Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 15:07
Static task
static1
Behavioral task
behavioral1
Sample
PCCooker_x64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PCCooker_x64.exe
Resource
win10v2004-20240802-en
General
-
Target
PCCooker_x64.exe
-
Size
22.4MB
-
MD5
317c5fe16b5314d1921930e300d9ea39
-
SHA1
65eb02c735bbbf1faf212662539fbf88a00a271f
-
SHA256
d850d741582546a3d0ea2ad5d25e0766781f315cd37e6c58f7262df571cd0c40
-
SHA512
31751379ad7f6c55d87e9a5c1f56e6211d515b7d9ae055af962ed6f9205f5abad302c2e47dd56325abff85327ec3b7f9a6cf76ed34b8cbe1da06549c622c7031
-
SSDEEP
49152:yIT4lj7Rl9HFoDi+3JK5CS2bV5IRtyrp63FDysl28Wvp/pUOmrscrdXuMIgqJ95+:yI6
Malware Config
Extracted
C:\Users\Public\Documents\RGNR_949CD6B3.txt
1BKK8bsFfG3YxTd3N15GxaYfHopoThXoY4
https://tox.chat/download.html
Extracted
phorphiex
http://185.215.113.66/
http://77.91.77.92/
http://91.202.233.141/
0xCa90599132C4D88907Bd8E046540284aa468a035
TRuGGXNDM1cavQ1AqMQHG8yfxP4QWVSMN6
qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
XryzFMFVpDUvU7famUGf214EXD3xNUSmQf
LLeT2zkStY3cvxMBFhoWXkG5VuZPoezduv
rwc4LVd9ABpULQ1CuCpDkgX2xVB1fUijyb
4AtjkCVKbtEC3UEN77SQHuH9i1XkzNiRi5VCbA2XGsJh46nJSXfGQn4GjLuupCqmC57Lo7LvKmFUyRfhtJSvKvuw3h9ReKK
15TssKwtjMtwy4vDLcLsQUZUD2B9f7eDjw85sBNVC5LRPPnC
17hgMFyLDwMjxWqw5GhijhnPdJDyFDqecY
ltc1qt0n3f0t7vz9k0mvcswk477shrxwjhf9sj5ykrp
3PMiLynrGVZ8oEqvoqC4hXD67B1WoALR4pc
3FerB8kUraAVGCVCNkgv57zTBjUGjAUkU3
DLUzwvyxN1RrwjByUPPzVMdfxNRPGVRMMA
t1J6GCPCiHW1eRdjJgDDu6b1vSVmL5U7Twh
stars125f3mw4xd9htpsq4zj5w5ezm5gags37yxxh6mj
bnb1epx67ne4vckqmaj4gwke8m322f4yjr6eh52wqw
bc1qmpkehfffkr6phuklsksnd7nhgx0369sxu772m3
bitcoincash:qph44jx8r9k5xeq5cuf958krv3ewrnp5vc6hhdjd3r
GBQJMXYXPRIWFMXIFJR35ZB7LRKMB4PHCIUAUFR3TKUL6RDBZVLZEUJ3
-
mutex
55a4er5wo
-
user_agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/124.0.0.0 Safari/537.36
Extracted
xworm
5.0
outside-sand.gl.at.ply.gg:31300
iwkdM6NNMHndQBII
-
Install_directory
%AppData%
-
install_file
USB.exe
Extracted
stealc
cry
http://193.176.190.41
-
url_path
/2fa883eebd632382.php
Extracted
marsstealer
Default
kenesrakishev.net/wp-admin/admin-ajax.php
Extracted
lumma
https://miracledzmnqwui.shop/api
Signatures
-
Detect Xworm Payload 48 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\23.exe family_xworm C:\Users\Admin\AppData\Local\Temp\20.exe family_xworm C:\Users\Admin\AppData\Local\Temp\9.exe family_xworm behavioral1/memory/1972-987-0x0000000001160000-0x0000000001170000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\3.exe family_xworm C:\Users\Admin\AppData\Local\Temp\8.exe family_xworm behavioral1/memory/1064-991-0x0000000001100000-0x0000000001110000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\16.exe family_xworm behavioral1/memory/2148-1049-0x0000000000E50000-0x0000000000E60000-memory.dmp family_xworm behavioral1/memory/2920-1048-0x00000000011E0000-0x00000000011F0000-memory.dmp family_xworm behavioral1/memory/2096-1047-0x00000000011F0000-0x0000000001200000-memory.dmp family_xworm behavioral1/memory/1960-1046-0x0000000000F70000-0x0000000000F80000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\11.exe family_xworm C:\Users\Admin\AppData\Local\Temp\6.exe family_xworm behavioral1/memory/652-1019-0x0000000000B90000-0x0000000000BA0000-memory.dmp family_xworm behavioral1/memory/1940-1017-0x00000000008E0000-0x00000000008F0000-memory.dmp family_xworm behavioral1/memory/2716-1016-0x0000000000D00000-0x0000000000D10000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\1.exe family_xworm C:\Users\Admin\AppData\Local\Temp\10.exe family_xworm behavioral1/memory/2552-1013-0x00000000013A0000-0x00000000013B0000-memory.dmp family_xworm behavioral1/memory/2220-1012-0x0000000000170000-0x0000000000180000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\12.exe family_xworm C:\Users\Admin\AppData\Local\Temp\5.exe family_xworm behavioral1/memory/2356-998-0x0000000000C00000-0x0000000000C10000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\14.exe family_xworm behavioral1/memory/1592-994-0x0000000000280000-0x0000000000290000-memory.dmp family_xworm behavioral1/memory/2944-988-0x0000000001380000-0x0000000001390000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\7.exe family_xworm behavioral1/memory/1372-931-0x0000000001180000-0x0000000001190000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\13.exe family_xworm behavioral1/memory/2144-946-0x0000000000BC0000-0x0000000000BD0000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\15.exe family_xworm behavioral1/memory/2448-836-0x0000000000940000-0x0000000000950000-memory.dmp family_xworm behavioral1/memory/636-828-0x00000000001E0000-0x00000000001F0000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\17.exe family_xworm behavioral1/memory/2804-921-0x00000000009E0000-0x00000000009F0000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\18.exe family_xworm C:\Users\Admin\AppData\Local\Temp\19.exe family_xworm behavioral1/memory/2744-851-0x00000000010A0000-0x00000000010B0000-memory.dmp family_xworm behavioral1/memory/2300-791-0x0000000000E50000-0x0000000000E60000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\21.exe family_xworm behavioral1/memory/1944-764-0x0000000000D20000-0x0000000000D30000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\22.exe family_xworm behavioral1/memory/1812-740-0x0000000000E50000-0x0000000000E60000-memory.dmp family_xworm behavioral1/memory/1868-737-0x0000000000890000-0x00000000008A0000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\24.exe family_xworm behavioral1/memory/1232-723-0x0000000000060000-0x0000000000070000-memory.dmp family_xworm C:\Users\Admin\AppData\Local\Temp\25.exe family_xworm -
Mars Stealer
An infostealer written in C++ based on other infostealers.
-
Modifies security service 2 TTPs 3 IoCs
Processes:
sysmablsvr.exesysarddrvs.exesyscapvbrd.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" syscapvbrd.exe -
Phorphiex payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Files\t1.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\Files\11.exe family_phorphiex C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe family_phorphiex -
RagnarLocker
Ransomware first seen at the end of 2019, which has been used in targetted attacks against multiple companies.
-
Processes:
sysmablsvr.exesyscapvbrd.exesysarddrvs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7780) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
XMRig Miner payload 16 IoCs
Processes:
resource yara_rule behavioral1/memory/6380-20332-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20334-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20330-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20329-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20327-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20375-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20377-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20376-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20379-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20378-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20326-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20325-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20331-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20328-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20529-0x0000000140000000-0x0000000140840000-memory.dmp xmrig behavioral1/memory/6380-20528-0x0000000140000000-0x0000000140840000-memory.dmp xmrig -
Command and Scripting Interpreter: PowerShell 1 TTPs 64 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 4828 powershell.exe 6272 powershell.exe 4960 powershell.exe 6320 powershell.exe 6744 powershell.exe 4816 powershell.exe 6660 powershell.exe 4980 powershell.exe 3240 powershell.exe 6260 powershell.exe 1532 powershell.exe 3256 powershell.exe 6340 powershell.exe 4760 powershell.exe 6368 powershell.exe 4344 powershell.exe 5384 powershell.exe 6032 powershell.exe 7068 powershell.exe 5228 powershell.exe 4896 powershell.exe 5796 powershell.exe 1228 powershell.exe 5836 powershell.exe 5072 powershell.exe 4256 powershell.exe 4700 powershell.exe 4832 powershell.exe 4728 powershell.exe 6064 powershell.exe 4560 powershell.exe 4916 powershell.exe 4664 powershell.exe 5008 powershell.exe 5076 powershell.exe 5016 powershell.exe 5560 powershell.exe 4856 powershell.exe 7052 powershell.exe 1676 powershell.exe 3148 powershell.exe 5508 powershell.exe 5428 powershell.exe 7124 powershell.exe 7000 powershell.exe 6532 powershell.exe 4788 powershell.exe 5840 powershell.exe 4708 powershell.exe 1716 powershell.exe 6576 powershell.exe 7016 powershell.exe 5700 powershell.exe 4748 powershell.exe 5908 powershell.exe 5084 powershell.exe 6772 powershell.exe 6312 powershell.exe 4872 powershell.exe 6332 powershell.exe 6288 powershell.exe 3636 powershell.exe 5996 powershell.exe 3228 powershell.exe -
Creates new service(s) 2 TTPs
-
Downloads MZ/PE file
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 28 IoCs
Processes:
8.exe10.exe11.exe23.exe14.exeasena.exe4.exe22.exe1.exe3.exe13.exe7.exe16.exe12.exe15.exe6.exe17.exe2.exe19.exe24.exe5.exe9.exeexplorer.exe21.exe18.exe20.exe25.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 8.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 10.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 11.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 23.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 14.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\RGNR_949CD6B3.txt asena.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 4.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 22.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 1.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 3.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 13.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 7.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 16.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 12.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 15.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 6.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 17.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 17.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 2.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 19.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 24.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 5.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 9.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\7549661.exe explorer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 21.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 18.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 20.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\$77-system32.lnk 25.exe -
Executes dropped EXE 46 IoCs
Processes:
4363463463464363463463463.exea76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exeasena.exeBomb.exeCryptoWall.exet1.exe25.exe24.exe23.exe22.exe21.exe19.exe20.exe17.exe18.exe15.exe13.exe11.exe16.exe9.exe7.exe14.exe12.exe5.exe3.exe1.exe10.exe8.exe6.exe4.exe2.exe66c4c6ec7d961_crypto.exesysmablsvr.exer.exes.exepp.exe66ea645129e6a_jacobs.exeorpqcnvisucm.exeSvCpJuhbT.exegsprout.exe11.exesysarddrvs.exe9009.exetwztl.exesyscapvbrd.exepid process 2808 4363463463464363463463463.exe 2692 a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe 2572 asena.exe 2816 Bomb.exe 2564 CryptoWall.exe 2904 t1.exe 1232 25.exe 1868 24.exe 1812 23.exe 1944 22.exe 2300 21.exe 636 19.exe 2448 20.exe 2744 17.exe 2804 18.exe 1372 15.exe 2144 13.exe 1064 11.exe 2944 16.exe 1972 9.exe 1592 7.exe 2356 14.exe 2220 12.exe 2552 5.exe 2716 3.exe 652 1.exe 1940 10.exe 2096 8.exe 1960 6.exe 2920 4.exe 2148 2.exe 2396 66c4c6ec7d961_crypto.exe 3340 sysmablsvr.exe 2108 r.exe 2576 s.exe 7136 pp.exe 2640 66ea645129e6a_jacobs.exe 476 2968 orpqcnvisucm.exe 3984 SvCpJuhbT.exe 2184 gsprout.exe 6096 11.exe 4320 sysarddrvs.exe 4520 9009.exe 5180 twztl.exe 5564 syscapvbrd.exe -
Loads dropped DLL 30 IoCs
Processes:
PCCooker_x64.exe4363463463464363463463463.exepid process 2656 PCCooker_x64.exe 2656 PCCooker_x64.exe 2656 PCCooker_x64.exe 2656 PCCooker_x64.exe 2656 PCCooker_x64.exe 2656 PCCooker_x64.exe 2656 PCCooker_x64.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 476 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 4112 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe 2808 4363463463464363463463463.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
sysmablsvr.exesyscapvbrd.exesysarddrvs.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" syscapvbrd.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysarddrvs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysarddrvs.exe -
Adds Run key to start application 2 TTPs 7 IoCs
Processes:
t1.exe11.exetwztl.exeexplorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" t1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysarddrvs.exe" 11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\syscapvbrd.exe" twztl.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\754966 = "C:\\7549661\\7549661.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*54966 = "C:\\7549661\\7549661.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\7549661 = "C:\\Users\\Admin\\AppData\\Roaming\\7549661.exe" explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\*549661 = "C:\\Users\\Admin\\AppData\\Roaming\\7549661.exe" explorer.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
asena.exedescription ioc process File opened (read-only) \??\E: asena.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 9 ip-addr.es 11 myexternalip.com 20 ip-api.com -
Power Settings 1 TTPs 8 IoCs
powercfg controls all configurable power system settings on a Windows system and can be abused to prevent an infected host from locking or shutting down.
