PCCookerx64.exe 32 PID 2536 wrote to memory of 1616 2536 PCCookerx64.exe 32 PID 2536 wrote to memory of 2704 2536 PCCookerx64.exe 33 PID 2536 wrote to memory of 2704 2536 PCCookerx64.exe 33 PID 2536 wrote to memory of 2704 2536 PCCookerx64.exe 33 PID 2536 wrote to memory of 2704 2536 PCCookerx64.exe 33 PID 2536 wrote to memory of 2808 2536 PCCookerx64.exe 34 PID 2536 wrote to memory of 2808 2536 PCCookerx64.exe 34 PID 2536 wrote to memory of 2808 2536 PCCookerx64.exe 34 PID 2536 wrote to memory of 2808 2536 PCCookerx64.exe 34 PID 2704 wrote to memory of 2852 2704 asena.exe 35 PID 2704 wrote to memory of 2852 2704 asena.exe 35 PID 2704 wrote to memory of 2852 2704 asena.exe 35 PID 2704 wrote to memory of 2852 2704 asena.exe 35 PID 2704 wrote to memory of 2764 2704 asena.exe 36 PID 2704 wrote to memory of 2764 2704 asena.exe 36 PID 2704 wrote to memory of 2764 2704 asena.exe 36 PID 2704 wrote to memory of 2764 2704 asena.exe 36 PID 2536 wrote to memory of 2984 2536 PCCookerx64.exe 38 PID 2536 wrote to memory of 2984 2536 PCCookerx64.exe 38 PID 2536 wrote to memory of 2984 2536 PCCookerx64.exe 38 PID 2536 wrote to memory of 2984 2536 PCCookerx64.exe 38 PID 2984 wrote to memory of 2936 2984 CryptoWall.exe 40 PID 2984 wrote to memory of 2936 2984 CryptoWall.exe 40 PID 2984 wrote to memory of 2936 2984 CryptoWall.exe 40 PID 2984 wrote to memory of 2936 2984 CryptoWall.exe 40 PID 2936 wrote to memory of 2116 2936 explorer.exe 44 PID 2936 wrote to memory of 2116 2936 explorer.exe 44 PID 2936 wrote to memory of 2116 2936 explorer.exe 44 PID 2936 wrote to memory of 2116 2936 explorer.exe 44 PID 2936 wrote to memory of 1572 2936 explorer.exe 45 PID 2936 wrote to memory of 1572 2936 explorer.exe 45 PID 2936 wrote to memory of 1572 2936 explorer.exe 45 PID 2936 wrote to memory of 1572 2936 explorer.exe 45 PID 2808 wrote to memory of 1284 2808 Bomb.exe 47 PID 2808 wrote to memory of 1284 2808 Bomb.exe 47 PID 2808 wrote to memory of 1284 2808 Bomb.exe 47 PID 2808 wrote to memory of 2156 2808 Bomb.exe 48 PID 2808 wrote to memory of 2156 2808 Bomb.exe 48 PID 2808 wrote to memory of 2156 2808 Bomb.exe 48 PID 2808 wrote to memory of 2840 2808 Bomb.exe 49 PID 2808 wrote to memory of 2840 2808 Bomb.exe 49 PID 2808 wrote to memory of 2840 2808 Bomb.exe 49 PID 2808 wrote to memory of 1632 2808 Bomb.exe 50 PID 2808 wrote to memory of 1632 2808 Bomb.exe 50 PID 2808 wrote to memory of 1632 2808 Bomb.exe 50 PID 2808 wrote to memory of 756 2808 Bomb.exe 51 PID 2808 wrote to memory of 756 2808 Bomb.exe 51 PID 2808 wrote to memory of 756 2808 Bomb.exe 51 PID 2808 wrote to memory of 1956 2808 Bomb.exe 52 PID 2808 wrote to memory of 1956 2808 Bomb.exe 52 PID 2808 wrote to memory of 1956 2808 Bomb.exe 52 PID 2808 wrote to memory of 640 2808 Bomb.exe 53 PID 2808 wrote to memory of 640 2808 Bomb.exe 53 PID 2808 wrote to memory of 640 2808 Bomb.exe 53 PID 2808 wrote to memory of 1664 2808 Bomb.exe 54 PID 2808 wrote to memory of 1664 2808 Bomb.exe 54 PID 2808 wrote to memory of 1664 2808 Bomb.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCCookerx64.exe"C:\Users\Admin\AppData\Local\Temp\PCCookerx64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5556 -
C:\Windows\syscapvbrd.exeC:\Windows\syscapvbrd.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:5876 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:4032 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:4396 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5516
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3268
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6500
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5124
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5912
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"C:\Users\Admin\AppData\Local\Temp\Files\pei.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:6956 -
C:\Users\Admin\AppData\Local\Temp\2402916523.exeC:\Users\Admin\AppData\Local\Temp\2402916523.exe4⤵
- Executes dropped EXE
PID:6824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\m.exe"C:\Users\Admin\AppData\Local\Temp\Files\m.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:5448
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\1.exe"C:\Users\Admin\AppData\Local\Temp\Files\1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5620 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:6692 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3784
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5948
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4684
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1276
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66d42cc8dfeef_build.exe"C:\Users\Admin\AppData\Local\Temp\Files\66d42cc8dfeef_build.exe"3⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵
- Executes dropped EXE
PID:6952
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66d1eb58f2491_stealc_cry.exe"C:\Users\Admin\AppData\Local\Temp\Files\66d1eb58f2491_stealc_cry.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66d1ec0485e55_stealc_default.exe"C:\Users\Admin\AppData\Local\Temp\Files\66d1ec0485e55_stealc_default.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
PID:4304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\Utility.exe"C:\Users\Admin\AppData\Local\Temp\Files\Utility.exe"3⤵
- Executes dropped EXE
PID:4132
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- Executes dropped EXE
PID:6336
-
-
C:\Users\Admin\AppData\Local\Temp\Files\mobiletrans.exe"C:\Users\Admin\AppData\Local\Temp\Files\mobiletrans.exe"3⤵
- Executes dropped EXE
PID:5772
-
-
C:\Users\Admin\AppData\Local\Temp\Files\DiskUtility.exe"C:\Users\Admin\AppData\Local\Temp\Files\DiskUtility.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66bf6c4aecd75_crypted.exe"C:\Users\Admin\AppData\Local\Temp\Files\66bf6c4aecd75_crypted.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5192 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"4⤵
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:3728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1616
-
-
C:\Users\Admin\AppData\Local\Temp\asena.exe"C:\Users\Admin\AppData\Local\Temp\asena.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2764
-
-
C:\Windows\SysWOW64\notepad.exeC:\Users\Public\Documents\RGNR_9F2668B3.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:3864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bomb.exe"C:\Users\Admin\AppData\Local\Temp\Bomb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\25.exe"C:\Users\Admin\AppData\Local\Temp\25.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1284 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\25.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3292
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '25.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5156
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5456
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:5872
-
-
-
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\24.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '24.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:2720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4232
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4552
-
-
-
C:\Users\Admin\AppData\Local\Temp\23.exe"C:\Users\Admin\AppData\Local\Temp\23.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\23.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '23.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6992
-
-
-
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\22.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '22.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4356
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6848
-
-
-
C:\Users\Admin\AppData\Local\Temp\21.exe"C:\Users\Admin\AppData\Local\Temp\21.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:756 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\21.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3484
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '21.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5500
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:6120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:3344
-
-
-
C:\Users\Admin\AppData\Local\Temp\20.exe"C:\Users\Admin\AppData\Local\Temp\20.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\20.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '20.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5776
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5100
-
-
-
C:\Users\Admin\AppData\Local\Temp\19.exe"C:\Users\Admin\AppData\Local\Temp\19.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\19.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '19.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:5416
-
-
-
C:\Users\Admin\AppData\Local\Temp\18.exe"C:\Users\Admin\AppData\Local\Temp\18.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1664 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\18.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '18.exe'4⤵PID:4668
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4760
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4712
-
-
-
C:\Users\Admin\AppData\Local\Temp\17.exe"C:\Users\Admin\AppData\Local\Temp\17.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\17.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '17.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4804
-
-
-
C:\Users\Admin\AppData\Local\Temp\16.exe"C:\Users\Admin\AppData\Local\Temp\16.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3024 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\16.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '16.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4468
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4652
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5580
-
-
-
C:\Users\Admin\AppData\Local\Temp\15.exe"C:\Users\Admin\AppData\Local\Temp\15.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1272 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\15.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4308
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '15.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6112
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:4320
-
-
-
C:\Users\Admin\AppData\Local\Temp\14.exe"C:\Users\Admin\AppData\Local\Temp\14.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\14.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '14.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6520
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7060
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6616
-
-
-
C:\Users\Admin\AppData\Local\Temp\13.exe"C:\Users\Admin\AppData\Local\Temp\13.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\13.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4516
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '13.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5992
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4608
-
-
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\12.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '12.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6376
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6420
-
-
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:224 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\11.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6756
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '11.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6528
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:3704
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:3488
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2588 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\10.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6604
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '10.exe'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4656
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:4132
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:4500
-
-
-
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5724
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:6720
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6060
-
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\8.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6792
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '8.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:2120
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6608
-
-
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2380 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '7.exe'4⤵PID:5316
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6968
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2524 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '6.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:5428
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '5.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6620
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:4816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6168
-
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2264 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6548
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4572
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:6492
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5308
-
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2364 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '3.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4932
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:4680
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5276
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4588
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:5916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:1928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3804
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5012
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\syswow64\svchost.exe-k netsvcs4⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:1572
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2624
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
1Service Execution
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
2Windows Service
2Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt
Filesize27KB
MD5fdb7ab6a7064e829a0e2c75c9a443c1a
SHA17b320d7108a04fd1a317189bd1737133d630d12a
SHA256ce9a93ae811a9f8195a5db9ae9cd2bfb08110a5ffbfa8f08234320d89186e679
SHA5125c12c948e81b0e20fc770d279e0994ce00ca2b16b8de2a938fd1feb018d2143a8d92732a561aaadcc642eb86314ea943086bcb305578533f2f160e6f32d95701