Processes:
powercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepid process 4148 powercfg.exe 5632 powercfg.exe 4392 powercfg.exe 5692 powercfg.exe 2132 powercfg.exe 6352 powercfg.exe 5104 powercfg.exe 1484 powercfg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
asena.exedescription ioc process File opened for modification \??\PHYSICALDRIVE0 asena.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
66c4c6ec7d961_crypto.exeorpqcnvisucm.exedescription pid process target process PID 2396 set thread context of 760 2396 66c4c6ec7d961_crypto.exe MSBuild.exe PID 2968 set thread context of 3404 2968 orpqcnvisucm.exe conhost.exe PID 2968 set thread context of 6380 2968 orpqcnvisucm.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
asena.exedescription ioc process File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\POWERPNT_COL.HXC asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis.css asena.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Merida asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ne\LC_MESSAGES\vlc.mo asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libbluray-j2se-1.3.2.jar asena.exe File created C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\js\RGNR_949CD6B3.txt asena.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Esl\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152722.WMF asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.ui.nl_zh_4.4.0.v20140623020002.jar asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\css\cpu.css asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00524_.WMF asena.exe File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\es-ES\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\MSInfo\it-IT\msinfo32.exe.mui asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0285484.WMF asena.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Biscay\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGACCBOX.DPV asena.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Icons\PDXFile_8.ico asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02503U.BMP asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\lib\derbyLocale_ru.jar asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\META-INF\MANIFEST.MF asena.exe File opened for modification C:\Program Files\Java\jre7\lib\fontconfig.bfc asena.exe File created C:\Program Files\VideoLAN\VLC\locale\cs\RGNR_949CD6B3.txt asena.exe File created C:\Program Files\Windows Media Player\ja-JP\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files\Windows NT\TableTextService\TableTextServiceSimplifiedShuangPin.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert.css asena.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+1 asena.exe File created C:\Program Files\VideoLAN\VLC\locale\cy\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Hardcover.thmx asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD15170_.GIF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\LETTHEAD.DPV asena.exe File created C:\Program Files (x86)\Windows Photo Viewer\ja-JP\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\newgrounds.luac asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0233665.WMF asena.exe File opened for modification C:\Program Files\DVD Maker\it-IT\WMM2CLIP.dll.mui asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Argentina\Jujuy asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Rothera asena.exe File created C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\css\settings.css asena.exe File created C:\Program Files\DVD Maker\fr-FR\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Discussion.css asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\Sounds\People\HICCUP.WAV asena.exe File created C:\Program Files (x86)\Common Files\System\msadc\fr-FR\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\weather.html asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\alt-rt.jar asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_left_rest.png asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BOAT.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR47F.GIF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBCOLOR.SCM asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL01040_.WMF asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR38F.GIF asena.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Scenes_INTRO_BG.wmv asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Belgrade asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Europe\Tirane asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.babel.nls_eclipse_ja_4.4.0.v20140623020002\epl-v10.html asena.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\intf\telnet.luac asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\drag.png asena.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGACCBAR.DPV asena.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\RGNR_949CD6B3.txt asena.exe File created C:\Program Files\VideoLAN\VLC\plugins\stream_filter\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\ja-JP\css\RSSFeeds.css asena.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\library.js asena.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\Microsoft.VisualStudio.Tools.Office.AppInfoDocument\RGNR_949CD6B3.txt asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.nl_ja_4.4.0.v20140623020002.jar asena.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-snaptracer_ja.jar asena.exe -
Drops file in Windows directory 6 IoCs
Processes:
t1.exe11.exetwztl.exedescription ioc process File created C:\Windows\sysmablsvr.exe t1.exe File opened for modification C:\Windows\sysmablsvr.exe t1.exe File created C:\Windows\sysarddrvs.exe 11.exe File opened for modification C:\Windows\sysarddrvs.exe 11.exe File created C:\Windows\syscapvbrd.exe twztl.exe File opened for modification C:\Windows\syscapvbrd.exe twztl.exe -
Launches sc.exe 14 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 4356 sc.exe 3020 sc.exe 6264 sc.exe 6052 sc.exe 6956 sc.exe 5744 sc.exe 3812 sc.exe 6528 sc.exe 4104 sc.exe 6624 sc.exe 4912 sc.exe 5272 sc.exe 6376 sc.exe 3084 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
66c4c6ec7d961_crypto.exenotepad.exesc.exesc.exesc.exevssadmin.exet1.execmd.exesc.exePCCooker_x64.exeCryptoWall.execmd.exesc.exe4363463463464363463463463.exeasena.exesysmablsvr.exesc.exesc.exetwztl.execmd.exepowershell.exesc.exesvchost.exe11.execmd.exepowershell.exe9009.exenotepad.exegsprout.exesysarddrvs.exeexplorer.exesc.exesc.exesyscapvbrd.exea76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66c4c6ec7d961_crypto.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssadmin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language t1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PCCooker_x64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CryptoWall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4363463463464363463463463.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asena.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysmablsvr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language twztl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gsprout.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysarddrvs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syscapvbrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2148 vssadmin.exe 2496 vssadmin.exe -
Processes:
9009.exe4363463463464363463463463.exedescription ioc process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 9009.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\5FB7EE0633E259DBAD0C4C9AE6D38F1A61C7DC25\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6 4363463463464363463463463.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\317A2AD07F2B335EF5A1C34E4B57E8B7D8F1FCA6\Blob = 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 4363463463464363463463463.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A 9009.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\AD7E1C28B064EF8F6003402014C3D0E3370EB58A\Blob = 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 9009.exe -
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 5152 notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
66c4c6ec7d961_crypto.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepowershell.exepid process 2396 66c4c6ec7d961_crypto.exe 2396 66c4c6ec7d961_crypto.exe 5008 powershell.exe 4828 powershell.exe 4916 powershell.exe 4872 powershell.exe 4788 powershell.exe 5016 powershell.exe 4728 powershell.exe 3084 powershell.exe 4936 powershell.exe 3228 powershell.exe 1716 powershell.exe 4980 powershell.exe 3636 powershell.exe 5044 powershell.exe 408 powershell.exe 3256 powershell.exe 4700 powershell.exe 4888 powershell.exe 4832 powershell.exe 4856 powershell.exe 4748 powershell.exe 4960 powershell.exe 5104 powershell.exe 5084 powershell.exe 4104 powershell.exe 6284 powershell.exe 4688 powershell.exe 4256 powershell.exe 4896 powershell.exe 6960 powershell.exe 6260 powershell.exe 3240 powershell.exe 6272 powershell.exe 6332 powershell.exe 5072 powershell.exe 6300 powershell.exe 4780 powershell.exe 1532 powershell.exe 5452 powershell.exe 6320 powershell.exe 5384 powershell.exe 448 powershell.exe 5040 powershell.exe 3264 powershell.exe 7052 powershell.exe 5108 powershell.exe 4840 powershell.exe 6064 powershell.exe 7000 powershell.exe 6772 powershell.exe 1676 powershell.exe 6744 powershell.exe 3148 powershell.exe 4816 powershell.exe 6716 powershell.exe 6696 powershell.exe 4424 powershell.exe 5796 powershell.exe 6032 powershell.exe 5808 powershell.exe 1228 powershell.exe 4344 powershell.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
CryptoWall.exeexplorer.exepid process 2564 CryptoWall.exe 408 explorer.exe -
Suspicious behavior: SetClipboardViewer 2 IoCs
Processes:
sysarddrvs.exesyscapvbrd.exepid process 4320 sysarddrvs.exe 5564 syscapvbrd.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
wmic.exevssvc.exe4363463463464363463463463.exe23.exe24.exe25.exe22.exe20.exe21.exe19.exe17.exe18.exe16.exe15.exe14.exe12.exe13.exe11.exe10.exe7.exe9.exe3.exe1.exedescription pid process Token: SeIncreaseQuotaPrivilege 3004 wmic.exe Token: SeSecurityPrivilege 3004 wmic.exe Token: SeTakeOwnershipPrivilege 3004 wmic.exe Token: SeLoadDriverPrivilege 3004 wmic.exe Token: SeSystemProfilePrivilege 3004 wmic.exe Token: SeSystemtimePrivilege 3004 wmic.exe Token: SeProfSingleProcessPrivilege 3004 wmic.exe Token: SeIncBasePriorityPrivilege 3004 wmic.exe Token: SeCreatePagefilePrivilege 3004 wmic.exe Token: SeBackupPrivilege 3004 wmic.exe Token: SeRestorePrivilege 3004 wmic.exe Token: SeShutdownPrivilege 3004 wmic.exe Token: SeDebugPrivilege 3004 wmic.exe Token: SeSystemEnvironmentPrivilege 3004 wmic.exe Token: SeRemoteShutdownPrivilege 3004 wmic.exe Token: SeUndockPrivilege 3004 wmic.exe Token: SeManageVolumePrivilege 3004 wmic.exe Token: 33 3004 wmic.exe Token: 34 3004 wmic.exe Token: 35 3004 wmic.exe Token: SeIncreaseQuotaPrivilege 3004 wmic.exe Token: SeSecurityPrivilege 3004 wmic.exe Token: SeTakeOwnershipPrivilege 3004 wmic.exe Token: SeLoadDriverPrivilege 3004 wmic.exe Token: SeSystemProfilePrivilege 3004 wmic.exe Token: SeSystemtimePrivilege 3004 wmic.exe Token: SeProfSingleProcessPrivilege 3004 wmic.exe Token: SeIncBasePriorityPrivilege 3004 wmic.exe Token: SeCreatePagefilePrivilege 3004 wmic.exe Token: SeBackupPrivilege 3004 wmic.exe Token: SeRestorePrivilege 3004 wmic.exe Token: SeShutdownPrivilege 3004 wmic.exe Token: SeDebugPrivilege 3004 wmic.exe Token: SeSystemEnvironmentPrivilege 3004 wmic.exe Token: SeRemoteShutdownPrivilege 3004 wmic.exe Token: SeUndockPrivilege 3004 wmic.exe Token: SeManageVolumePrivilege 3004 wmic.exe Token: 33 3004 wmic.exe Token: 34 3004 wmic.exe Token: 35 3004 wmic.exe Token: SeBackupPrivilege 2848 vssvc.exe Token: SeRestorePrivilege 2848 vssvc.exe Token: SeAuditPrivilege 2848 vssvc.exe Token: SeDebugPrivilege 2808 4363463463464363463463463.exe Token: SeDebugPrivilege 1812 23.exe Token: SeDebugPrivilege 1868 24.exe Token: SeDebugPrivilege 1232 25.exe Token: SeDebugPrivilege 1944 22.exe Token: SeDebugPrivilege 2448 20.exe Token: SeDebugPrivilege 2300 21.exe Token: SeDebugPrivilege 636 19.exe Token: SeDebugPrivilege 2744 17.exe Token: SeDebugPrivilege 2804 18.exe Token: SeDebugPrivilege 2944 16.exe Token: SeDebugPrivilege 1372 15.exe Token: SeDebugPrivilege 2356 14.exe Token: SeDebugPrivilege 2220 12.exe Token: SeDebugPrivilege 2144 13.exe Token: SeDebugPrivilege 1064 11.exe Token: SeDebugPrivilege 1940 10.exe Token: SeDebugPrivilege 1592 7.exe Token: SeDebugPrivilege 1972 9.exe Token: SeDebugPrivilege 2716 3.exe Token: SeDebugPrivilege 652 1.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
PCCooker_x64.exeasena.exeCryptoWall.exeexplorer.exe4363463463464363463463463.exeBomb.exedescription pid process target process PID 2656 wrote to memory of 2808 2656 PCCooker_x64.exe 4363463463464363463463463.exe PID 2656 wrote to memory of 2808 2656 PCCooker_x64.exe 4363463463464363463463463.exe PID 2656 wrote to memory of 2808 2656 PCCooker_x64.exe 4363463463464363463463463.exe PID 2656 wrote to memory of 2808 2656 PCCooker_x64.exe 4363463463464363463463463.exe PID 2656 wrote to memory of 2692 2656 PCCooker_x64.exe a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe PID 2656 wrote to memory of 2692 2656 PCCooker_x64.exe a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe PID 2656 wrote to memory of 2692 2656 PCCooker_x64.exe a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe PID 2656 wrote to memory of 2692 2656 PCCooker_x64.exe a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe PID 2656 wrote to memory of 2572 2656 PCCooker_x64.exe asena.exe PID 2656 wrote to memory of 2572 2656 PCCooker_x64.exe asena.exe PID 2656 wrote to memory of 2572 2656 PCCooker_x64.exe asena.exe PID 2656 wrote to memory of 2572 2656 PCCooker_x64.exe asena.exe PID 2656 wrote to memory of 2816 2656 PCCooker_x64.exe Bomb.exe PID 2656 wrote to memory of 2816 2656 PCCooker_x64.exe Bomb.exe PID 2656 wrote to memory of 2816 2656 PCCooker_x64.exe Bomb.exe PID 2656 wrote to memory of 2816 2656 PCCooker_x64.exe Bomb.exe PID 2656 wrote to memory of 2564 2656 PCCooker_x64.exe CryptoWall.exe PID 2656 wrote to memory of 2564 2656 PCCooker_x64.exe CryptoWall.exe PID 2656 wrote to memory of 2564 2656 PCCooker_x64.exe CryptoWall.exe PID 2656 wrote to memory of 2564 2656 PCCooker_x64.exe CryptoWall.exe PID 2572 wrote to memory of 3004 2572 asena.exe wmic.exe PID 2572 wrote to memory of 3004 2572 asena.exe wmic.exe PID 2572 wrote to memory of 3004 2572 asena.exe wmic.exe PID 2572 wrote to memory of 3004 2572 asena.exe wmic.exe PID 2572 wrote to memory of 2496 2572 asena.exe vssadmin.exe PID 2572 wrote to memory of 2496 2572 asena.exe vssadmin.exe PID 2572 wrote to memory of 2496 2572 asena.exe vssadmin.exe PID 2572 wrote to memory of 2496 2572 asena.exe vssadmin.exe PID 2564 wrote to memory of 408 2564 CryptoWall.exe powershell.exe PID 2564 wrote to memory of 408 2564 CryptoWall.exe powershell.exe PID 2564 wrote to memory of 408 2564 CryptoWall.exe powershell.exe PID 2564 wrote to memory of 408 2564 CryptoWall.exe powershell.exe PID 408 wrote to memory of 792 408 explorer.exe svchost.exe PID 408 wrote to memory of 792 408 explorer.exe svchost.exe PID 408 wrote to memory of 792 408 explorer.exe svchost.exe PID 408 wrote to memory of 792 408 explorer.exe svchost.exe PID 408 wrote to memory of 2148 408 explorer.exe 2.exe PID 408 wrote to memory of 2148 408 explorer.exe 2.exe PID 408 wrote to memory of 2148 408 explorer.exe 2.exe PID 408 wrote to memory of 2148 408 explorer.exe 2.exe PID 2808 wrote to memory of 2904 2808 4363463463464363463463463.exe t1.exe PID 2808 wrote to memory of 2904 2808 4363463463464363463463463.exe t1.exe PID 2808 wrote to memory of 2904 2808 4363463463464363463463463.exe t1.exe PID 2808 wrote to memory of 2904 2808 4363463463464363463463463.exe t1.exe PID 2816 wrote to memory of 1232 2816 Bomb.exe 25.exe PID 2816 wrote to memory of 1232 2816 Bomb.exe 25.exe PID 2816 wrote to memory of 1232 2816 Bomb.exe 25.exe PID 2816 wrote to memory of 1868 2816 Bomb.exe 24.exe PID 2816 wrote to memory of 1868 2816 Bomb.exe 24.exe PID 2816 wrote to memory of 1868 2816 Bomb.exe 24.exe PID 2816 wrote to memory of 1812 2816 Bomb.exe 23.exe PID 2816 wrote to memory of 1812 2816 Bomb.exe 23.exe PID 2816 wrote to memory of 1812 2816 Bomb.exe 23.exe PID 2816 wrote to memory of 1944 2816 Bomb.exe 22.exe PID 2816 wrote to memory of 1944 2816 Bomb.exe 22.exe PID 2816 wrote to memory of 1944 2816 Bomb.exe 22.exe PID 2816 wrote to memory of 2300 2816 Bomb.exe 21.exe PID 2816 wrote to memory of 2300 2816 Bomb.exe 21.exe PID 2816 wrote to memory of 2300 2816 Bomb.exe 21.exe PID 2816 wrote to memory of 2448 2816 Bomb.exe 20.exe PID 2816 wrote to memory of 2448 2816 Bomb.exe 20.exe PID 2816 wrote to memory of 2448 2816 Bomb.exe 20.exe PID 2816 wrote to memory of 636 2816 Bomb.exe 19.exe PID 2816 wrote to memory of 636 2816 Bomb.exe 19.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\PCCooker_x64.exe"C:\Users\Admin\AppData\Local\Temp\PCCooker_x64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"C:\Users\Admin\AppData\Local\Temp\4363463463464363463463463.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"C:\Users\Admin\AppData\Local\Temp\Files\t1.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\sysmablsvr.exeC:\Windows\sysmablsvr.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
PID:3340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66c4c6ec7d961_crypto.exe"C:\Users\Admin\AppData\Local\Temp\Files\66c4c6ec7d961_crypto.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2176
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\r.exe"C:\Users\Admin\AppData\Local\Temp\Files\r.exe"3⤵
- Executes dropped EXE
PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Files\s.exe"C:\Users\Admin\AppData\Local\Temp\Files\s.exe"3⤵
- Executes dropped EXE
PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"C:\Users\Admin\AppData\Local\Temp\Files\pp.exe"3⤵
- Executes dropped EXE
PID:7136
-
-
C:\Users\Admin\AppData\Local\Temp\Files\66ea645129e6a_jacobs.exe"C:\Users\Admin\AppData\Local\Temp\Files\66ea645129e6a_jacobs.exe"3⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 04⤵
- Power Settings
PID:1484
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 04⤵
- Power Settings
PID:4392
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 04⤵
- Power Settings
PID:5632
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 04⤵
- Power Settings
PID:4148
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe delete "RRTELIGS"4⤵
- Launches sc.exe
PID:6264
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe create "RRTELIGS" binpath= "C:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exe" start= "auto"4⤵
- Launches sc.exe
PID:6624
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe stop eventlog4⤵
- Launches sc.exe
PID:3812
-
-
C:\Windows\system32\sc.exeC:\Windows\system32\sc.exe start "RRTELIGS"4⤵
- Launches sc.exe
PID:4912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\SvCpJuhbT.exe"C:\Users\Admin\AppData\Local\Temp\Files\SvCpJuhbT.exe"3⤵
- Executes dropped EXE
PID:3984 -
C:\Windows\SysWOW64\notepad.exe"C:\Windows\SysWOW64\notepad.exe"4⤵
- System Location Discovery: System Language Discovery
PID:6576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\gsprout.exe"C:\Users\Admin\AppData\Local\Temp\Files\gsprout.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\Files\11.exe"C:\Users\Admin\AppData\Local\Temp\Files\11.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6096 -
C:\Windows\sysarddrvs.exeC:\Windows\sysarddrvs.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:4320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:5228
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:944 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6528
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5272
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6052
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6376
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Files\9009.exe"C:\Users\Admin\AppData\Local\Temp\Files\9009.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies system certificate store
PID:4520
-
-
C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"C:\Users\Admin\AppData\Local\Temp\Files\twztl.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5180 -
C:\Windows\syscapvbrd.exeC:\Windows\syscapvbrd.exe4⤵
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:5564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c powershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"5⤵
- System Location Discovery: System Language Discovery
PID:6776 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath $env:windir; Add-MpPreference -ExclusionPath $env:TEMP; Add-MpPreference -ExclusionPath $env:USERPROFILE"6⤵
- System Location Discovery: System Language Discovery
PID:6464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop DoSvc & sc stop BITS5⤵
- System Location Discovery: System Language Discovery
PID:6336 -
C:\Windows\SysWOW64\sc.exesc stop UsoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3020
-
-
C:\Windows\SysWOW64\sc.exesc stop WaaSMedicSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:6956
-
-
C:\Windows\SysWOW64\sc.exesc stop wuauserv6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:3084
-
-
C:\Windows\SysWOW64\sc.exesc stop DoSvc6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4104
-
-
C:\Windows\SysWOW64\sc.exesc stop BITS6⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:5744