-
Filesize
635B
MD538cdf8b3bc7faf93f9976541fc4fd790
SHA1b0ec553585ce01ee7ac67cdc2a8a16e9a58a19f8
SHA256912e23a6db5c16d09a0c083218ca849ca1ec1bd17532e5b20240c2ee1ef34eb8
SHA512b5df0fd9d03b43fcd5cd45582c883e9c117a72bf80f3531252f6107fe8a2c87057a442926d6a51586233353e9a03b7240a4ecd0ef187767d99076651dbf8c789
-
Filesize
634B
MD51a4b24f06ad04339fa99510836d75302
SHA189fd02dbf3212df293919fcfd8761a9ee6b1d2a1
SHA2564dd6aba3d54e993b61463964be173bf700123899401760c2160c404c41360911
SHA512c5c9b6272463efddacb32e0fd58fca0677cc432a7ec3c1eba4e8cbd99566eb0b1e2b24e5baa45dc101adce72de667b2d9803d395919175a4d17f6f3cee18210d
-
Filesize
862B
MD559750b2643a65e5c386f0bba3cdfc5c6
SHA12eb139dba8f2dc6aa1a26cbc9061a18710ffc0bb
SHA256babc92a0b11db79883696a3a57556fa90db8a17067fb3c5b06347dc12f23ad95
SHA5127065b4bdb922012ce6e6ea465f2169b201444ea1965cdc06a00747003b4af9cb67be823803b1fd4015b3bf420d6f6dbec50b9aa00ab40b9c6ce94b1ef58d14c6
-
Filesize
743B
MD5b17319c2d2b057f2140aa9ffabeeebd5
SHA1675024fbc02f6b5d514d91c05d671989538416c0
SHA256266082b42d28cabd75556f937ce56ac22dd4ef6176604381e830cc7715a09823
SHA5122e6ac9cdafbc55f490737b7b598ca3b217415a30b5effb96bef129d2d042054d475b53efeb9d2f5d5400f105a0b3a5b45abf7497960c6fa3a172f09528d268b9
-
Filesize
239KB
MD53d6689982744bd5f649a9a751dfc0c34
SHA192f8e565784b42c7e7c34d5e1c08c023851d544b
SHA256d589dd788502900c87d7e72ef6e4fbfd8bc0a200fb01782941a157bd38a2b91c
SHA5123872f836bee5e068d50dbfd14b9f3b62f46407d5615470412b77cc3ca8022697254f502db9988a2d804372cae851ebb33c83ead7041e4d2234ae8608bfe657c6
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\BG_ADOBE.GIF
Filesize24KB
MD59a6955b48ba4f6f2e096fad1910b3c1d
SHA1c1466c77adbf268c4d4d7eae81a5e5ef1431c10e
SHA25626a2b2dda478acdb9b5700e7fb8a95b4c27971c7812ce687860982ec04aa0587
SHA512c9ef21d0538671c8009c6e722d35cdabac6c9c3672ee4f332d27e99008efa169311db56fe3e9de2cae06c2797dd76657dd4f5222e9e75505bff50e0abcb9565e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\BUTTON.GIF
Filesize706B
MD5c23679cbe61a89356db9441e0b1dc011
SHA1dc58877cd0f6d2768abfe3325e5d820e56441006
SHA256bf1fc92ab93203447b1f5cae45358015a10efad26c0db8b01e1640a833232e91
SHA51205fefeebab3f14712f31d488d4d8eb19fe13937998e4901cd01ac26e71ba02f71006c4279029f6d47f3684db67c03989673f0f0058afb7984c0f5adc3bd7f08c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_OFF.GIF
Filesize1017B
MD5625f0a5c86472c2b453eb4586d7b3e35
SHA16d1454ffdeb3588af7f56e4e362b4c7e195e0c9c
SHA2564003eaeb70ec69f694e1a46932f229e1a9e2519b9105de57625f281adea1b71a
SHA512e7cb4db6ac3992e29982e606c585e44b7521bbf6272a783ae1c8851cfa54591f9949a195104193a3d6061f4500ac3eb4e90777bdaf8c535e892ef2bfd015e9fd
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_ON.GIF
Filesize1KB
MD584fad40ad0325e239a4155c07987775a
SHA116009cd5de071fdf10250ad12de90e2d0302a85c
SHA2561adbbfc480ab02dc1165359dd7ef11a4b6d16366bb938727988ca11507bfb762
SHA512773a69754306b85b9414333774ca65278015b7153df70e5da3763df29fbffd0659efb9c619c7ba47920dac70e22f0768ed90295661eb979e9789e6dea5e394a3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Casual.gif
Filesize6KB
MD575d92c56fe999b7b14e5d00979fbcbdc
SHA1226e5cc998069a60a59d22e56b942b64059cf639
SHA25691c94e5190f794891fbc701d848ec7b3d31980882ac2c8e921df15114d1bf8cd
SHA512f4555b3a0c4369572499aa4cac229f05aefaf4fb08612e20d5c971a2f1b662e6254cc987c8ce28cdf2c407ab32c56c7c50ed1ebf6164d56ae38ff19f1adf65a7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Country.gif
Filesize31KB
MD5920a0cdd99a5b9461485fc4b3e6f19a5
SHA1878ff35acc43310458dee0e052da1650f009fe80
SHA2561fbda57916871bc3b689ad7ebf18064a74f66c580bb5181f95c520caec687be4
SHA512023eb3445a1be7ebd34a71a22b23f5639a3a1e294f8894e93268c4a65a23cf34264e14ff6d008ccdd1d5792677a524c1f0b93cf94b703cd3d2aa0fccd065935a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif
Filesize5KB
MD5b52a2a8e13a2b1f8b1d21a194d16cadd
SHA1f5a71b07f9ff4cedfc357903f0302847222fddd4
SHA256437b815272d143de8254f6641585259d617492b6bb082a7a19c3e538cfba4af5
SHA51279448f04ca21ca628edc62d1cd0603689a2e966cdfd56a8b23e115bd63f304a70723b641a15b3bb2e51ba24dedfe5fe428d85a6918a10a33bb7e15726a2c823a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_GreenTea.gif
Filesize22KB
MD5bc0ae4f7ab9d36b4f0f311d466383e2d
SHA111af55acbe19a2e9089d4bad95752beeda2de700
SHA2564d688944e21e2ae2212fbe85377204bbdcfc7e38e85105510adf05abf0a6544c
SHA512f3df637a5f8fb24fba4ceefcc389fb92d278e584670f9a136e89eee5c375c683f51c4340da19df4ac5f63018ab658fb41ae440331133a3c020e382ba6611a2d7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Groove.gif
Filesize627B
MD5d60f37edf0fd3ead274d0bcd0ba92fae
SHA1ab26f380d1fd7263cfe9f0c9dfa2578e3d5ab87a
SHA25626dce22a0ac6a6933c72dcf0aa59e0407db3711de96fbabe4637b037a7c8b13a
SHA51281a3d596bed407276db5b4f1b410263245f945445d8cd6ae52ea0b3199aa5c0b5d3b600aa2a898adf85765f0e5281a1b6655e714c9ec907cb36cc93ac4ab7ee2
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_LightSpirit.gif
Filesize8KB
MD569af71bccd4bf6bc7f06d6fef269d110
SHA1c6e10489b933bc9218a69bb2cfab22936959eb62
SHA25621200623be5a33a489a60b6e304c5499566f566e98a75861b19429dbccf08d4d
SHA512f8340b6d7b9663e1c4335db5dac39a138c575607e68f6e7e1b8920fc92c03ea792da1336745aa43e52c3df167368bcb484f980cc9409d6addfcce5b0662ab111
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_OliveGreen.gif
Filesize15KB
MD587dd5547dcb179ece439b10109734ba9
SHA173bf873ecb3eebfede18187e3b3cd8a6a7ef110f
SHA2567871abe407b92bac28ec27f42071ac25a36a3a0033183d707b1ba0adef287e6f
SHA51271e59660bdfed7166e4933e610bc78178d62e44c353441f450c5ee28b75fd13da00895ed939e6f0ea4329fa22a2973782fd75deb2fcc7d5f118d49eb5c269f78
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Premium.gif
Filesize6KB
MD5372b45dff746e46fb7b668dbc2845c05
SHA14aa1453b5d8c8c5d1042c571068451e73ef02598
SHA25653d850dd4f43278310a860da638db0b1fe4122e06e97a13d6cb950169d0c1eaf
SHA512603a9447088f761b8a0968cb5eaca64d9af556a511b5acfbec29611acb45b2588a950fdacc7f11f8afe6bb04972b933f6e898ef7512e97483ad6deeb5e511ea2
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_SlateBlue.gif
Filesize20KB
MD52ef203a8de1790eb2831c870fc8b35b8
SHA109bd94c46f9e600e0a752e739f8320a0a27f2f21
SHA2564f993cfd56757cbeeb53b8a0a22434e8033948b21874da6b3de4cd9aa6956fb8
SHA512a87771c5b82e2b3e9156fea6ba38b7184afd3d0488e2df0c3b507c120b57cd85b11b47b15b0560251aa3401870aeec5af82e415aa31db0e578dc041447cb7902
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif
Filesize6KB
MD59c43a7d1b3815cf7363f5f1013fa5940
SHA1c64dbc41c01918901960e9d727254e428ff8f408
SHA25651fb303ba85520af489879abedf1ff3f950b1b818eef720a844f024f3c78f4b9
SHA51287f58390eeba107bae46babebe177f72383afdc2bdfd6e8e2b7043a2e71e13817f59c25b9b33933076b3f87232261c62cd6cac7f1c1618f6d36b957bc12b41ff
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_VelvetRose.gif
Filesize15KB
MD59bb0df9e832f849efd446a3b06a09718
SHA1017f24b5db7dd8708c6b44cd67556f9d09241303
SHA256f8a154c7aa5e4a8cb0e28a45d90ac74df8f75c6d962909f5370737322eb6cf4b
SHA512e3acd306eded7442bfd589b50962d234ac585888ab926e82efeb81edb16c71dbc580080ca3f88f05b378ee0b176318787514275994de69c9fc89f714cc106af1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrow.jpg
Filesize3KB
MD55bb2f34ba95c2851cfe721ac38a13550
SHA193d01e26a50fa217239760eebbcdac41f8621d8c
SHA2564dded27d58ec0c8ea7c60d651f70241d4f4f7d37b41bb62207ca38cb7dfcbed1
SHA51252c24d51bebf38eb1883dd462d0ec8db9ae6197e1b9da0da63746de2125ffbb5d1906db341f58edf984ebef84072995387808d2ded608077daeb75609584f5ee
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp
Filesize2KB
MD561ec76ec6bc84555fa73444770e74f95
SHA13d316963977cc698cccd20b6c80a7dadcc1ab974
SHA256d748efcdbd91f579295497f277c1c3a0b435c7deee301ce19d5eb7682d1e6be1
SHA5129b13e3528ce25089f6c9aed9f39443dc96a45949afca96b48de463cfc79713352bb85806129d9eaac90d1ff4f8ce208bf7025e635b6214060f7b8caf9c2f66ff
-
Filesize
839B
MD5ebd8e0ce3c13abb036ff993b5c69441a
SHA1c19b3856b8575e61a36f6f33680f55d60974a5e2
SHA256be886e3452343a2705ffd339aea6a5fe92979e4131f7069b0d108f3742ac9707
SHA512216218dca10ec7d4c97627f448ee1c40b36fa4c9765fd1401f26c6dd4441237ca4673b5db1957c38fd6e89b91cbb5897ccd83b14255d5d3eb8ca9f6339bb0b76
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormToolImages.jpg
Filesize7KB
MD58ebc1057f88f1be3c5445e8a5333779a
SHA11c9ffaf21f4948ba228cf884312dceebe2551905
SHA256f19f873e26a75f459c0d6bcb15d1e951bd69d98f55bd423604a85a3170f8bed5
SHA512a0c91758a2b9c243a743c640b554e2b40d98d6dd44e93b60157ac94ad1f6b662703de216aeaeed8f25190d6eedfedc43613c30fda281b8eed2705334c2fb0dfd
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\HEADER.GIF
Filesize776B
MD5bf2db25e9bcb3dde6e3f071fd94f3a6d
SHA18c004c5f877c435ba08968118640519e1d928480
SHA2562ceb81d2f3890ceef5579668e8148b5b3b3348e744242bbd94ff42b956269a8d
SHA512ec057cae4e1d4288496f7924e0b748ec7d3a4051154292d14aea4fb7a34c0b2011ddfa32cf0ca15702d5863d5fce39bf0394087212e74e6eb9c5c1bcf46d1f8f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\background.gif
Filesize844B
MD5f70868cf5e12eaacaa0ae3c107023dc3
SHA129aa7efc7984ca3b9154e13bbd6556e104343cd6
SHA25676c60ebc0d652c19f85860cc73cbe318fffe40c4921780bbede5fd6dcba2046e
SHA512519bf7ed636cc0333e12c0ced88f8ab786bba23a9083f03b4f3887e3d1932a14aa8e5607d2b42b34a7db3835242c696573c734e0526fdf499581efa5e8aae589
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\HEADER.GIF
Filesize888B
MD5c144d59d3f73c4211dfcef7b576e8a8d
SHA176af6f12a52efcecbd91ddb6ba880c97411500d1
SHA256eaec35a75f1097a9a59952e812b88e7988ea94d4e8d1531da8881b2f6e248d07
SHA51279a0cea2009fd8cf3b2e157e793544de415a64c88ef1724d13d3e8aeb30dd7a802ad9e4718446190cbd7f4f794040503f7dc76ed02c3ff3ba7d24bc889d22d84
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\HEADER.GIF
Filesize669B
MD5048b7467b30404d7be0e9a6df8459a12
SHA11aeb72d5d02ba4eb7ffb4a0933658465b8efccde
SHA2563005d4c9212b5c9fbbd176679d79c4b973e473a3158cdf3b4572cb38ae70a11a
SHA512ce7acefcf2bf5ae832b806ea948026b5a0685ba94a38414716c7d28d3d5cec66ad902cdd99c4f0ab29444683610176d982e0b2b44808e830f04fc15eef0e4db5
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\HEADER.GIF
Filesize961B
MD582a007c94065c30719e587a9b419a8e3
SHA150046a0ee9a40aea761d354609ab1e1174b3636f
SHA256a499f3bd2505996ea197221f355c09219d1c068eda61a86f0a3ba69f84c1a564
SHA5123fb3f320ddbf2fff61408390d693d89496fe16bab7b4f0cc0185f48bc7bcc03eef8e323eb470693d150f684bf7e28196a0643770866a875b5253ce556e8da4f7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_OFF.GIF
Filesize983B
MD53b753b511f3cff1911943b4bb8ab5bdf
SHA14fa944d1f82440481ab0ba85413f014d52ccc485
SHA256204746679fbc42e59b8fb6f3ae1ce0d3ae1cff030269c2d197f23745c79b0fc5
SHA5126ded188799196b435eff0babba6719ae4a81970d5bacc5c764e571d556b4bef1627b345cee27b058c910ec4eb5cbe7680833c2e3e63d664f22d54db6b894f1fa
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_ON.GIF
Filesize788B
MD537ddec58049807e69e2347f3a72de949
SHA111aa3a2c8cdc74c7e9aaf20d9b0ec0b291c9cb24
SHA256ef8d9ac808a5f240a2bddadd5c93166951009432a122f6a88707de8cf2d44357
SHA5128533bb179e2fba8faeb96dad557b219055072b987df6ddf0eed65e179f961b041fbb0747e0163614fefe53e89f7aa70a4dcf3ded50d8e7da63e055adf9af9c62
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\HEADER.GIF
Filesize2KB
MD5485dd8d4a66a3521ccca9080fa79331a
SHA193eacf2e780705b257fea8987794d28194d71a63
SHA256fc06c8bff23cdb0bf50de0b8521721f526f3ef6f96c551b6b193f8544ffb53d2
SHA512ae17daabbdc13ab9f344f060794d48ff0af35e0b18b5c3cc32bf7b721df579a74946bc0579524d135d2003c0ec5ce1999aeda36fcb133021c1f6d9d044654907
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF
Filesize3KB
MD54538939c2b80103acc86754a083ff2d8
SHA10032c0e73922d16a266ea1084f67f26c03cdc878
SHA25678197a45e72070d470b26123fd607455796d3b3c740c7723aed4c91877046661
SHA512223a293d96255b0546727fd0684cf0f904d201590227b399dac26a93ce00e191684ffce0fa37523c8535549994751a6a7d1b3a9b4248a782cb99b91e15382918
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_OFF.GIF
Filesize983B
MD50b0b4f1ac4bbff96c9bf9b36aa775918
SHA1081cb190b846c3aa04dac178c5856840d8413591
SHA2560726c1a8b7175287f211e1bfa2c8b0bfad9e687dd71811055a266a98ee135cf3
SHA5123508cc601fe3c6ef439a019ca1bebd847dbdecb138e5b8dcd819b51690da9f82d7544e7651da1db9fde491a95c0c7d3e670827629ca24a2ec62a5d8d1c0a01d1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_ON.GIF
Filesize785B
MD563c683b750b77454058bb95a5a5b4734
SHA11030a3490c2977b5b97322a57647e02bfefbf9c6
SHA2561df061f9f29a8bb13fefecd3e7903fb5de90bc745e744b04bee00095eaa7f0fe
SHA512b63958c801a59216a021456c0e76c074127fc4e9c34bd89bbbdd0b5b1ce9047d0b9d387c739b5cd2cfc8703cc44b296a810b97878943e2618675dd6f931029b2
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif
Filesize754B
MD527977388631329734e5a224bd64b9adb
SHA1651a6591370fdba1eaec812e068791d083c8c691
SHA256e6bbd2a5d34f639418bff0e84d5130c7d0f5ad0499caae3d627cede84ca71267
SHA512ee88dc525362b5e4c64dc8266e8289aa1892fab943af04c7bdd12067575821947017d700767a5c1f367976f917ac89bb72e491f4108c42048abe9b37981593a4
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF
Filesize885B
MD5de81ee01fce2c79530cfa2c12ee8b70c
SHA149a8ee606edd32c14bd5e58aa9e7e55081413dc9
SHA256530d47760ade832449f302053ba75486fbde2ec023fc9570639a06f50441412d
SHA512292f29cfda983f4072c8ecbf1b8cd6f9f542e86743442086be018337a8811518c514f33a061ed308dde52bcb828b19fe74f79e4ec995c6f9b5d542dc8fd03bd3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_ON.GIF
Filesize885B
MD57cd6247932f879b1a9d8ba738f4d1f2f
SHA1680eddf482dce761aa876038a48e8a5aaaa3478a
SHA256b05eae051cc48d257a0faa0b5e7723c555aec498ca4329a939b6a77f370ba75d
SHA512186d8d4577d11bebaa3b19b6950c3005264b6182c61932efe00a4dcbee3ed3d10aec68ff99f31ed8c52075c8f7b8e635944595e2774c6a5e092eb94a2a1d86d6
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\background.gif
Filesize7KB
MD5f44c86ad5195193ccb54c30b436f6378
SHA1d06885468b1d78c957b854b3006dc3c5e9197d78
SHA25646f93b0b2eda463b69806d0102b25c7dde7cd880ea3067265747c3f0e7a20c2f
SHA5121919e804b5c0baa50cadcad02ef8a032a1665ae21d2b7371e047ce6d21343725e64d8fd51f539f624b3ba33803c8a3920efc5f7d9861b1b269f6dbecd17464bc
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\BUTTON.GIF
Filesize949B
MD5f9f34122d084a164cb23e80e904316a7
SHA1d99f855630ef10c4061f4148766aa53688964aa0
SHA256f586606014297b9484c629eb996a76c2a9cdee73fcd65b604f3aad302b8ba93f
SHA5129ae27808ebda414ef0fcfc5b055074e911548434fcc3c639f557b863f20446d5f97d0071c0dfdbd5711dfca5cca0fe27f1a6dd953fd40baa58e0a04d9c1b255e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF
Filesize26KB
MD5bfd74d8323a39822387fc2bc525f9750
SHA14b784f28b9be41870dc13a11d36f302032cf6fe8
SHA2563d175f1a1c593a24730fed845c01ee376fd4ddd6ffdd7c7bf2684b4dd480a128
SHA5126653a67159c5bdc521786bf974cb0627d23d99fe1e6a934224790e47716acad37b24eea3b06a599d3fcdb0a12ae0d4968c7767d2d5ee6c27ca9b3d733a744b91
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\background.gif
Filesize1KB
MD5d90a289877515a69a0e0b09ba7ffbe75
SHA11cd550bdf32e724ccb56101d2f49be569402b0d0
SHA25610c8c926f43413334d9125be4c4cd856e7e7b9b426ebcb1f13d4a9e9a5ad0e03