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"C:\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\asena.exe"C:\Users\Admin\AppData\Local\Temp\asena.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Enumerates connected drives
- Writes to the Master Boot Record (MBR)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\System32\Wbem\wmic.exewmic.exe shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2496
-
-
C:\Windows\SysWOW64\notepad.exeC:\Users\Public\Documents\RGNR_949CD6B3.txt3⤵
- System Location Discovery: System Language Discovery
- Opens file in notepad (likely ransom note)
PID:5152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Bomb.exe"C:\Users\Admin\AppData\Local\Temp\Bomb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\25.exe"C:\Users\Admin\AppData\Local\Temp\25.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\25.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '25.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5072
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6312
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:5268
-
-
-
C:\Users\Admin\AppData\Local\Temp\24.exe"C:\Users\Admin\AppData\Local\Temp\24.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1868 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\24.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '24.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3264
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4344
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5840
-
-
-
C:\Users\Admin\AppData\Local\Temp\23.exe"C:\Users\Admin\AppData\Local\Temp\23.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1812 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\23.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '23.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:7052
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5808
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4760
-
-
-
C:\Users\Admin\AppData\Local\Temp\22.exe"C:\Users\Admin\AppData\Local\Temp\22.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\22.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '22.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6284
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5796
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5836
-
-
-
C:\Users\Admin\AppData\Local\Temp\21.exe"C:\Users\Admin\AppData\Local\Temp\21.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2300 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\21.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '21.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4816
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5508
-
-
-
C:\Users\Admin\AppData\Local\Temp\20.exe"C:\Users\Admin\AppData\Local\Temp\20.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\20.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4748
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '20.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:448
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:2488
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6176
-
-
-
C:\Users\Admin\AppData\Local\Temp\19.exe"C:\Users\Admin\AppData\Local\Temp\19.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\19.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '19.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6696
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6288
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4708
-
-
-
C:\Users\Admin\AppData\Local\Temp\18.exe"C:\Users\Admin\AppData\Local\Temp\18.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\18.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '18.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5108
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5428
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5908
-
-
-
C:\Users\Admin\AppData\Local\Temp\17.exe"C:\Users\Admin\AppData\Local\Temp\17.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2744 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\17.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4828
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '17.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6960
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6772
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6552
-
-
-
C:\Users\Admin\AppData\Local\Temp\16.exe"C:\Users\Admin\AppData\Local\Temp\16.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2944 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\16.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4872
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '16.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5040
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6032
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5700
-
-
-
C:\Users\Admin\AppData\Local\Temp\15.exe"C:\Users\Admin\AppData\Local\Temp\15.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\15.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4700
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '15.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5452
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:7000
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6368
-
-
-
C:\Users\Admin\AppData\Local\Temp\14.exe"C:\Users\Admin\AppData\Local\Temp\14.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\14.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4856
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '14.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:1844
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7068
-
-
-
C:\Users\Admin\AppData\Local\Temp\13.exe"C:\Users\Admin\AppData\Local\Temp\13.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2144 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\13.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5044
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '13.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:7080
-
-
-
C:\Users\Admin\AppData\Local\Temp\12.exe"C:\Users\Admin\AppData\Local\Temp\12.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\12.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4728
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '12.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6272
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:6380
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7124
-
-
-
C:\Users\Admin\AppData\Local\Temp\11.exe"C:\Users\Admin\AppData\Local\Temp\11.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\11.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '11.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4780
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6576
-
-
-
C:\Users\Admin\AppData\Local\Temp\10.exe"C:\Users\Admin\AppData\Local\Temp\10.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\10.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:5104
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '10.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6064
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4664
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:4844
-
-
-
C:\Users\Admin\AppData\Local\Temp\9.exe"C:\Users\Admin\AppData\Local\Temp\9.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\9.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4936
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '9.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:4784
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6224
-
-
-
C:\Users\Admin\AppData\Local\Temp\8.exe"C:\Users\Admin\AppData\Local\Temp\8.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2096 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\8.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '8.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4688
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6340
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6584
-
-
-
C:\Users\Admin\AppData\Local\Temp\7.exe"C:\Users\Admin\AppData\Local\Temp\7.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\7.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1716
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '7.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4896
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:4424
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6644
-
-
-
C:\Users\Admin\AppData\Local\Temp\6.exe"C:\Users\Admin\AppData\Local\Temp\6.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:1960 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\6.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3636
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '6.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3240
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:6660
-
-
-
C:\Users\Admin\AppData\Local\Temp\5.exe"C:\Users\Admin\AppData\Local\Temp\5.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2552 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\5.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3256
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '5.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1532
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:4852
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5076
-
-
-
C:\Users\Admin\AppData\Local\Temp\4.exe"C:\Users\Admin\AppData\Local\Temp\4.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2920 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\4.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:4788
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '4.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:6300
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:1228
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:4560
-
-
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\3.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '3.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:3148
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:7016
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5560
-
-
-
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"3⤵
- Drops startup file
- Executes dropped EXE
PID:2148 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\2.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3084
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '2.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6320
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵PID:4564
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
PID:5996
-
-
-
C:\Users\Admin\AppData\Local\Temp\1.exe"C:\Users\Admin\AppData\Local\Temp\1.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:652 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\1.exe'4⤵
- Suspicious behavior: EnumeratesProcesses
PID:408
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '1.exe'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:5384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming\$77-system32'4⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
PID:6744
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess '$77-system32'4⤵PID:6356
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"C:\Users\Admin\AppData\Local\Temp\CryptoWall.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\syswow64\explorer.exe"C:\Windows\syswow64\explorer.exe"3⤵
- Drops startup file
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\syswow64\svchost.exe-k netsvcs4⤵
- System Location Discovery: System Language Discovery
PID:792
-
-
C:\Windows\syswow64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet4⤵
- System Location Discovery: System Language Discovery
- Interacts with shadow copies
PID:2148
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
C:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exeC:\ProgramData\ejitkpfdxvzt\orpqcnvisucm.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2968 -
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 02⤵
- Power Settings
PID:5104
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 02⤵
- Power Settings
PID:6352
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-ac 02⤵
- Power Settings
PID:2132
-
-
C:\Windows\system32\powercfg.exeC:\Windows\system32\powercfg.exe /x -standby-timeout-dc 02⤵
- Power Settings
PID:5692
-
-
C:\Windows\system32\conhost.exeC:\Windows\system32\conhost.exe2⤵PID:3404
-
-
C:\Windows\system32\svchost.exesvchost.exe2⤵PID:6380
-
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-13494285111204201649-55413328-1494915915-144203460820149884621785723168349259162"1⤵PID:7080
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
1PowerShell
1System Services
2Service Execution
2Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Power Settings
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
3Windows Service
3Defense Evasion
Direct Volume Access
1Impair Defenses
3Disable or Modify Tools
2Indicator Removal
2File Deletion
2Modify Registry
5Pre-OS Boot
1Bootkit
1Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
3Credentials In Files
2Credentials in Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_GB_EURO.txt
Filesize27KB
MD59525282d3fc6b6b9007a2081c0dd415c
SHA14712da839fe81bf26833e16c5acaaf57d3064d11
SHA256511164898e4b18530829e1dbdb04408e9e32280661cca67b00d5485cc198f04e
SHA5128d27a38cd007fb1740e0cd22ed19fd71f5a7d3d57ca2fcb7dc3f2550cfc488a7d638996f297c2d068e584ced3b7ac3278e8bed4ddbec51b909e5e119dc2b6619
-
Filesize
635B
MD550a5c7d13265ca076d5f9a5372d404bf
SHA12942c2f2c999a16aee34daa393ef1cfab0b849da
SHA256c750ead13d9282a74909d570d57144445209cb86c5e5172ce668af05f4e67ac5
SHA5126e87d2d4e2319a989e3f5946b00c36d3114b7a768508c686f776d1e848600841819190e3586bf81a7bccc893c6609f1e678a37eb749a57bdaf315eb7b5a65c7b
-
Filesize
634B
MD5b09434aca71507a2323664d22fa6a551
SHA18957d5fbe64384399d0870be556b7a60bd52e499
SHA256b98e0baf86f57814eb279e13018a27613cd03f5608b420a8bf03402bc0df8520
SHA512f342bbd3830b38412553c5190b5e9d92fdd596571f22589d34c1edbda9b5f43b60d81872d9abc3fa56845ccb04f13053d064155ba0a567710940f3ea48edb95a
-
Filesize
862B
MD59aa863009ed1490d89ff729d4960f433
SHA190480e4deaf7f7b7f09883bcc06dfd96158428ba
SHA2560ad31bb43955f369b3f50bb985ca24b3b38c61ab60baba18b2be885a6f4018f2
SHA512f51020e069eb058ab4bc391f76a35414a10e026dad6ffca9b0c6d1b00456037eeeb3d176604d805320e0bf8b4251714c8d6ef9ad60f525997ec39bb9f31e11d3
-
Filesize
743B
MD51ff8bbca6297b7fcc27cfe7e2fd36e58
SHA1f143429a016026d00f1daba5d1b9b0cdea493b2f
SHA2569ed47ec9024cd614e84ec7ce09a4d7dc34c55d5ec2d1f90bdbffbbff7c259a73
SHA512fe956edc0ddece83c16b5a0eff3d9a643593d40345172d18e3f24679cf5cdff42f3a19abbf683d8789959643e92e77bcff7c3bcd98c3f5870e6c69be4e52415f
-
Filesize
239KB
MD534c0f4e6029138322f91b31c605711a8
SHA1511919c090fb94ac54c2aa7caf140959acf20e6a
SHA25614152d70c95258208cd98e7acdbe00a88205fcd2ea312b1f180f90452d8059b7
SHA512f193cce7cafdf29f7914b858c7c77265047e809b841067bf0feb3a8ccafd1430b8351481f1a1fae975f30ed28c77d9cf6ea94b4519d95cb896c4d5823ca693d9
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\BG_ADOBE.GIF
Filesize24KB
MD53075a270351ccfa51491e351f24f8442
SHA15d63e9c857ca59411d552a3d450254aa14d18afd
SHA256916ae7d0c3ce8ad43ccdfd517bab166d635c287c8f8040444bda530fcdd8a59b
SHA512060a0c49cbcb7b223ce23d2aa7300758286d2e3e97d4eb836ca4155a27cfc88aca20ec16254558917dd5411b17fd5faf0a5cbd84ac18db87dfaa8b9723df4eb3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BabyBlue\BUTTON.GIF
Filesize706B
MD516d423a5cfd45a1eada6afb47d7aff6d
SHA12d23fe9f3ac383c9c53f46cd04b7ef8d7610e3ab
SHA256a6b16f56a23a540a1c8ee1c593160c0435b18dd7bca10e922af4819f5f72fa77
SHA512e632bbd8e60fd3f07eaeb7b1675f1a7b964133c76b6353faa24ae1fb2e70203604a27030a254503695f01c6166fd62833eb9156396e0f03658d624313164b627
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_OFF.GIF
Filesize1017B
MD5574e7af88b24a08aa31e8f5deeb8516f
SHA13de29f61cc927a3f9a9047711a7ca37db76cfa72
SHA256f051347950f3108d401704c8789e339e03381e3af6b929022c060064ffa6fc0f
SHA512c49da426252472df5d28e0788fb38821947104d9d6779fb909a84a9eb908482b76bb820b1dd7088eac7c4274d21b3a61a7c337709957b7e96e01df4a73177c79
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\Desert\TAB_ON.GIF
Filesize1KB
MD5dd380ceece38a079cdcb30e9d223e5f1
SHA1d330fa5d2064d7252a9c94390b057f90ca4b3294
SHA25668c2648e512401e00921fbff79fe727d16507da024f1716453c9e879b6ea5681
SHA51270a146b295dbe4e305a84c948892f74b248bc1c37a0aea5500d82bf3cf6878b310f33212981ce1ea4b92713a6226d26487da224fe7c6e9f92899ae3f58c59ad1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Casual.gif
Filesize6KB
MD556ab4868ceafb9bbbfa16acb3f6f7916
SHA1d38b72ea15b5d1c0402af6d429f65d90aef66f14
SHA256af038ee9540dea7e85ab40737ae3616f24dcbabaae6636bc31a45154f09cc641
SHA512abd6767737ef2f6a59412f681f1880b2e3698794cd583ce968b0c7c3d3349896a7331dc5e470699970a1effeb024f59961b18a4b3549b46ff1e52824b73e80ac
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Country.gif
Filesize31KB
MD5f2a453494e7023ba3cc1a13e03c702e3
SHA1a38261d540b7115b2c1e96c0f7327d52d6aca150
SHA2567a31d275b0f30b2218d622960fdc12dd61f9a05ce193d3a99990218fe9d39094
SHA512885fd55b2771ef166c12e47abf0076e7d444bc0c209497ed468725c724fdd9a1a9e41670fbee2745e39330aeb9f2f09b04c6b2a139030fd732422c2b45a97f7f
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif
Filesize5KB
MD574ae3d50e5d455f10b0fc80b30b25c68
SHA18391b059cccfa40e774c14c5c7037e0cd3fdc31c
SHA256be71574095452d3e8f99fcd639f6f1d55eb03e740008dda536bd4ac9fad7a86a
SHA5122066b284d77adf55dbe1f8f782a9b4487daab01575751f839a874cfcb6d48e415922eb9eec13c796b25cd8caad0dcad74fc203082b97df78cfbaf396365c3988
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_GreenTea.gif
Filesize22KB
MD506f8b7af34711b0c53e61067874657f1
SHA1cffe9f65ac12409cb935d070ba320b9fc2ce0542
SHA2564fc0383b8b546499566c9543d08dd2bb525da988aaac0cc80544f427567722a2
SHA5125bf55c57d4251642509c20a77d93a7d147eeff55cd9784f998ce43f0c8bb9480214cbe359f4f5b35bb05fc2fd2ac3888d67cbcf1f9fd54e5dc9ff4fc0d2cddf3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Groove.gif
Filesize627B
MD59b0922d7bc628523c141b1fe5430a6ba
SHA1fa8c50eed0de462db37cc639a900e4948d9d1e7f
SHA256c8449d0a9de6f576b9495be337e6d8e451cae37429849c8c8b671cf691549dc9
SHA5129585cedf2f7f516edbcb480c42415ad444e7c81268cee3a88887c2d5cdee685b60f0fdd1acbe5a90cabcb772595865cf9ebd801f6b2e18ee2380a26277ed9dc9
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_LightSpirit.gif
Filesize8KB
MD5ef41a5d0f07e5724e2b047a0e4109f46
SHA11eea70b9a441552209a7aa02f78ead7bc2ab0441
SHA256fcacc6aa3f64cd8da25ed0eebfe9f9ce22f2d256d77e4394891ac058e1d6316c
SHA5123c5bdb6e178af6412d60f871b052ef970354a2c841d5c03310b81ce38cba4fca2fb1ce8e5167c0f138670938b4e4b8f0c5d519516f7900aacefc2bb0d08093b0
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_OliveGreen.gif
Filesize15KB
MD590eae01037913b5f9622f47889968ece
SHA17d054001b13acf83839dc20ac0e07d64392ce887
SHA25653f789b5cbf6ce508c839d4a2a541056c23e62f92f67467feae0ba8186552d2f
SHA512a2ed984c511f701dd568ea0369161a4c97552bc64651505454e3069964f6b3cc13f998d2739834cdc3352da81f6f3901cc0a93c4e716a7aa096c989f9d5d1369
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Premium.gif
Filesize6KB
MD57ea008dc779fab46d94f049dbf5ec4e6
SHA1a6fad002f6dc6fdcf5e774546d43f95a8ec91419
SHA2562930976dc862bc10092eca339f72e9484dff12d049977c11e046c2889068fbbb
SHA512e8f542229f65f4e9d872523c1c6af47ff1b484ff34cde13462643ed8dbedffca852a48427a8ce4a8f2dfcb4849d887dcab1df20f19684d7592a92a9271f69ce3
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_SlateBlue.gif
Filesize20KB
MD52fdc06b066eedcfe78fefc4d19c172b8
SHA1b75433e275d5012fd07965fd691a90b95d555b0c
SHA256e09fdeff6764b35063278e801989c5abaeeff5ebf5580b75fa4d21312789684a
SHA512ed7c2c970c5dfd59ad78de2c0a61e077afb70c0bbcea707f2cfc264c0bf53c65b2f8c6a78ef5ae41866d7b2fc5319ed76014d4f207d4a7f6dfa4e9c05375317d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_TexturedBlue.gif
Filesize6KB
MD513e680beba0b06832c1eb9e1b9de2541
SHA10980ebf88479b9e9d0537dc005707b3218bb919d
SHA256e6af373241174e948f6b1a0c35f8365daf865cdf3576cbdc550fcd9077a21415
SHA512543824ffa6fec3606b37586e4416e1b46bf288d29cacab74eb72abe8f99ca7a0fcc9b0037c2eb14e56aec98579e3b47c3e51f6fcb6aa207c3791a0dcd408e5b0
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_VelvetRose.gif
Filesize15KB
MD507bade1b0454f95c34b4a536de8c9acf
SHA15d39674ed7467e1a65783ead80489b0e8af0f6fc
SHA2568da7fd3a6e156437294e8425c083c741c5c4a35f1d8a85e4183966c9a6dfb175
SHA51275fff95f7df076556f2f205f41051317a0c2d40c08d5d3545d9ad1b4a0cb007240e25245ea2aa923c59900709a798608c6c3118a0577255e80edbb1aff8d0db0
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrow.jpg
Filesize3KB
MD5b8f7a07cc7bac3c4698fb7ddfc54d3de
SHA12d655b47d08d2f761e5d8e5c5a98eb0b95b209b7
SHA25665cf9589d4f89123cc26bca0d52f162b029d74f5f6f7b54c80bf7768e5cf405a
SHA5126a1af6c3b926341e90ec881b6f0fff58250d7ddb86402395e31fd8d073710a2a8aa457e5ced5fc3b0e4326052042acf684d2e0be107a1bc895dbccf1a9747273
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\AddToViewArrowMask.bmp
Filesize2KB
MD5d12615b0bb4a319b32c2cbb6e3781d50
SHA1b925443dfc2de51f35b87194a83f2f95f71cc81d
SHA256a1eae0b1c6971d88ae1794206f0a96211db88ed4c345ccfd7b51fb782e545e89
SHA5126f40a1ef3d60c2ba5ca90205a0510132029b0590727e552f41136154e078cbb718faa6e8aa9d715b267ba858c06b3bb1223b2ec663eca8e92ef5622b07e41fd2
-
Filesize
839B
MD56d169bbc8c4b919040661624dc06038d
SHA17eeeaa690f95c2de5f9cf8e8700b392dfede90df
SHA2564f146151353cf72f9fdfb2b895903d2cb191a675d650e79d9c9e3170e634d975
SHA512654d156c743cd2c9691a5be46a5a5903a4b1a326230171bc0c2a27454b3fc02d70cb16ba889cb2cade35b65437919f6b80a5e0cf775d0a9ec33dc7fba9fc1d74