SHA512bfb8e2443bd531d78320d13f8ed2c698fd9020ccde91f68af854954308b55cdf5a598b64cf133416d3e20deb64dc9f2fdd3990fc0cf444069cc06b53abdafb12
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\RTF_BOLD.GIF
Filesize1KB
MD5d437e5592622cc0e78494390053c6ae1
SHA10ace972cb8aa76427a1d1665f0ddc5414a95ea03
SHA25697dec80dbfb11c7520e91f51d963fb5cce2b79f41663316e291cac9efda47626
SHA51240e06dbe8e4cc17e6d5ea3d873ea067eaa4395c357f4b9536bfe71dc2227d40df65d7b72f027f1b5d8c85bec0ea61d6534853d578ecbcaec8f33a9625a1c2071
-
Filesize
839B
MD53676d512cdd68c9a1453c4538a247646
SHA13947af290eee1138d2c4ff64159199906d72e615
SHA2562f1d616b4d11e01095c01ddc0aab4121a03fbd0a634e1aed5a0650bd1f295469
SHA512cf5ffdc846f7344229c33cbb35b7223752998d2fac82296b47fd5513e71e0d756550aba39c0e748e95d7adda1910e938b573d58852e1cad28a9719c39a4e2e75
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ViewHeaderPreview.jpg
Filesize3KB
MD5552880756d29ed169b118ac5e91029f2
SHA18f1de7a5db7a8ee35033c39c04bcf34e46048a1f
SHA25693e772dc9c6a042706b28e78907cee10416a51e898a0a93d088278bfcd375d28
SHA51245c65deda88bc37cf5265ebcf95985df9bb390bf46adf0e83f5f652c846468d50deee5c8ceeb23f4bef1b9c24a83491f9004c25d0aa3b4e2bad9544f506bdb1c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\attention.gif
Filesize3KB
MD5adc07193e7a6cc3d8998f4a083bbf3e0
SHA1da49d4cd097c3c7a41c9ded775c7eddbb587d01d
SHA25631b5dc983f0b381f1faece53abaebcfc3637643d409e5dfa396a8b4c1eb63adf
SHA512bf4833721de5f2d16bc1ed23c39e07ae9de8ee4c113f59c7a5d0dfef5e38bba8cfe0715654fc18bd28dedd5f504128792302e9549d5a892492c121115018fcb8
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageBlank.gif
Filesize20KB
MD548165e2487c3947c637fdbf2e5f532bf
SHA14fedeccf9114d1a4fe69f74712c46cc583072bdd
SHA256a416113ef1c98dc9f75c11c9c37ec1c3b0c3ab9e4f8613d2472b9cfc2a6c1c35
SHA5124a9719e2235730ec12cf1659863ce6a9c30de36924ae9a490c573297fb2dffb73243c1944c051da21c4f8d2d05e390c508e7e0ed800ff266aa368c5e573de34a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_choosefont.gif
Filesize1KB
MD55ef293209a8f48e239b21087c333b54d
SHA1c63e29746c21aecfc0dec5d83b8c22ea25a38c02
SHA25684b6a37e0578b0c8b979fa1341d9a50424b21c05b6aaccad620b4b433f2d4d51
SHA5122ad2e3314e5c3f132d606a9ca542576668316d9c9c09137732cd5521e0ce50a4a77c099d919ead7405e08cf0d45345e047e0117d0aaac014d34647566563aa4d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_italic.gif
Filesize1KB
MD50bb36f3f042917ccf6d2adc67aa63e8f
SHA1c4479c425c2a18e891d74f1b74194a74d21b9977
SHA256bdedafa9593a624ad8e0c40505b77f7a8ad29b1aac98ccc69917aec74cd5e822
SHA512da0de3aa55f170b9f182a5fe4aa25518dc5e0ed7a88bd3e5b91d5c9b84beaab126a188cb5abba119950ab0868fc86c624adbc467cc9b2eb7d44a59d716ea5746
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif
Filesize1KB
MD58da70d7058e6eba785b4767a7b4f02ad
SHA1a854fec172ec1efed94857fe981d87126773d4af
SHA256a165792fac88521c5cf000fb298b7b6ca8335d5250acd91244c55e0cbbc8b8cc
SHA5125a14be593db3b74896952f881f5d8d9de5967fa327440e6f9412a50d870ea8b5ca9206d4394857f538bb953130cc2dc217403a1ea5f27599548737b47c73f058
-
Filesize
1KB
MD5a5dd4ae29c2cab7eaf27d774ba465422
SHA1aeafc334caa26f3827185c0fc2faf3d9139b1d9f
SHA2560b50d71ac232a09218b609ef84cc7f38054f9681ec8a83d311a657e115e6b15e
SHA5125eb0c8169cd4a277ea17889482f9c1aefbc703a2ef42453744ac8a413da7c64987b237f7949fc9d97139179a48299fb7e087b26de2c6d7df11aa667960aafbed
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\CALENDAR.GIF
Filesize1KB
MD5caf519a6b3ed61a1b5af0c597c1726b1
SHA1a4f74df90699d5d00380bc3996ba417a139e74a0
SHA256af29915de333d238c13b5eb5121d563b78ab0a8158e91dca0a01d6100b4c8ec3
SHA5124ad39140d43716973e54b26416a6fcbbbbf3e128f19a69ec2b64c98e6166d6ea339d173c168eb009c04068ab3efe774888db9ea5c5d349fedb3c0fe51175e891
-
Filesize
1KB
MD5bad134ae5be6e73f2e6bc683a50e9c9d
SHA1e9a7af8a59b908fb196e622d1f9c7ac811cebb61
SHA25688a80d5c5ee5ab4641af19d16c8bc1d0be0bf00cf7f8c45f4ff0803cdb2ee936
SHA512e15aa910f12834e246c7bac26becc1697b0cbd96c3a838891289ae9eb78488d8452043b5fb51053f4d11e01f50337cefdf215fa447e6e74d94222dd783d481dd
-
Filesize
1KB
MD5127122d59876f612be1d2ad08f9a8f82
SHA1658c41ba503da2862d86abedf293ec290500bda9
SHA256ae202e22bc648cc6429956f2665e65f442a077dea53e7d38de462674ae79ac42
SHA512dcddc3ca26a1828fa50921424f50604818748ad20994963bef9fd27be5e665d94ef738cb583d256a884c79acf4e324b5d92f6f37f88b7f59e00cab4128769980
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIcons.jpg
Filesize5KB
MD591e6791ab8919ffd7bbcbb93b685bec4
SHA16b134d0ff842e9746a9c8f0851e8f24c92885ace
SHA2569f8d1f48e461dcd2952ddbc9ff9744c83b32c6d82274e175e6f3be31f157bf5e
SHA512b2d07a5e455a3a678d6193a2d0e836bc9d23f136c68b54f907e29764d6ecb23499cef24d6f454e9ee7b67bcfb50701f62b99c0ec33d707eeeb566f152da60421
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp
Filesize2KB
MD5973bfd86475face0ec9930f49b70dc31
SHA1fa07132059065cdbca2ad0bcbfabc43ada28a2ec
SHA256c8f7119d11dfdc792f6123033bb72ebb73709bc3d9013ff79b43c8a7c02e713c
SHA51284d740c9f3165aad7620c3b52159fd55df7e9d361ec14afd2011a76aa1338a17969178b897e18d2d3777facbf0c792a0f125ef321920867d5e0cc49dd462c1a9
-
Filesize
1KB
MD556fef7b0baa2a9a7900a7c5b60004746
SHA1ac9230e2279e1f6327c0db9148e47096c9ed75cf
SHA2567c24dee06bd5d25f6b05e5d1221692d5107f61cb4e8133eae85ba8c3af3634b1
SHA512903746c5555d980002a5af933671a057952123279b95bf01c61f5facea13b81299247e06a924d27f67a70c28b991643928d3f4c6a381ff675cb3a86f6d841df3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignleft.gif
Filesize1KB
MD5b7ff695869702fe6d7c7a0349650e1e3
SHA10c9e584225146fd6efb8d02e38bcb076b9775030
SHA2567eaa9dad3db62d3f8a798c7dd8696503f55dd9a3cbc851d9a8d4f027382d6e8a
SHA512be372558c94d2a15eb27c533c1e27cb571160401253443e6ed4e3fd2fa302076af53ab34de4efc4c3b362eb7a3385d204c73a35b124e11de3eec57a80997085f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignright.gif
Filesize1KB
MD572f57566b0bdc1576ecc77b788ff7203
SHA1b9123b3e7fe6991561f8aa11d69d9c14987aa6c1
SHA256a60b91df7d26dc6a81dfd9c3dfbeacf627a1fb582cc3751fba4163e0afe6f69d
SHA5128cf2bf9984691edb91decc23b8d95a59d8d63cbd688a6cbd78ea8d5cb7dcb698ba6ddee32246ef421921a5d020cf4750d974ca68118237a268c9c451eca23c6c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_bullets.gif
Filesize1KB
MD58a7cf28691b7ee4ba3b53f638be204b2
SHA121e2568be7a655ab1d068765714ba6980fd9434f
SHA25661635b7d9dea8769ff82afe57d65cd867ed22051a73e2a6d0fb26f3741ba4e7c
SHA5127092e950cb969e162b870d0c24365b98390f4d86d9d4107cb81aa8f38684406799a3327e385b084b772b377a496e2891f8e8a0618f45a053048fd7fd229ef0da
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_center.gif
Filesize1KB
MD5ef13d1676d813ef59b9767b7695b2158
SHA117af7ca1c354b326dbd9a30b8dc51e702a7f830c
SHA2561c1ee50744f14957472f411b7f41d8a7e3864861db6dbf01a3309d7b01237016
SHA51285d12014660051d18bb48a82239cb20110397ac2d82b192d2400f85b0af16a765e477c1fa50edd769586aa0c1c8f98b5d55079945dbdabed42ed898a2628c31d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif
Filesize1KB
MD5dd25755980b514539913a8a8c3afe961
SHA158a8633348cb443425442b42abb301bb33e8a63e
SHA256d68d63c56670446694db6c33a403a104550c680044fa4ec8be2b89ebdb6a2de3
SHA512c004a6dd4ecfc5f5eb14edc858a95c856d638b6c2701b55d7f28ff8ce2a0811be3f1a8fdea2a6684438980cb9a949c86fdc5e2751bfe35e62add9305c37cb18d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_increaseindent.gif
Filesize1KB
MD5127e39afb78596b8e64153b3e9c415e4
SHA13219bcf0c077bef001a2772f0524a843d1a05346
SHA256001eba7285e79eec1b5be82a40ac13f2684ecf211d802b769b1764caf4866472