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormToolImages.jpg
Filesize7KB
MD51e433ba4c28551c026547d76eddeb2bc
SHA1362a3685b7a7f5280e258eef922325b7abee01b9
SHA256e0df6fca9f4cce03feb13768c7ed7801eabddce36ae5fae5ffca59191c568736
SHA512f0afae4e688fecdd0637ffe4f477b30b2d6531561fef2129496645119165deac24e8660f050b50c08a740c18be67821b9f4cee5b674df2be93ee9263bba99996
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BabyBlue\HEADER.GIF
Filesize776B
MD54f28796448274639af44587075619dd6
SHA13b7a049e6fc8062c53b465fa02701b422e8a3ef3
SHA2567d886eb9b1aef3c9cff6197bcb4ecc5e59c7b7269f53e81c333973f03ba5a36c
SHA5123342997ac2e62bd8de1c717a9d7e959a4d13d44d7678475690b7848f9298a63b7893f771ee12f1fd0010a9bed4fa55a249abaa746fae936e9ab97d874c820e91
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightOrange\background.gif
Filesize844B
MD53461f606bcaf4a6435974a1b53d30307
SHA18904239bdb5bc2000a734e8dcca1fa057ce22ef1
SHA256640b5828ded30fa7323ef63c31118aa07e83b8d172ab52cd37b799f7c39eae6c
SHA512c7d865d43757c6415a5b501467ddec0074b40d40efb9fe6c56a57dfd6dc79cba40485c393fba1f1d681caeff881a2706e97e2d7aa4dcc3f318605c1c7bd97c47
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\HEADER.GIF
Filesize888B
MD5ff8b014c818e56bdc571bad8482a41c4
SHA14ad1a7cd70553edbf923894672d997c9b2ee8b52
SHA256dd037cf180d1295439231fdbc86bbe30257d6adfc6b5108d3191f7ee540fc828
SHA512f86d16c769ff8292406eb3e23dacc5de19a1652cb507b6420a0a4bf567e43ab230f07f302084de48d8066dee4159217730c46f79b7762cb7c4d1db9bcf9d5953
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Desert\HEADER.GIF
Filesize669B
MD5f354580b22a7a7377cde87898c777b91
SHA1759b2816f7412ed5625195411e308a9377187001
SHA256de3e452b79ebea273b19d535d9f6efcc0250ae6671baa16680e80c896e102cf3
SHA512a21848753e7a2bd053d63958d6c19e2a5ab5c767d499c6a9a299b779b01558ecaee87709ae75e2aff717ae86f4761bbefb99448219cc720a51697c16e4517c5e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\GrayCheck\HEADER.GIF
Filesize961B
MD5041b1eadc90746896a021316348904a8
SHA14c7f423ded231039fb5d381a8664786e01c6439d
SHA256a64daf38f15fdec06acf822b29edaaf2135410c65dd4ff666e4d74020a0dfb2b
SHA512e654585c6b78f055af00ec58a69a825516baa1941009686cba915b6a83a8eac85d3e7f17b649d5270cd7be289065d3f198a334e4e336f1fa3444b7b6329906a7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_OFF.GIF
Filesize983B
MD5dbfebf289799f4de30bb7a77788156f8
SHA1435054fd544bc752094e6aeae25a4b0f34e66a38
SHA256d6cbf2769508cd08ce9b5824e1b420103d856aa0fb5cb4a5d2ab5d0a7dafbc4c
SHA51276bd86bee0a1a1d090acc33d9b2d4611c9547449fb4d8c9b88113bb3028c4de11d2d13654fd4e1d3aaab9223b52809755a0fee61042821096e78a9dc5591c68a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Lime\TAB_ON.GIF
Filesize788B
MD5c7625ece28f29cf25b089bda7c3d461f
SHA1d3ee5ae325a9b09097dba32622015f8e0e3549f5
SHA2562cc5ed9c05ea2ea92cf6814bf44dacb7ac176233b8afe35774932afd340cf11c
SHA51206e6bde82cc7c0b1dfdb8404d34279d8b67d064e4299de1167c1737badd5ec52797c2be09b3486e4839659fe7f501c8e46ea66adbe2cf393ac549a1fe6fae8b7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Oasis\HEADER.GIF
Filesize2KB
MD5d6a933553b0446ea3e3bf779a3940823
SHA18c331592cb667cc7ab858df3534ec6296dc1d035
SHA25660e958b6a10e2cced966f7d34751f67b5c8527334ba229f3658a91ead25f2dd7
SHA512ef70fe83c5dd5d149747685d22e08d6f1a4c21e9574d4d75bc80b86954950a5f6e988a0fd4beb8fae5af1a9fafee849fecb5c37643baff8f06876fa53f5b1618
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\HEADER.GIF
Filesize3KB
MD5ff6ffe45771582e8d7d9917914c99d7e
SHA19d427ca8fd2a37de0389384d220d351574d7219b
SHA256efe59d4e0c2e461c2adb03e16c826b1801fa45dfd279d2b69a837b9a003eaf0b
SHA51293a20e2a4249fe06ada13a264428bf4761fd1d8d1a54623f9fce0bcd0ee09b610c617159ce950760ba0d6596674611690f9d90b614dca781574cb6366d4e1cbe
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_OFF.GIF
Filesize983B
MD5ef19feeb7b59b71bab1e5843c13f2322
SHA1aa1c766cb81317ae6fd3db31e38fdbba817da505
SHA2564e9855e4326c6897578774c55fef69eb3435bca79b70eb98c5659daa8517bbda
SHA5120a6a73a70322db3a00e700e7787789e35fe8b23a41f5def93a96578aab4f96aae8f3c6bd4c307f814d1eed93907a853b4d5c95b8d00f3069e7d109b5d3b4fa9e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\TAB_ON.GIF
Filesize785B
MD5c98cdbcf3ef3107f7f91d4e1f971f246
SHA112158459b72bead8321f24f56ae2e0c4ea0c63c4
SHA256b4c8fe55ff4c491b39a2cabe18d807ef6656a930ec3651462545e506ba757295
SHA512a7dc02c46a52cb482d2f039fffa5bf8bbb6f3e27146d9bd197217d5fed3e3f4334bb5f74c4fd920649cc64e97e0f35ffed1b9d59335a5990bfa7658eb3426c59
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\STS2\background.gif
Filesize754B
MD582108c9076c852cc88e25dc160041541
SHA192218986abe2b8883cad651e387cf807f867d4b4
SHA256f389153ce93525d4d530e363ad905badef11fdd3bd21954ead18bdeb403a82f5
SHA512939d3217540e8c238d687f3121213bcb9e9a6297ea97e1571b3e9a72da202455ba765797380e370ef78b6d778f3596bbe4b8165bb8b17b627a7d20bc1b0d559a
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_OFF.GIF
Filesize885B
MD526414d189b24b23882cca538975dbca7
SHA18368de8325b8eb5437ad7d51a34986d6b18e54a3
SHA2569a541215dbda43ec6c54ee26880da62b7a13359aecc821c3d05e58f305ab5a11
SHA51257892183f14895a4ef5f7df36e6825aae4afaa517ee38d98ce4b5eb8ad75293c34475b91507ac2be99bf470bd8a0a48260453e3cf22726dc76b93bba0d98acf2
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Slate\TAB_ON.GIF
Filesize885B
MD54a0604fcaddb0cdd15226912093f72ff
SHA11f54d19ce7dd531421a282aec4fac6e7a6ae9ace
SHA256c155fed601b7829f3c206a7c1a18bf64f59a436b775af8456942c43bd7033abd
SHA512747738372a7ad21252a1817af4ee762f3ce3b78a23b893bcf9bda9a61a5784588a35c9435c03eafd2d034135998916390af77ebde219b36efd37590b52329b6e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SoftBlue\background.gif
Filesize7KB
MD5a3936626589128f31eb8f4db34c32c96
SHA1f13a88b4c2cbf25d2a366d51058f329f30540b1d
SHA2560e84e58f5e18eae484b134a7375b793e68aff360ad4364ff92884e8bec7ab6e4
SHA51206b23d48338d6186f3a922c087d7a6d9164644c406ce0fdd928f4929b0453f4a7ef9a48317d2e6ea10ee0b04992729adf5b53442f189d327c3ff414c20391576
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\SpringGreen\BUTTON.GIF
Filesize949B
MD5bd302c0074298ba8e41aba8c20210ccd
SHA1c6ddb92e0b88c1491ae4a80e83531d8602ae6031
SHA2561a02654ffb019f23961459a24bdfa071371f0a24275c91752550012595795a7f
SHA51239ead573e06d0d5e8d1a5646842092ffceb79ecc83f7600092388f881b6639b4793cc1e33535b5999e7bba958991738760195809669a5d7c29f56f2133491286
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\HEADER.GIF
Filesize26KB
MD57f5672c056aa680e04e0e6cd9c689707
SHA18c3a002daf48d37880b3d4bd4623233837cc2a49
SHA256b32ade5b3fb7c13b99d28dfbf2fd34f03589eff8866612a85c55b176d479e350
SHA5129c680ca359a0f037d229c9810f036447c7d7134f878534bb92739ea5d196531d0de491edefe78073099eb21a8e6b02b06364f5604b2812d225c87233256573a1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Swirl\background.gif
Filesize1KB
MD576be24754caebbe96a27332a91fff406
SHA16986a5d5b9c803db17342604f6378c185bce4e92
SHA2562df2d0085515f09c094024fbcec226c0aab64856525e02c98575c6610fa998a9
SHA512cf623875c4b0cbd5f378d57c40ac9474c154db8c37ad31cbc0482b9749d2a0c08cef5c2bf092b3734074b1e657da7cb0f91a213a37f775ae7d6201f48c1fa86c
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\RTF_BOLD.GIF
Filesize1KB
MD5ddcc954c9efb2a1a3ba7e42b9a2cff48
SHA147e9da56e39dc8a3fcdc590aa9ba5eb9ec29c0cf
SHA25661b33a3c31374a99b976e094ab6ec19afbd0a27be167711435b86dea58ba43d3
SHA5128218a852860ff831fc7dfcc9f7e63ddb21d035268a89281153252815dd7f1501a53184597b9449ca29124b24253f9cf1852e4476e8cf64747a52a53c5ce03c1f
-
Filesize
839B
MD536e036ae10a4fa8be9af6554c8f48407
SHA11134ea2fdf47dcd4194be994e6974548b8da8e56
SHA2565fa02baf8ce596e8ac23a401692430576761d604be2e3406989b4b9b335e1237
SHA512c2aae79f99b19559f8f8accbe92b207fd8772d997735a9f489a560dc0f1af3c2bca80eb506b0e94f13243e2c9663ac03e5b9ec7537d4c74b6a32ad108c6fd07e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\ViewHeaderPreview.jpg
Filesize3KB
MD5f6c877ad1bcfd15d61c3f60da0e6d949
SHA16dd68aeb7b363938c415deedf22c99294b1d7f87
SHA256b18914026a57ed389e07f3725ff09ebe97c96c19ac02cd8e275ad8cce7afb711
SHA512923387762acd5c3568448f981b9f3ac77ca58b6cfc791c92162c5873bc6ad740a120ae6815627a1ff1dd3dabcd7ead6d3901bf0cc819a98927f163ad989eb9ad
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\attention.gif
Filesize3KB
MD511ce00dba10e24b0d6c89b9375442084
SHA176d18347b9f9412cc5ba85af9615260d476f7e01
SHA256c9492a4c0cee75bd5250c7179a9197ad3bd2a37ae135d86594b389471f3ba770
SHA51273bd7ba3810ac8eb6cd25a8c42174a7eff8a28d4dc721d2b77b0c6968bbd0a182d4dd1ce723dd717f40507f912c7c43234eca821b500da9b200454bfedd96c28
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\bg_FormsHomePageBlank.gif
Filesize20KB
MD5d731b72961289ec67b3974986c35785a
SHA1495cb6c80bfece25e9e67bcb2f0ec47e1a3edbf7
SHA25648a9074738a3c5fcd1a813e87fc57ed683ca67f31dcf97dc7e0e451e9e70b65a
SHA5120af60774f174d83631162a67c76cfaeaa46c857f8b9444fc59418d81f4c5bc7f5f0257ba6b041a7294fde86dd78cb4d263ad3c2db87947e44bf9ba04e100cd28
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_choosefont.gif
Filesize1KB
MD5eada2cf09da9f6afeceec32887a7ee5c
SHA182e8ab76575874341805c066ae2e394674654c6e
SHA2565c670c51e42a801ec87b39608c646b17715e5045d7b522cd32b12a60cbc34e51
SHA51299c5b1e1804723c3a1cb25ccdb93479c0fb52057d5693a30c858417a666f3248322fd3df17124d9689e245b8484ad1cced8ea27040f32495ed430008581babbe
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_italic.gif
Filesize1KB
MD5667b0fc8c5dfc930539e5cfebd66df3f
SHA1d7035005a8b63a98ac0245845d8bf180c762933e
SHA256e9100851bbc5591d39b6354c2c58d192b331f453955934dbed781cb73fa35643
SHA512479d99357003ea80484ff27a1054753885dcb99f9cca7b2c196a848683ca04bd6ce2150fc7bec90b7bc2fe6d55ec8d2fc0840c4b781690e33160f621e0973a52
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\rtf_underline.gif
Filesize1KB
MD55ffa49fa5a2fe0205a75e4a726667891
SHA16f1341d64e771be07071387e5a76b033c3e05ef0
SHA256fdde84d234c0b4a2d98e70092f4e4df3e8831a6c28f1c6dcf267db0e0cc137d0
SHA51265b235b5ad1d4689c99dfa6248b8e5d80eeaa6b4ff855b01a1cf3322d8524119c9b6bf37d558ecd6d7b4433b810b7dd842363a90f2a6b0c7b1581f17f9f66f52
-
Filesize
1KB
MD5fa89ea912c22c162458d04ff817aec1d
SHA175bc09abb77d593c43856ead193667c4ad96731a
SHA256680befc2c2679d894e774b1e32e12555aac7fc81876e329d9178f3e1be076e92
SHA5125727c360193b27149ea2cda0cca50764cf23e2b083d063cbecda1ee33a888119873c7fc83a02800da7853074225ee8d49fa09782dd8e75b3538f5b0602e454b0
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\CALENDAR.GIF
Filesize1KB
MD509e3e27e063b53d0443e1d415bd2d079
SHA19155f2e88c136fe470009e927f5cec1f6d4e68ce
SHA256320d4d4c5299453b37144c9d2c06cc8cc5d2664befe8eb06658faf4eb377facb
SHA5128c1aa49793fe6351313b017002621b6ff67d0e531fa029fe4c8985178dd0c0a87f199cb0ccf31c2c8cdb4204498c96c61ef08e554bb963466ef2867031ec17e1
-
Filesize
1KB
MD588430fd2ace990170ed36eb98a0fa497
SHA1cdabb49101ce3e5a879a4fe1d536287eed19fc87
SHA256ca0ac8f029596afac44422124c5de4b3699e25c69b708719cf663d05a480d12b
SHA51218e52ff52aaad7c18c03483131e1b5490910d0391e6865d47c11113050d1baf4fbe53b7fe85649d70a47f26058b5bd00a3655c6eb7afe2a0df8ea774a1decf97
-
Filesize
1KB
MD5ed09f49dff40c365ad37111f7d603f5b
SHA1eb76c52544ed49cb4d2ebaf759f33884acd182a7
SHA25616162839c784609a75ad5eea72b7d1b4991035b43985474872bb2d4eaaba9733
SHA512226c62da8527c0884dd89f591b0b79a5db0a349a3aa181b1875940b85b6722ac1116f0f12088439c1d2df2e327373dc53df55d911763e4fe76ac296d4e10a5ca
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIcons.jpg
Filesize5KB
MD58fd30f50f9c6e25dffc22c4adc947427
SHA121e62f83b7bea40bf65ec47bac59882c7fd5f101
SHA2565f8da153b9a8ac213fa04eb293ffdbe614616f10e0f179e108377107456d7825
SHA512e12b367ddca15f56646057601f12bc0ec329ff851e2f26e023e5ca687d3dca1e39382565ea1666b633709b38b19e055193f1e84c26cc2306ff87e4cd1d543d0e
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\FormsViewAttachmentIconsMask.bmp
Filesize2KB
MD592043156bb63f09a7c4582ba988c6826
SHA10fcde1e31070bec706d59de795c750d2c1a0ee19
SHA2560cebaa5d0293a3714a589b14fbc3cdfd52cb9a405e01d2b0bf6ecefae05b552f
SHA5124d04530c0698f6292509ffae005cd1a82ef2526605b7843a12015df54c4231e8b05174871a6c98ad57cd42850c999bf136f89dccfb4b66d7977bb11312ad7554
-
Filesize
1KB
MD5887e5a92edea3b0eec59d035b87fe2c2
SHA117550ea112f5c2c178fa1be0ebdb08b5e5cbffdd
SHA256fcc4f657715bb17d5de3c347d63e50d7803f6d2bf33a5271d534e82b804314a6
SHA5125d592cf9a21ae1a4447c6dbb08fb24b73a11ae1fc79ef50df15876c3f53b20a6dbf3aa07151d61442cc15a471b0a3591b486df0cb463c2456889392d5a9f6311
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignleft.gif
Filesize1KB
MD5f9172b56673b7a660b0b12708b091f61
SHA1946e4f5389133a89b1208ed1bed8cf25c9cdbeb1
SHA256aba044f3b5a6f7392e005c46fb1f4044c8713716051945d5f2f15d74b5605936
SHA51210edff0501497713fc2c17be8afe2aa3731199c5dfb7d3554494e93c38c86d418a978f3849dee40c6bbe66f59f8db5fcc0c02b3ebac38b512c7badd7fddf8ae8
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_alignright.gif
Filesize1KB
MD510ec48fb46200f641f59fa50af14fade
SHA119f0d58781737cfc54002890a898cf6592dca5c6
SHA256031a9148cf547993a75da32327ad3a2f7590276db7dcffb9394e824bd85aa1c0
SHA5122c77388e26409afde4189ffd2af309d4c59d008582fcfd6cb4c96b09811dd5d0a29919f348316dc314c39b014707c56e23f54b4eedd9b5d71e35c5143d7e5eed
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_bullets.gif
Filesize1KB
MD51707e2bd3c85ceebfd8b31bfcb731412
SHA1fb180e07f0a0a63d4b608769adb762d8ff786b65
SHA2566f0cab7c699027b360fd2fc2ca967157262e973c361a2379900f8cf2ddc9e08a
SHA5122becebba4b77dce3b6370ac58632c1852c3bf0107a0d67cf61feeaf1d8c2a1a07ed3c12653169bd93dce09fe0ae4924b024b26187bcf73d4fb606734eeb74365
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_center.gif
Filesize1KB
MD5ee55b6bc2e4457ecf5eb802e1ceb786f
SHA1742c1f49c2cfd56e598c41c5e808edf86c636bb1
SHA256f55e6e2995b0ab786ddb9e7307f6de7c4bf3a60e3618ea5440fb91418b45daf6
SHA512faf1bc351f03287e9b4d064c24245e31392361a04b4534b4ff95b0fecd8de94eb20be5509a4111f795211215acf5d7ac7411e8178479766acc1313bfa9a77839
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_decreaseindent.gif
Filesize1KB
MD5772d7ad56061adbd9898a425902ec2d2
SHA1a146e9ff2be8704fd6d7f9742bb8b669092574a5
SHA256b7a1ee14275b3406405b8affbe157712508aab775c3b3dffbd8020c423b87c06
SHA512b6d43c9dcbf2bbcf68ec88fc1291cd9fe2e9df29512d78cf92164c558b8e70d700931a7955a3e53c1f280686143032987065fda06a90f0c7d40233c314f3cab1
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_increaseindent.gif
Filesize1KB
MD5318fd52e695a09869ca5246b46b8365b
SHA1aa7bf3482b8e1e8940d58c9fa2d5d9d604a02420
SHA256fe4d6bef230cdc67e3bf553d1d33821ebb1c3afdf4bad04f14134f1631bc9533
SHA512016230db84456b74dd8be519d14b4cb382810aa71387202bace37106b7c0d440de449a6d4c0eaec3b4ba63599d33bf44f18ef9b7b7faab84210e577172584943
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_justify.gif
Filesize1KB
MD575bd781c1b3c264cb58b3294d3e112d1
SHA1b5c5f18a4d5e0708496d90bf94df3a9e6e082e2b
SHA256600980e2d3707d1e9e34f96e3b2ad66e9a30f31c850c8cfdf3596bd4624c7455
SHA5124e1d2b4a9c62056e8a785a40c08015e9d7e1af0147669833d223f12c540b9914f1792ef2e0f034b2bacf0a6552bb5e87e9eaf425697281fd6cb44cdc0b38b01d
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms5\rtf_pressed.gif
Filesize1KB
MD58d50d8b33d6130a420f1ce8325bbbec3
SHA11ab1b5f92dfd57108ee72a7865c980e4acff1696
SHA256768428a62836009d371bad53ea18717058425f6e71a9a2e4fd6cf7f2de950a00
SHA512623ab83f53cc66b99ec0cad286168ffb25603d34c6b70930581cc49c5e4d67bdaa3b7ea9bfd66a3924b62dfd9f750bebe0b11538206f9abccba6258228b46170
-
C:\Program Files (x86)\Microsoft Office\Office14\InfoPathOM\InfoPathOMV12\Microsoft.Office.InfoPath.xml
Filesize247KB
MD5ce2e8560567b60e3fa22101ba695f764
SHA1fa3750de23098c75d6becc0d5752e1325a228259
SHA2564967cb28c1c431e63f7afd27940c4df5355ddc6410d79384ccebf07fddc85fb2
SHA512023a66146da93d82b551b9e3655ff9dbc5118658f48fa2d119247e0c41762de557484bd3f0f0dcc3457de6ba50cfcfb9fe8a66fd3582f91c3be6da499af03c1e
-
Filesize
1KB
MD5ccee822edaae01d1422e84cd4a52e35b
SHA1c0fd15192613ac587d1322d7ef51f413c6be176d
SHA25691d3836fadf78e35169e786177e2881dbedcdf7f24eb5dabd52f5afadf27d0ca
SHA5127da9832f03ab528c2c5e8e0e7b7877fc7a63c7c4175044c37bbd172ee2e9fc955fd5d9f96f06e704334c71b628ca4ca8f3b9b1fd422450001b0e0ab4ef5b7b04
-
Filesize
1KB
MD59849099aa9d3bcdeb33ea09c8bd5bf94
SHA14b4b763399ad34e5116b7a910699dd6f0ec78ac4
SHA2569a60eddc549ec606ebc1025764984adbbc2ff39ecfb46575e542cd6ef6bbf8ab
SHA512ca0d3ed8e90345ec70e3af52ec86fc9794a1d623da87b25b419602667668f4b7cd96b3800aca8fe640ced319129db876ba83f5581778063fca1647a759bdf5da
-
Filesize
6KB
MD5974faa4c51c461ca2f6fb006a5ca6a6f
SHA1dbb9dba72603cdf812c05abe67a0cd9b98ac93f4
SHA25635b93bf90e0caa5c91a6ed16b2a501376f4c1fe04b42ab0a7183fd69d2384c32
SHA5122b663afba2f6968444c6b37a869cd4bcef4c91700901f49a7a6ba7c3f868b7eeb6b3a75e2a967b9d8ad19e21721fdc50fa6cd064bdede5ca0fc218e55355e251
-
Filesize
674B
MD55d0b367c7e32bfbf8cc35f25e96ae4ee
SHA121924c2458b3eef0f3ac953beec438c7241a13a9
SHA25681c2a91a7c262a520e9892a686262c4a5f4e12976680ef029665e3af1078ac87
SHA512b40e6c7c9111ec2b15a09a3ed042c314b10d88f70f6512dfd332607484ad3e4724db2f09778ae2b004c543424f3f01f50279226072ac9ddc238fff37b03b6fbe
-
Filesize
548B
MD5da93efdf3f8b7dbd6bc1ca5d7351633a
SHA1dbc7c653a7552380ba8ba5ff3a7561c6c1dda73c
SHA256e3a5d54e089f88c92f4357e538988284b550b0f3d4e0d247d7140362d56ad254
SHA5129dad412bf7a4670d51822c0dde5675a2ff3503d87bde68f89cebd6818516cf5f29e947e7b85874913d8ba04f070c7acc4cfc3cbc01f5900f155ae7c0bb0c0ca5
-
Filesize
548B
MD555f291d2d79aa6a09243c2d6188f2a33
SHA11f8e51bd52f684ac0b6e181f3cc81293bb86bd72
SHA256348043d46e1d369a39f338487cd18ef76f3d9fce7bf4099416bf7ff1726f9f4a
SHA512e03eb449b1f0fcbd7f20db5eb68a1457616ffed2204905cf909ecdbe093be1b90d2edc94c762cee5a3d9249ec0aea5acc0ef66c362a0566d357cb401a7f859a4
-
Filesize
548B
MD59d88daa92e7b8a25fecd3b697058394b
SHA1f845ceb73ee718c03fa5bc7bd033e3b817332537
SHA256a5ac561d448e8604cdbbbc8acfa6ec4046fec7e4c103cebfad9c3218a61e5134
SHA512a469e2d5b22f707472eb23502a843617b4fe56241fa47b6f93dc14da8a9a1e412c92b114b113705017a0539bf2c720c6f6e5fdaec96cda76ea70fcf59b674f4e
-
Filesize
548B
MD5276fd799a1141ccb6dae9cbfd80459d4
SHA1d9a7c194fecf9a66f80de3267bb94c65abca9b82
SHA2562d6fc3e573ac50c3567b9d20fa664a401bf0f02821f949d3521b194d0f24c652
SHA5129239a173fb8e6fb1fc67563d95051e87c05737b4e4fe4d8083db72d67a1533ae72af58e485dbfab3fedf5480b6839de19e85675e57b19cfb9dae5cb5ec63db10
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize12KB
MD5ab8b6a8c9cb1a42cf647fa9ebdf25b1d
SHA1a5936e711d50b269f2c031f0f6296c3cace65256
SHA25695c886e95eb4bfb73ce02f2608d6c7b15614423662de6834a8fcaa69611b46b8
SHA512e8e264ef4cf242d176bf9a15945e9378d10fc1ebaa0f44df6dd178a29b180f719085c5fcbf97d45c9b21ddbbc8a61cf16e6935c14da376e8265afdc209d08e4d
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize9KB
MD55125864944d8a9f53b5c2415fad654bf
SHA1c9a06e7e14619b4c22a4e375dd39a26e3bc24714
SHA256d0c04d7e99a21fadd7169964679212e719df45436727571352e856e7521058f1
SHA5122672d53be92b26b8025a7f9e22d9fec3eaf41af38994e5c5da6483a482732ea25e94dd7b6059bb29d867aa3c77ff10a931b2c8445ee58517de552ecffe75bb3e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\META-INF\eclipse.inf
Filesize578B
MD5a31fe5c3eee8f67a540c6cea635e3990
SHA1ad562fcb8243919eb385b371a25a25080542e56e
SHA256d24cb12beb4dcf0467e94cff72145d132e8cf05f82a3ab4a3d08920dda81582b
SHA512fc35392dbd0a890e0ace5ee681e902046a1c711e4c22bd1df8979f928653fb3242e88716c06f1dd4d429965fb7e985c58043f37e17ef5c2b79fc6ad214a67a2e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\asl-v20.txt
Filesize11KB
MD5d3c7284bcfde823c6d49425fb0cd4016
SHA1679a05b22a7e77fe7aff8cfc2159a8b0eee213cf
SHA25603702338e881516faf9f3a16383a7816c582d0df997bd1b54bc619f1a744de76
SHA51253de672ac1f686d9b57196154f542584876e4dd6afa28c5bd6dc886b42c06b7d9e21c6085428992bb2d8436619a0c3b032e8b42a0f273bc4417a0945c9798ba0
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.RSA
Filesize8KB
MD5608b738df941bc6381e717dd3c166744
SHA1ca30d6d1153d770099bc4e614bfdd4aa4f9485c9
SHA25677b504df02b2994c77f53a823833b57dfe64ef149ab477b6fe6c441ea920f590
SHA512863777dc2c85fe2f3d6b25421c4e7e178ae173d10a1c4997c71ade42940e050e5906ab9b426e75ee36d9a0e3b4d3adebe9caaf680dd5d471826cfc1476b878f6
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA
Filesize8KB
MD51fbd93ac106468985ae760ead9d431d6
SHA19788856bc86f2e86fa803e19f42f15784db0e1ab
SHA25647771a4160c8df95fff4c8826691dd7158ff47aa03dbfa555f774b9208e1c3c4
SHA512520b2b7e56ab691fc8de3018c35d896b80b10f3626396824d1f22e90db455b1ccb8aaba7e90a4277ceaa36ef42ce97a1f6fe75a688f0499c82fe8b06a6f9ee6f
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.rcp_4.4.0.v20141007-2301\META-INF\MANIFEST.MF
Filesize654B
MD5b8f91ad938f28b3f6592c87c5794d6c9
SHA1417582d7376c97b6fa03199ace9ba218ca5e4df6
SHA25677c44eb12a89000f23b33a5dc038bbc77f4ff56cd18ed174432a33fdaba314b2
SHA512c9ab634a52a391b4970790a042b66a43abecbbb379d746d39fd41ae9a3876ad248b526730da884306134c1a5de063f8409039a945ae080121184fd4e066526bb
-
Filesize
3KB
MD51ad0159fa9bd278d2374bba3590cd64c
SHA16662557727be6e493af35e14eb83916e6a7f09a2
SHA256179a8de2794c8e388f97dbae847c4c2615d2627d6b6002dcee3cf3ba6b4b5c4d
SHA5120cf8070e5dd3b076e2c5a0543258261e489c49a6c1d31c6e23d92b8b621a26cc4d6fd020a2ad86b778afe7af1d4d54d114c073d03ba19390b27252818cfce94b
-
Filesize
562B
MD5d024123b271c4b4daafa4d02f10ed4a0
SHA13f9b9f867781093137b7adec824d05dcdf62ecf2
SHA256e0e8f84f39486cbc90d89efd4004139cb5b346392a9b18ea685e68952e4db425
SHA512cc6dc1c39c1da01bd7027150106a36a404dee49f8e7fe2e17bc7e1755df21d057c8a1f68162d3c644a1720d3ddfa1acfbaa939c9073618fb8b07ac0e8775760f
-
Filesize
109KB
MD5d648e8b9f8bdbaf2eaa586c0bb2c4668
SHA143fde33cbf151dfae083ea74dddeb47eb5d87c61
SHA2564c363825ee7d95e6f4795094112f9368cc0a2e587a3a6404eca97416d33ee222
SHA5124c059bd4c8006cd427c777ed1fd8e38a654d89abc71b67068d9e4a293f55f402444c152de062f029d13f79f0d381ec4ce4b6640d2e101e63f128a73ee914f743
-
Filesize
173KB
MD5b4cf3c39a4480eec0b3cbf1aeabf46f2
SHA135ab55b7ce5a97277be79bcf42ebc52d343c4c9b
SHA2564ab1d960bf558e7a9b39117a0ca52c420e2a14243a1a88ed3a9318304f9eb1c1