SHA51259073cabfddc7f03b55d5fd41f6778a047bf9c80538564a1531e7e45502f94df66d85834da6cc3073615c8a970dd769b499d7e32bbc4bb8698f6ae5cae5a0823
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_justify.gif
Filesize1KB
MD5fae25eccf0f7129ba232e7a11a15eb59
SHA15b7d3e5583cb9d91d164f64297063c40d810440b
SHA256be46a667d63442c0701184c4ec9e4cb21ef6646f50c2defc5091509f9c303447
SHA5125dcbea9ba1421c020b7e92d51a1df785cd75b1748aa70311b45bc5d117427e80ddc511d666c4b3091182cfc78987dcf76eae531a7a3b16a19336901687bce4d3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_pressed.gif
Filesize1KB
MD5efdbc365e0b767f096c070acdd27df73
SHA18058a7d73f16bbacd03215fa2ccf8df80daec68b
SHA256523105108c1dd73f2b5b1d98fea110a633da1c1ae100c3da8edff0377cd3b35c
SHA512ac87e1e3329a2dfed2fa9412f77d538f8c6e97dc1b06a4081860d1b80bdc54828740d96d91e497ab7671164fd1630eeaadd8ed8f41bdeafbb4027906ae9c4a64
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\Microsoft.Office.InfoPath.xml
Filesize247KB
MD5b76751c027559410735087770ec0c89f
SHA1721745ff2edec0bfa97ddaadd6fe18fe841775fe
SHA256ff4325aad0e311c44e22bd6e1ed843c0c611a712efb83115df3a7de557bc58a0
SHA51292c2fdf49673416ec26b72e829bcdebaf63ff6fb05c6b5bee801c98268aae15b2e7b12094a21a7bbcf290d1c586fb2ff63c614bd4a92f19b5806296f9f5244e2
-
Filesize
1KB
MD503b14b96da3ad60468ed7fd9c13b55c4
SHA1f3c096441bf58e948bb8a798232dc38ffd7319ef
SHA256cfa0a55c0a285643d46fab1988afb807474b87c2da25feb8d05188b83d2bafef
SHA512196edfb9726e0afef4e7e7aab3c1ed96eaa55f5d31f261a85bae3fa46ebf8da02d84e44ac32c23d17058fd583f825bb7111192929255e00e50b4e771834197fc
-
Filesize
1KB
MD5c91d067c4373b468c38f0cc478694c95
SHA1e4842b4d6c87d3abd875da5ed9dca656c1e7088a
SHA25624b750316bb1662657dae6d313946e0d0f0a0f86b694744ecd239a9c41bc0514
SHA512361fd43063d45c618eaf5fcf9093da37a92307ef581d3aa29adefaad6ff19289df737ddb734215a925d14c603b4e15d11a528480b573cc237a85066be6f69452
-
Filesize
6KB
MD5de0069ca1bdff4b62e3e99a5cb74a295
SHA12295a68a92126543ac880f0f22661886e8ff4490
SHA25640dec31583536c5923c5857f0a7cf0a04430f468f336e0c0f3907a21385bfebf
SHA5126488338afc23b40dfe8d02c2a1f10662f561e8eaa965507fcc8dd2bfcf56a272210b97d66296c081bcfaa18011d42cc5200fbef6fad8c097de4238b439a380ed
-
Filesize
674B
MD54099f4d55ae35594d11a3e00ac098eca
SHA145019b324ced3db6cbd3268ead9eabe62a8cdd4c
SHA2561c88a0077ba4b601f0dcfd736812c1bf5275f3bdd04aa5a321c4e005638976ad
SHA512c41e92a3a8b9c647b14c8799288c84afd792989013368d23217ecf3d7e781537933e17d46a1bc14037be70945593583a9b92c971797a51592f7877d528f4eab3
-
Filesize
548B
MD58df0c5b65369941f0abc6949914ef8e0
SHA1ed59661452b08b868ad7187ea70f8817f04ecddf
SHA2569b67f9511d11a01745ed44f02a5405bf2dd26418f926393d4181bebbfb178c78
SHA5125ba2016c678dd863511bda4d778150b27074c10bf1ed10879c627ec8c1f096959a1957b78dd21eca617ceb5b081208643dadd29a26a92403803473b87494fec7
-
Filesize
548B
MD54b7744129fabbb3bf4782d6cb9e6047d
SHA1a14b86bcbe561fadefc84f1308a74bc1d196acf0
SHA2564b2a08d59b80fc035373eddfa90d2bbba3e621fc18c226ba07a6e8a129effb2e
SHA512366bfa0d7c695dce31fb490e91eb5a6710181d254c71939a54e0ac7309a12c77dafbac7db588c1574b835e483fe7fcc9b6813379c36882e349007620bd9bd087
-
Filesize
548B
MD57f6ab5efb446554e51668c349435c57b
SHA10e2b0b318be9a247c96b7b46102ad73d072a7e38
SHA25610cd4cb3e9a8225673c28bd18fcfe8a96404cc5bffabc84b6a2665c127f1fc39
SHA5124bcbc7c781864b1b5c0a1ebc239f701b835d66415e48e006a5a1789bc817ae081aeb1b466dc12684734b6f038f89220b2c3832df9908845a5ed7d66071a0f8e8
-
Filesize
548B
MD5a4961ebc2b1cf16ff65dae569be81eb0
SHA17e7b9a2045ca7f27c12f7c6f85d44420263d02a0
SHA25670181ee8cd0c65ff6bcf5549e05d458f9b9e43c39783fc39ea0e730bf7219105
SHA5129f8052db2b060e156c9f3e83e3b20f84acd577e6c160fa73502bf5e05f59f6b3fa93f2a3dbe6d2095d2837175695a4fb56423adfb62b94830b8995c51dc8d1eb
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD51f9e7c7fb42c306e64a5c249b912e47f
SHA143fca05b5ec7c275d268cdeb1906e2993bed28a4
SHA2563038aa7c8a9ed1c92822eca0c691b7a19e0353447460a1da1f92cd351fd6b56e
SHA512477f807b8f7ebb318bf875506b068c4cbc2fee1328be1e4b7feddb522f2e41f1742f8e410478edc3f71a305c4580188a5c8c6f33240bc61c60d1148700927ccc
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize9KB
MD512df3932c74cc95f0f29899cad6fd2da
SHA14970ebfd3b8e557e091fdb138fc0c2b29974e2eb
SHA256013989911bad57c3a2881be4df186cfad22613a2871a3063a991839ca725b0fc
SHA512d59fedb2da68218e77807b2045067b8218fdb17ccd2c960930198feea1e619f182d0fe9fde9823859af56df0edbb2d9550a796a648ac803e701501f5fc508a17
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf
Filesize578B
MD5991d5b006ccfecc0d9c5fcfbf71fd3da
SHA11fe3e2cf445ffb34cd6ac926b10baa48da9c2e00
SHA2565fb2ba16a54044f13aff3271d39c08756e81611d73904b725caae69ec79b14d0
SHA512b9e907120cb8ddfdae99d40d665d27e3704eeec95bb5821e8546a90bfc3bd850efc46dcb19b7d6891f39dd10acdf1620fb6b8e803c94f990d366943c959dde29
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt
Filesize11KB
MD51ec6c46d794a3ee785234b7fb073c919
SHA193b813fb7dc2d4ce9242ac7f5ab2676f5343d4b2
SHA256e80bf5ff9a25460c21b6183b09bc3c55ee7b89b9e75e04c950f1d4320b0dde65
SHA5121e471b5e1dc26f0cd99d31ddf0b68cad4886c7ea94ce6bb174693a4cfef8fb0c1099c05f96c82f252aecb892326f08b688ca156a6ffcbf370afa68daffccfe23
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA
Filesize8KB
MD50fcce88d9eea9a9fa036f6f95965ae47
SHA13fa5a879a2c8c2d2ac516c0269ce5f526db1356b
SHA256bd9ec3e2580237a8a20320a5989d1834095a4d6f3923bd65321f746111afeba1
SHA51272fdac07b59f89c39ca3de58325e6c82b406b615b0a0f5ab020a306f53aa8a87fd4e900cd078ed08089ea7e0243d0e1a7a33f6f6315fc7c51067c56fde70daeb
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA
Filesize8KB
MD55f4b293dbf0c7d0dc8181006897305d1
SHA1af3d963e80d06ed3b196e8121ca7913a24b7fae2
SHA256b9a3900c30a9e2414eb27aafa0764850b08eb45fd574873abc295fd2776b3463
SHA512cc5998e21d220dc6f245c49619a755d8b84a081282974fbad4cc761b0dad7bdcd5e4317cad442fe293353f1f02bed277c7d85b569621004447907f987a24d327
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\MANIFEST.MF
Filesize654B
MD500a8135a5c5a368b7dcaac40a85f95e5
SHA136596cdccecc58081df8d5a0f317defb6d60ff0b
SHA2563f4ebe097ed3d40a6cc0b113bcee6f1537b191edff706c94495fb9030d61d8ec
SHA512fc2e7d27c7edda0a738cc4045a3e9470c671cb4d3239d52ef53c900eaf2873ba9935027a3166faec9818312052ca436472a58ec83d84396539ada705e8979201
-
Filesize
3KB
MD5c440e5016fef0e0db2fd1b487ba45e14
SHA1c581d324381b68817e0e928343c093aa837d6d2b
SHA256ac1b8e512d78f9ffb3acdf5e3e8eac6cec999052dbc34ab3b6c39e51322b78e4
SHA5121113a48bbff47d8e6ecb945122f5b0c647a58865c0fb24cfd142243b5566672e6ea3da70253c44bd02db55651cad889a21380669557126d1fde59529fd4f34ac
-
Filesize
562B
MD5a032cfaea5c6505dba526ac017e6efce
SHA17b6af42ea8e340804ebdde2b09ce0d70127a5ab5
SHA25638d094172f558e3cafcfd936001f1b7882327d3c5ced1e2c277eaa8818c680f8
SHA512b1f24f91ea89832387ef5f6963de4c3047e7d98968d66065b035b004c567b5fc1efcd5c05556ed5154f0ddecd7d1d09432c52e4285ae602e0dfb1054dbc894ce
-
Filesize
109KB
MD54984d19e5559521fca6bbf69a2c656ad
SHA13d5b8569edc088d4feb59a9687656aae4b1e13be
SHA2563c8cdd5b465f83f519152157e87b83e1fb9896c7ac3cc8658ea594b9a83a3b61
SHA512a61bddb5f7352071639ed8c3ea8fa6c8302254f0a4bcd36727503f9a635069b9a0390b7d51623b4a9153c305a7d1e0ff86679b11ae791e3dafd0cb4f4ad50e81
-
Filesize
173KB
MD5fba5ee7176beb77b989995290b5cf812
SHA1724971f9add8c6432b573056b39699161fe158e3
SHA256d8540e2b24e2f3eeaf093832786d499110fa05c88f3c4530a9827be509a8e469
SHA512aad125f1f1d8af117ba4b6d82d131f376dc6a81041bd1f92953f401f7ea97183a2a9e878a48fd549f5001f76d35e5cdb2c065d6bf07653226d2e5697c3f4d471
-
Filesize
4KB
MD569a26e11cb0fe5dfb97f58d6ca7d269b
SHA1f0ce210d701bbf601eb8c6ed3cd8ffdf8b191d70
SHA25688e746882907d56f17db398b18885e752fd4dcbe6d574bad5f60f8105578a001
SHA5125651315c9ffcd2fcc1c0d25a6e17da5221fe0fff10b9f94f562a250cb82b46e8b16e328d0eafb827a32054d68b451f3bf46929e59e7d1910c2fa5ceb58522193
-
Filesize
548B
MD56375065affebafd165df8a3ea556f1cc
SHA132158c028de13703d9e6383900ee783dcb831404
SHA2565e76e1492fa9854d94d2356d43a79e12374bab8be23be5789883eeba1c8955fc
SHA512f50e121871755ed3077e2993834d81f405336e66988d133b3dcd2049535a50e898797dfcf16ff65e955474b6f73f69978443bf172892bb61c4a199c23a2df289
-
Filesize
1KB
MD5495825802301e4a33d86c032ae9162fd
SHA150e665fcb321a891f15b2c4edd4793733e1c7c33
SHA25651fce5a18cef47f068526d0c50dc4d27904f4921fee4fd2e0a64e1bf4dccac22
SHA512df82f2c858ba48059b9c8fd4bbed39ca4ec0e7ed209269dd99c80f875c038cef106405f57bc7f09cd7fff7de2bc374e6a8982e10b77f1513c047caada38d4c49
-
Filesize
548B
MD5d21e1ca73a416ce0e087ed1843342aec
SHA11231f8d5b8e0f44ac7dfe64a532ac20ea07ece25
SHA256724072482f2f6eb429c941f0341613df83ba4290417176db663526fca4cdbc24
SHA5124d9cd591fe2c178fe41722c48176b36e1759aa597954c55d601ba8ad59619c249f9c2227b60ce800b148342873f1113ee68545719e5041f9031b13055e7de35b
-
Filesize
548B
MD515b3e35fcf5bac4d94292af60310665e
SHA1589e09b7698681c88fbc57d2628f8dab217afced
SHA256ed5e3028de3ee77828a52d3907fdbe6ea523b40c4bf6f6416837fbeec110c510
SHA5120a6c7c4ff8888709943175627211453a08548404ea5c04ded2e4825b40d0343ff8d600626f927f2d63c2d2890c4d0f26949ce1dbe48dcc751add20b37d9fd636
-
Filesize
548B
MD5ec8b5bf3a3560ca84111292e91eb9570
SHA13a7706df5d28ed3c716cd5729187912d994eb878
SHA2561b018eee7b9a57f7def0ce4744e490e69775d6fde5825e1611f1b2f7604ca912
SHA512da469e39103617361de9f6a71e1fea9838b4b226d1fe78a370a2bfd3934dad3057b91cfd0a1fddacc2d5dff20f0a92a8a393227942a473fd50d11758f0c3cb9b
-
Filesize
548B
MD5ac007191987d834069e9fe58ff422cca
SHA1a9ac493419a078bd7c453d01ff559f1d3ed59f5a
SHA2561d0267ddc9b630e65ef1f177b2048493bc2812b932dc919b1e43d32041c4c748
SHA51283d2a7c9d2346b062f40f2030ef84d6012f147bc534d63aa9110a3f847061109b347d602c13e48757997fbb3354a604281e706120593ac6d3ae141d9c774f65d
-
Filesize
548B
MD51dfa18d5bc0767431c8fdc9cbe050747
SHA16c47a13c45142d19d9ed4acb929a313bba2633da
SHA256433d1498c242b6d1b3230c4f30088a7b268fd76389a65d9032a390493a3bc7b4
SHA512171c775e00a46f4a4429606459264b0dca23bdb735a0de6594720c502822ab7cb076bd8ba55015e953a1ae2a5e2edc029c7f2fd2a08da0f9eded709f45fde01e
-
Filesize
548B
MD5466508b34325376593c976f57767bd7a
SHA1c647c1aa29e1484cb1b5e2a3174a283b51b5353c
SHA256cdcdae70a791957b6ec7481fdcab1633a536f23b1753ea6af98db802ba624317
SHA512eaee8a17cdce6f07699c4518886bd6d5dc118c45bf03915934ac61df5fd43f062d266095627fb6ce05e047796b80f95bed95c57587dd81c35269b4b9a8078879
-
Filesize
584KB
MD5675a56f3c964d22db78b4cdf2e886827
SHA167c15d53485bedb3d2fdeb0cf030802f728e8fe0
SHA25638026b6f5f462bab26f08b70d60c8b3bd799e0d38da4654715455616dc424d82
SHA512e81665af9e3aab7b2a365cdf72f4a166578264d15af8bb7668e017e4b4deaf26d39fcf72e96772e0bef2ed5378832d8c1e171e7fe93b621cfaa7791a17079682
-
Filesize
28KB
MD5c37e4dee479367fdd9ab9f7a4c6dd351
SHA159c7b12a9b08e399c4c0f7bb6c751eae5ac3e812
SHA256cac02104746cd760a92edaa37b0954e8b3fc158f15843f2578845947380bf844
SHA512e7cc9cc6b479228bbea027c9625c0eaba09c83479c7bf861fbdc6c7a17fd436a3c3b8d413ead1be800449c82bf144a572eb71b34000137b9d6f7766b4215233a
-
Filesize
37KB
MD58ec649431556fe44554f17d09ad20dd6
SHA1b058fbcd4166a90dc0d0333010cca666883dbfb1
SHA256d1faee8dabc281e66514f9ceb757ba39a6747c83a1cf137f4b284a9b324f3dc4
SHA51278f0d0f87b4e217f12a0d66c4dfa7ad7cf4991d46fdddfaeae47474a10ce15506d79a2145a3432a149386083c067432f42f441c88922731d30cd7ebfe8748460
-
Filesize
37KB
MD5d6f9ccfaad9a2fb0089b43509b82786b
SHA13b4539ea537150e088811a22e0e186d06c5a743d
SHA2569af50adf3be17dc18ab4efafcf6c6fb6110336be4ea362a7b56b117e3fb54c73
SHA5128af1d5f67dad016e245bdda43cc53a5b7746372f90750cfcca0d31d634f2b706b632413c815334c0acfded4dd77862d368d4a69fe60c8c332bc54cece7a4c3cd
-
Filesize
37KB
MD56c734f672db60259149add7cc51d2ef0
SHA12e50c8c44b336677812b518c93faab76c572669b
SHA25624945bb9c3dcd8a9b5290e073b70534da9c22d5cd7fda455e5816483a27d9a7d
SHA5121b4f5b4d4549ed37e504e62fbcb788226cfb24db4bfb931bc52c12d2bb8ba24b19c46f2ced297ef7c054344ef50b997357e2156f206e4d5b91fdbf8878649330
-
Filesize
37KB
MD57ac9f8d002a8e0d840c376f6df687c65
SHA1a364c6827fe70bb819b8c1332de40bcfa2fa376b
SHA25666123f7c09e970be594abe74073f7708d42a54b1644722a30887b904d823e232
SHA5120dd36611821d8e9ad53deb5ff4ee16944301c3b6bb5474f6f7683086cde46d5041974ec9b1d3fb9a6c82d9940a5b8aec75d51162999e7096154ad519876051fe
-
Filesize
37KB
MD5c76ee61d62a3e5698ffccb8ff0fda04c
SHA1371b35900d1c9bfaff75bbe782280b251da92d0e
SHA256fbf7d12dd702540cbaeeecf7bddf64158432ef4011bace2a84f5b5112aefe740
SHA512a76fee1eb0d3585fa16d9618b8e76b8e144787448a2b8ff5fbd72a816cbd89b26d64db590a2a475805b14a9484fc00dbc3642d0014954ec7850795dcf2aa1ee7
-
Filesize
37KB
MD5e6c863379822593726ad5e4ade69862a
SHA14fe1522c827f8509b0cd7b16b4d8dfb09eee9572
SHA256ae43886fee752fb4a20bb66793cdd40d6f8b26b2bf8f5fbd4371e553ef6d6433
SHA51231d1ae492e78ed3746e907c72296346920f5f19783254a1d2cb8c1e3bff766de0d3db4b7b710ed72991d0f98d9f0271caefc7a90e8ec0fe406107e3415f0107e
-
Filesize
37KB
MD5c936e231c240fbf47e013423471d0b27
SHA136fabff4b2b4dfe7e092727e953795416b4cd98f
SHA256629bf48c1295616cbbb7f9f406324e0d4fcd79310f16d487dd4c849e408a4202
SHA512065793554be2c86c03351adc5a1027202b8c6faf8e460f61cc5e87bcd2fe776ee0c086877e75ad677835929711bea182c03e20e872389dfb7d641e17a1f89570
-
Filesize
37KB
MD50ab873a131ea28633cb7656fb2d5f964
SHA1e0494f57aa8193b98e514f2bc5e9dc80b9b5eff0
SHA256a83e219dd110898dfe516f44fb51106b0ae0aca9cc19181a950cd2688bbeeed2
SHA5124859758f04fe662d58dc32c9d290b1fa95f66e58aef7e27bc4b6609cc9b511aa688f6922dbf9d609bf9854b619e1645b974e366c75431c3737c3feed60426994
-
Filesize
37KB
MD5c252459c93b6240bb2b115a652426d80
SHA1d0dffc518bbd20ce56b68513b6eae9b14435ed27
SHA256b31ea30a8d68c68608554a7cb610f4af28f8c48730945e3e352b84eddef39402
SHA5120dcfcddd9f77c7d1314f56db213bd40f47a03f6df1cf9b6f3fb8ac4ff6234ca321d5e7229cf9c7cb6be62e5aa5f3aa3f2f85a1a62267db36c6eab9e154165997
-
Filesize
37KB
MD5d32bf2f67849ffb91b4c03f1fa06d205
SHA131af5fdb852089cde1a95a156bb981d359b5cd58
SHA2561123f4aea34d40911ad174f7dda51717511d4fa2ce00d2ca7f7f8e3051c1a968
SHA5121e08549dfcbcfbe2b9c98cd2b18e4ee35682e6323d6334dc2a075abb73083c30229ccd720d240bcda197709f0b90a0109fa60af9f14765da5f457a8c5fce670a
-
Filesize
37KB
MD54c1e3672aafbfd61dc7a8129dc8b36b5
SHA115af5797e541c7e609ddf3aba1aaf33717e61464
SHA2566dac4351c20e77b7a2095ece90416792b7e89578f509b15768c9775cf4fd9e81
SHA512eab1eabca0c270c78b8f80989df8b9503bdff4b6368a74ad247c67f9c2f74fa0376761e40f86d28c99b1175db64c4c0d609bedfd0d60204d71cd411c71de7c20
-
Filesize
37KB
MD5012a1710767af3ee07f61bfdcd47ca08
SHA17895a89ccae55a20322c04a0121a9ae612de24f4
SHA25612d159181d496492a057629a49fb90f3d8be194a34872d8d039d53fb44ea4c3c
SHA512e023cac97cba4426609aeaa37191b426ff1d5856638146feab837e59e3343434a2bb8890b538fdf9391e492cbefcf4afde8e29620710d6bd06b8c1ad226b5ec4
-
Filesize
37KB
MD5f18f47c259d94dcf15f3f53fc1e4473a
SHA1e4602677b694a5dd36c69b2f434bedb2a9e3206c
SHA25634546f0ecf4cd9805c0b023142f309cbb95cfcc080ed27ff43fb6483165218c1
SHA512181a5aa4eed47f21268e73d0f9d544e1ceb9717d3abf79b6086584ba7bdb7387052d7958c25ebe687bfdcd0b6cca9d8cf12630234676394f997b80c745edaa38
-
Filesize
37KB
MD5a8e9ea9debdbdf5d9cf6a0a0964c727b
SHA1aee004b0b6534e84383e847e4dd44a4ee6843751
SHA256b388a205f12a6301a358449471381761555edf1bf208c91ab02461822190cbcf
SHA5127037ffe416710c69a01ffd93772044cfb354fbf5b8fd7c5f24a3eabb4d9ddb91f4a9c386af4c2be74c7ffdbb0c93a32ff3752b6ab413261833b0ece7b7b1cb55
-
Filesize
37KB
MD5296bcd1669b77f8e70f9e13299de957e
SHA18458af00c5e9341ad8c7f2d0e914e8b924981e7e
SHA2566f05cae614ca0e4751b2aaceea95716fd37a6bf3fae81ff1c565313b30b1aba2
SHA5124e58a0f063407aed64c1cb59e4f46c20ff5b9391a02ceff9561456fef1252c1cdd0055417a57d6e946ec7b5821963c1e96eaf1dd750a95ca9136764443df93d7
-
Filesize
37KB
MD57e87c49d0b787d073bf9d687b5ec5c6f
SHA16606359f4d88213f36c35b3ec9a05df2e2e82b4e
SHA256d811283c4e4c76cb1ce3f23528e542cff4747af033318f42b9f2deb23180c4af
SHA512926d676186ec0b58b852ee0b41f171729b908a5be9ce5a791199d6d41f01569bcdc1fddd067f41bddf5cdde72b8291c4b4f65983ba318088a4d2d5d5f5cd53af
-
Filesize
37KB
MD5042dfd075ab75654c3cf54fb2d422641
SHA1d7f6ac6dc57e0ec7193beb74639fe92d8cd1ecb9
SHA256b91fb228051f1720427709ff849048bfd01388d98335e4766cd1c4808edc5136
SHA512fada24d6b3992f39119fe8e51b8da1f6a6ca42148a0c21e61255643e976fde52076093403ccbc4c7cd2f62ccb3cdedd9860f2ac253bb5082fb9fe8f31d88200d
-
Filesize
37KB
MD5476d959b461d1098259293cfa99406df
SHA1ad5091a232b53057968f059d18b7cfe22ce24aab
SHA25647f2a0b4b54b053563ba60d206f1e5bd839ab60737f535c9b5c01d64af119f90
SHA5129c5284895072d032114429482ccc9b62b073447de35de2d391f6acad53e3d133810b940efb1ed17d8bd54d24fce0af6446be850c86766406e996019fcc3a4e6e
-
Filesize
37KB
MD5a83dde1e2ace236b202a306d9270c156
SHA1a57fb5ce8d2fe6bf7bbb134c3fb7541920f6624f
SHA25620ab2e99b18b5c2aedc92d5fd2df3857ee6a1f643df04203ac6a6ded7073d5e8
SHA512f733fdad3459d290ef39a3b907083c51b71060367b778485d265123ab9ce00e3170d2246a4a2f0360434d26376292803ccd44b0a5d61c45f2efaa28d5d0994df
-
Filesize
100KB
MD5b37046319a495742af2d1d9e5ccc0ea9
SHA1d13ca92d5a17068773a58d167af40b77813be532
SHA2567c60a0bab1d7581bbba576b709837ef75a5c0833acb584bca3f7c780e70f6c14
SHA5125e7ad4b7d55f0d5e4c7a17cabccc54d9568cf4b98a8e0566607f253e238d090e111e5f6f44b23617e9d1a9fc2370a10fa761cbe50a9d17a182da31dcd8ad2b48
-
Filesize
37KB
MD5c24de797dd930dea6b66cfc9e9bb10ce
SHA137c8c251e2551fd52d9f24b44386cfa0db49185a
SHA256db99f9a2d6b25dd83e0d00d657eb326f11cc8055266e4e91c3aec119eaf8af01
SHA5120e29b6ce2bdc14bf8fb6f8324ff3e39b143ce0f3fa05d65231b4c07e241814fb335ede061b525fe25486329d335adc06f71b804dbf4bf43e17db0b7cd620a7c6
-
Filesize
37KB
MD584c958e242afd53e8c9dae148a969563
SHA1e876df73f435cdfc4015905bed7699c1a1b1a38d
SHA256079d320d3c32227ba4b9acddf60bfcdf660374cb7e55dba5ccf7beeaedd2cdef
SHA5129e6cb07909d0d77ebb5b52164b1fa40ede30f820c9773ea3a1e62fb92513d05356dfef0e7ef49bf2ad177d3141720dc1c5edceb616cef77baec9acdd4bbc5bae
-
Filesize
37KB
MD527422233e558f5f11ee07103ed9b72e3
SHA1feb7232d1b317b925e6f74748dd67574bc74cd4d
SHA2561fa6a4dc1e7d64c574cb54ae8fd71102f8c6c41f2bd9a93739d13ff6b77d41ac
SHA5122d3f424a24e720f83533ace28270b59a254f08d4193df485d1b7d3b9e6ae53db39ef43d5fc7de599355469ad934d8bcb30f68d1aaa376df11b9e3dec848a5589
-
Filesize
37KB
MD5c84f50869b8ee58ca3f1e3b531c4415d
SHA1d04c660864bc2556c4a59778736b140c193a6ab2
SHA256fa54653d9b43eb40539044faf2bdcac010fed82b223351f6dfe7b061287b07d3
SHA512bb8c98e2dadb884912ea53e97a2ea32ac212e5271f571d7aa0da601368feabee87e1be17d1a1b7738c56167f01b1788f3636aac1f7436c5b135fa9d31b229e94
-
Filesize
37KB
MD57cfe29b01fae3c9eadab91bcd2dc9868
SHA1d83496267dc0f29ce33422ef1bf3040f5fc7f957
SHA2562c3bfb9cc6c71387ba5c4c03e04af7f64bf568bdbe4331e9f094b73b06bddcff
SHA512f6111d6f8b609c1fc3b066075641dace8c34efb011176b5c79a6470cc6941a9727df4ceb2b96d1309f841432fa745348fc2fdaf587422eebd484d278efe3aeac
-
Filesize
37KB
MD528c50ddf0d8457605d55a27d81938636
SHA159c4081e8408a25726c5b2e659ff9d2333dcc693
SHA256ebda356629ac21d9a8e704edc86c815770423ae9181ebbf8ca621c8ae341cbd5
SHA5124153a095aa626b5531c21e33e2c4c14556892035a4a524a9b96354443e2909dcb41683646e6c1f70f1981ceb5e77f17f6e312436c687912784fcb960f9b050fe
-
Filesize
457KB
MD531f03a8fe7561da18d5a93fc3eb83b7d
SHA131b31af35e6eed00e98252e953e623324bd64dde
SHA2562027197f05dac506b971b3bd2708996292e6ffad661affe9a0138f52368cc84d
SHA5123ea7c13a0aa67c302943c6527856004f8d871fe146150096bc60855314f23eae6f507f8c941fd7e8c039980810929d4930fcf9c597857d195f8c93e3cc94c41d
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
79KB
MD5e2e3268f813a0c5128ff8347cbaa58c8
SHA14952cbfbdec300c048808d79ee431972b8a7ba84
SHA256d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
SHA512cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc
-
Filesize
2.1MB
MD5fa09109a4f4ef970c81db6c0115ae42e
SHA13d5f6c665fc5705c6def0206d8b710ffa3111441
SHA2563301b05a3fa16102cccd8eb66951e7db4f7a6e658c2c9b726116a02f7ef3715f
SHA51268ebe2f0246a44b471eeaf7d3433f8eb3fcffc422689d709ca640d511bd5202b4ec7cf9feb2b7c9ec9e0c7d24b5445fc9ae5fd6b75a309f6d053d7fda2bb3eb0
-
Filesize
199KB
MD5b19ec1d7a82986dbeab3f166a946eee9
SHA15ac3eb8cce76ada7f394526b9957416905c5e0b8
SHA2569881f416f578c0e68d1bd1465811a46be30fb45a8191ba82d6d9e0a1d5dc839c
SHA512d175a6620695d4335f073518d9d0fb10cb538ffa6f67b845cbb3b5a6dbada3a86b23eb9123c837837a283608fac4ebea1d68426311815eaff3c1e5a1aefbcce4
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
100KB
MD5ce554fe53b2620c56f6abb264a588616
SHA177bbdcd30e7e931ef95c913406faf92fa70d4c94
SHA25693237a51bb710bd488b0e5bfa8288751445eafcc795364df7652535f3c210431
SHA5122330b9bdcd3c4d5d3f6a65cb277dce7d59bb655cce6285154ea8153b2b7df41c9a51b0bb62fa218e7345032e83f3b7e738fc1fea5f56a8bb4690733f51442982
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
2KB
MD51420d30f964eac2c85b2ccfe968eebce
SHA1bdf9a6876578a3e38079c4f8cf5d6c79687ad750
SHA256f3327793e3fd1f3f9a93f58d033ed89ce832443e2695beca9f2b04adba049ed9
SHA5126fcb6ce148e1e246d6805502d4914595957061946751656567a5013d96033dd1769a22a87c45821e7542cde533450e41182cee898cd2ccf911c91bc4822371a8
-
C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe
Filesize159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d
-
Filesize
39KB
MD57529e3c83618f5e3a4cc6dbf3a8534a6
SHA10f944504eebfca5466b6113853b0d83e38cf885a
SHA256ec35c76ad2c8192f09c02eca1f263b406163470ca8438d054db7adcf5bfc0597
SHA5127eef97937cc1e3afd3fca0618328a5b6ecb72123a199739f6b1b972dd90e01e07492eb26352ee00421d026c63af48973c014bdd76d95ea841eb2fefd613631cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TFDGVQ8ELR0UV0KJORFM.temp
Filesize7KB
MD5421ad79b184ca73b68024edba6a75e15
SHA183f218f5574c8645860abc0ad8998917b9510ceb
SHA2566e20740ceca3073d9b606b1ef58d9d3ca815ca98a95ed38af05b2340449aa752
SHA5123d16f052f65363e1d380198710d1e860460c5ca52f9e5eeb98da50a171d75d2408a8b932183e0b57ae7386a4f1586aa28055267a61eaa09cbfdaa9c185662d1b
-
Filesize
3KB
MD50880547340d1b849a7d4faaf04b6f905
SHA137fa5848977fd39df901be01c75b8f8320b46322
SHA25684449f1e874b763619271a57bfb43bd06e9c728c6c6f51317c56e9e94e619b25
SHA5129048a3d5ab7472c1daa1efe4a35d559fc069051a5eb4b8439c2ef25318b4de6a6c648a7db595e7ae76f215614333e3f06184eb18b2904aace0c723f8b9c35a91
-
Filesize
81KB
MD5b11714551e675988ee56dd3d6b00a8f7
SHA1eed37005f132fb8da965e6aa9edb8fd4976951d1
SHA256e20f269fcc4680a68f4d0414ead1e5af54fe9aca94632b0b90815954c86ea53f
SHA512803fddd79330415e81c52464d46cb995ef5d3feb36ce531ec5346ba354e7824f4016230d9c8277255257190aa7abd5fce0324e307d99f3aa58851eabb2bc4eb8
-
Filesize
10KB
MD52a94f3960c58c6e70826495f76d00b85
SHA1e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
SHA2562fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
SHA512fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
Filesize
132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4