SHA51257e24dda6b50ecfc8b74f8c41460b4725d496cf55e216cca0a0e13dce0b8ad0a41ae208843af1c7e90caa39656bfea371c92608a1b9af93e92fab597b2f11b6d
-
Filesize
4KB
MD506ab91b0533797b3824931b9049b5403
SHA1bec1d283f39088912cbb3a9f62901e63bb2a9193
SHA256bf6101918d8e23f7097b559672d22761458aad4cb94d91ba4ca81fd0e6eadcee
SHA512ddc0d4532e215ba09b1bafa29a000c47f9852490231e76087eeb917477609d28f482f950b9d49ce9f8904d5a459a9b021dd704be7acc007c0cacdeb30eede5a6
-
Filesize
548B
MD5f0a278b3e9c511355cc7fccad9d8557b
SHA17fba0f5c6d6df8884ea8df225989ded2bd5ce3c0
SHA256544afa33083d4465c93feb9ef1e6348b7d8656222c2942d51d72e1a0c55546c6
SHA51278c0584a43ee14a3adcc5c0ea67c8e6a88b214ec1f3944e884e7ac04ccfd5d7ee78b23bcf5848df65d882406b9855d9fb40ef8c91d13130333d1053b2db2706b
-
Filesize
1KB
MD5dfc12c12c15a01598fcd5659dd761b29
SHA1af568518cd1f9d244f2d9667adcce70ed496713b
SHA256812a691ac9c491921ba43fdac095b08f08f344c70fa17d3b8c1c6b875c92e527
SHA51238251483dd8d1f504d49707585953a2da29c3384ceec7214aa16e25be054ea50630b678d7752c59a395cc7544e10dbaca54a303cf98f5919c35abedc5051db10
-
Filesize
548B
MD5174cd1d2a8fc5c522110e64c12e335e4
SHA1558649128fb2c847ef4b692c223a2cb66512bcf5
SHA256ca37a3086c57534fea33fbc28e3cbb27756e7df383542b6cc12d64208c9f63dc
SHA51200c5085b16a39439c901b8fd87dd228fce260beb097602dc9c7266e17edc26f0ddec20f09bf3b968543649085bb33f2d8906f882af9e824d65c5b4aa82c85696
-
Filesize
548B
MD5465d32f95dbd86f106cb95b4ae9971ff
SHA1977a1eddfbe5b5ed79fc12d7f8bebe43b91abcfd
SHA2567f64e458423de82e2762b9c368e98eaf1e9e7f5f8db0c1d811bbcc28625a8189
SHA512a86c23e0f3a0d1e2f6632fc193be97edd6f1c64ad18e67b65a9f765c669cae80ebb2116ed5c8affab25c40951a3581545b1001775311f7a0f0eb46e673dd7b7d
-
Filesize
548B
MD51ebdc41ce04d4743ecd061b77ec8fcc8
SHA1fc2c26dc6091633eb30750a1be2d65fae1d8f53f
SHA256c02332269a7377a36dc981107c25d2a1ba489ed5f2a1c65db9dd64317d101475
SHA512ff37bfbebd5b8d4124b979c978bb549a2164b24d478e7c57342ce673cff1eca3ee04fb97b645655ffce1ca2871578e614a1d56f1575971c7fc98d4028dc17c14
-
Filesize
548B
MD5abb3182b9d24117f85deb5c598c18c45
SHA1da03ce6fa3604f2581955126eaa1c226cae84317
SHA256aaaa277de5d147d4068c7217c76f711562dc2aaca761593d603f1317b8c15394
SHA512a9ca68abe6783e9bba2e97c97fbcd670bf825a86fff2cd75a20eebaa0ed252485a5b67806c654bd6f50f6d121ce540a5075bad1ca651ae44a4afc4860e1a2127
-
Filesize
548B
MD5ae679fc79588fca1d9dd1c748a88f193
SHA17f9878253e40292300265d9374d8cf34cd04781f
SHA2560ccd27fec26717d5b5e1e06c8caf49f7f9bf21eff1780eb4ed2bd3238d2186fc
SHA51200c358e5fb0ac49baa971998082b7bffe530e2176cc24b3b156cf454f12da19b3436de650b90c42f4780f9e24f722f0c486aba7af32b035e72279446560f41c1
-
Filesize
548B
MD5f0d7439d699e6c29cf028b82025edf96
SHA1f9cf00d45607c2b3243daa673a0fa97dfa989b12
SHA256bfc056d2db3d7df10d73d760e5f5de30d16ef0b77bda6e9f9f74d8b7e39946a7
SHA512fe801061014688baf3bca946979a86905566ee2fc9a2080a9a6483cc9463f1a4daa1030b80def5994a06573af3ca10f5b21beada01bedee18d8907c788621c5a
-
Filesize
584KB
MD56b6f6f9f0737e25cdd6f62187b2464f5
SHA1b61b5a420c7cd049f3483c0c1944d7cd32152df7
SHA256ee1a7761ca1b6e69f8c66e76c44f731019e5b5938c0f89d4e2c0152c1e086869
SHA5127a58cdf61a5f32dc927a7e14a266b46ee3756d43f37197602bda78ba376bd8ee1bc632d18c6c140ca42e29f30ffef052974f62874579e7f8db0d52dd47bda076
-
Filesize
1KB
MD555540a230bdab55187a841cfe1aa1545
SHA1363e4734f757bdeb89868efe94907774a327695e
SHA256d73494e3446b02167573b3cde3ae1c8584ac26e15e45ac3ec0326708425d90fb
SHA512c899cb1d31d3214fd9dc8626a55e40580d3b2224bf34310c2abd85d0f63e2dedaeae57832f048c2f500cb2cbf83683fcb14139af3f0b5251606076cdb4689c54
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\070E0202839D9D67350CD2613E78E416
Filesize230B
MD5ac7efd9e3c6296f655b4926bafedd257
SHA19c39f26e08de4b450ed3e27a1f7f719fcb2e52a8
SHA2568b47d952071a0863866f7a5616e4b60e1f53e7e2461b022d35c815851b66b75f
SHA512535ec3b5fca76c5c9793e65050ed1886fb651850764150581e4ade3c34f3e42a233ae85803c06bcf426f8fbe9ecb44a1aea802e314679999422452f652018524
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50abbbe23647d87a379f18c1a86996d17
SHA1e9ac9f3f412cd9f9645892d7846042258ca1e815
SHA256a33e1fe1c3f25533f8d3c8cc006a901da348ae07da91182d5b41c93f253dbf60
SHA512ee7c7f0688e520a5417d341af78a9ebe24646be05ef73fc83411bffc236fa74197f707339d41746e6245197c6b992b2efc77979b9c7f9742016323b964739107
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5404f6d1d0a18cf5c47a403b10587437c
SHA19171e5b3d2ebe5f6afff08e98158f9efd9eaf7eb
SHA25644613381e8f2d30ad4b484041a1488327d429623d9183078605f69f4b5e5ebec
SHA51237fc18b7f8eaae517c66c57444570abec02294d375db2640bbe99e303c146be5f4ff2ad9679954918bfb44bc6af4c922f65074dfd23e56bc7538fc5e4344b7ce
-
Filesize
28KB
MD52b0972889e73d581a4de0ed8af38cacb
SHA16eac94fa8867a305bb6ac3e69de0641fbfa14f31
SHA256accb690c9d63e594a8cfc889330d6b212bfc2b4d1991c9a91297348467eac14b
SHA51227b6aeec6ff4aa3023ba6bbd139a0bb66ffa0c78224ffad042f4f03751742d1dd91e8d27a5fd597b57f9702b9be9ca7129fa1c88f54a26b4847995769bc10954
-
Filesize
37KB
MD58ec649431556fe44554f17d09ad20dd6
SHA1b058fbcd4166a90dc0d0333010cca666883dbfb1
SHA256d1faee8dabc281e66514f9ceb757ba39a6747c83a1cf137f4b284a9b324f3dc4
SHA51278f0d0f87b4e217f12a0d66c4dfa7ad7cf4991d46fdddfaeae47474a10ce15506d79a2145a3432a149386083c067432f42f441c88922731d30cd7ebfe8748460
-
Filesize
37KB
MD5d6f9ccfaad9a2fb0089b43509b82786b
SHA13b4539ea537150e088811a22e0e186d06c5a743d
SHA2569af50adf3be17dc18ab4efafcf6c6fb6110336be4ea362a7b56b117e3fb54c73
SHA5128af1d5f67dad016e245bdda43cc53a5b7746372f90750cfcca0d31d634f2b706b632413c815334c0acfded4dd77862d368d4a69fe60c8c332bc54cece7a4c3cd
-
Filesize
37KB
MD56c734f672db60259149add7cc51d2ef0
SHA12e50c8c44b336677812b518c93faab76c572669b
SHA25624945bb9c3dcd8a9b5290e073b70534da9c22d5cd7fda455e5816483a27d9a7d
SHA5121b4f5b4d4549ed37e504e62fbcb788226cfb24db4bfb931bc52c12d2bb8ba24b19c46f2ced297ef7c054344ef50b997357e2156f206e4d5b91fdbf8878649330
-
Filesize
37KB
MD57ac9f8d002a8e0d840c376f6df687c65
SHA1a364c6827fe70bb819b8c1332de40bcfa2fa376b
SHA25666123f7c09e970be594abe74073f7708d42a54b1644722a30887b904d823e232
SHA5120dd36611821d8e9ad53deb5ff4ee16944301c3b6bb5474f6f7683086cde46d5041974ec9b1d3fb9a6c82d9940a5b8aec75d51162999e7096154ad519876051fe
-
Filesize
37KB
MD5c76ee61d62a3e5698ffccb8ff0fda04c
SHA1371b35900d1c9bfaff75bbe782280b251da92d0e
SHA256fbf7d12dd702540cbaeeecf7bddf64158432ef4011bace2a84f5b5112aefe740
SHA512a76fee1eb0d3585fa16d9618b8e76b8e144787448a2b8ff5fbd72a816cbd89b26d64db590a2a475805b14a9484fc00dbc3642d0014954ec7850795dcf2aa1ee7
-
Filesize
37KB
MD5e6c863379822593726ad5e4ade69862a
SHA14fe1522c827f8509b0cd7b16b4d8dfb09eee9572
SHA256ae43886fee752fb4a20bb66793cdd40d6f8b26b2bf8f5fbd4371e553ef6d6433
SHA51231d1ae492e78ed3746e907c72296346920f5f19783254a1d2cb8c1e3bff766de0d3db4b7b710ed72991d0f98d9f0271caefc7a90e8ec0fe406107e3415f0107e
-
Filesize
37KB
MD5c936e231c240fbf47e013423471d0b27
SHA136fabff4b2b4dfe7e092727e953795416b4cd98f
SHA256629bf48c1295616cbbb7f9f406324e0d4fcd79310f16d487dd4c849e408a4202
SHA512065793554be2c86c03351adc5a1027202b8c6faf8e460f61cc5e87bcd2fe776ee0c086877e75ad677835929711bea182c03e20e872389dfb7d641e17a1f89570
-
Filesize
37KB
MD50ab873a131ea28633cb7656fb2d5f964
SHA1e0494f57aa8193b98e514f2bc5e9dc80b9b5eff0
SHA256a83e219dd110898dfe516f44fb51106b0ae0aca9cc19181a950cd2688bbeeed2
SHA5124859758f04fe662d58dc32c9d290b1fa95f66e58aef7e27bc4b6609cc9b511aa688f6922dbf9d609bf9854b619e1645b974e366c75431c3737c3feed60426994
-
Filesize
100KB
MD5b37046319a495742af2d1d9e5ccc0ea9
SHA1d13ca92d5a17068773a58d167af40b77813be532
SHA2567c60a0bab1d7581bbba576b709837ef75a5c0833acb584bca3f7c780e70f6c14
SHA5125e7ad4b7d55f0d5e4c7a17cabccc54d9568cf4b98a8e0566607f253e238d090e111e5f6f44b23617e9d1a9fc2370a10fa761cbe50a9d17a182da31dcd8ad2b48
-
Filesize
37KB
MD5c252459c93b6240bb2b115a652426d80
SHA1d0dffc518bbd20ce56b68513b6eae9b14435ed27
SHA256b31ea30a8d68c68608554a7cb610f4af28f8c48730945e3e352b84eddef39402
SHA5120dcfcddd9f77c7d1314f56db213bd40f47a03f6df1cf9b6f3fb8ac4ff6234ca321d5e7229cf9c7cb6be62e5aa5f3aa3f2f85a1a62267db36c6eab9e154165997
-
Filesize
37KB
MD5d32bf2f67849ffb91b4c03f1fa06d205
SHA131af5fdb852089cde1a95a156bb981d359b5cd58
SHA2561123f4aea34d40911ad174f7dda51717511d4fa2ce00d2ca7f7f8e3051c1a968
SHA5121e08549dfcbcfbe2b9c98cd2b18e4ee35682e6323d6334dc2a075abb73083c30229ccd720d240bcda197709f0b90a0109fa60af9f14765da5f457a8c5fce670a
-
Filesize
37KB
MD54c1e3672aafbfd61dc7a8129dc8b36b5
SHA115af5797e541c7e609ddf3aba1aaf33717e61464
SHA2566dac4351c20e77b7a2095ece90416792b7e89578f509b15768c9775cf4fd9e81
SHA512eab1eabca0c270c78b8f80989df8b9503bdff4b6368a74ad247c67f9c2f74fa0376761e40f86d28c99b1175db64c4c0d609bedfd0d60204d71cd411c71de7c20
-
Filesize
37KB
MD5f18f47c259d94dcf15f3f53fc1e4473a
SHA1e4602677b694a5dd36c69b2f434bedb2a9e3206c
SHA25634546f0ecf4cd9805c0b023142f309cbb95cfcc080ed27ff43fb6483165218c1
SHA512181a5aa4eed47f21268e73d0f9d544e1ceb9717d3abf79b6086584ba7bdb7387052d7958c25ebe687bfdcd0b6cca9d8cf12630234676394f997b80c745edaa38
-
Filesize
37KB
MD5a8e9ea9debdbdf5d9cf6a0a0964c727b
SHA1aee004b0b6534e84383e847e4dd44a4ee6843751
SHA256b388a205f12a6301a358449471381761555edf1bf208c91ab02461822190cbcf
SHA5127037ffe416710c69a01ffd93772044cfb354fbf5b8fd7c5f24a3eabb4d9ddb91f4a9c386af4c2be74c7ffdbb0c93a32ff3752b6ab413261833b0ece7b7b1cb55
-
Filesize
37KB
MD5296bcd1669b77f8e70f9e13299de957e
SHA18458af00c5e9341ad8c7f2d0e914e8b924981e7e
SHA2566f05cae614ca0e4751b2aaceea95716fd37a6bf3fae81ff1c565313b30b1aba2
SHA5124e58a0f063407aed64c1cb59e4f46c20ff5b9391a02ceff9561456fef1252c1cdd0055417a57d6e946ec7b5821963c1e96eaf1dd750a95ca9136764443df93d7
-
Filesize
37KB
MD57e87c49d0b787d073bf9d687b5ec5c6f
SHA16606359f4d88213f36c35b3ec9a05df2e2e82b4e
SHA256d811283c4e4c76cb1ce3f23528e542cff4747af033318f42b9f2deb23180c4af
SHA512926d676186ec0b58b852ee0b41f171729b908a5be9ce5a791199d6d41f01569bcdc1fddd067f41bddf5cdde72b8291c4b4f65983ba318088a4d2d5d5f5cd53af
-
Filesize
37KB
MD5042dfd075ab75654c3cf54fb2d422641
SHA1d7f6ac6dc57e0ec7193beb74639fe92d8cd1ecb9
SHA256b91fb228051f1720427709ff849048bfd01388d98335e4766cd1c4808edc5136
SHA512fada24d6b3992f39119fe8e51b8da1f6a6ca42148a0c21e61255643e976fde52076093403ccbc4c7cd2f62ccb3cdedd9860f2ac253bb5082fb9fe8f31d88200d
-
Filesize
37KB
MD5476d959b461d1098259293cfa99406df
SHA1ad5091a232b53057968f059d18b7cfe22ce24aab
SHA25647f2a0b4b54b053563ba60d206f1e5bd839ab60737f535c9b5c01d64af119f90
SHA5129c5284895072d032114429482ccc9b62b073447de35de2d391f6acad53e3d133810b940efb1ed17d8bd54d24fce0af6446be850c86766406e996019fcc3a4e6e
-
Filesize
37KB
MD5a83dde1e2ace236b202a306d9270c156
SHA1a57fb5ce8d2fe6bf7bbb134c3fb7541920f6624f
SHA25620ab2e99b18b5c2aedc92d5fd2df3857ee6a1f643df04203ac6a6ded7073d5e8
SHA512f733fdad3459d290ef39a3b907083c51b71060367b778485d265123ab9ce00e3170d2246a4a2f0360434d26376292803ccd44b0a5d61c45f2efaa28d5d0994df
-
Filesize
37KB
MD584c958e242afd53e8c9dae148a969563
SHA1e876df73f435cdfc4015905bed7699c1a1b1a38d
SHA256079d320d3c32227ba4b9acddf60bfcdf660374cb7e55dba5ccf7beeaedd2cdef
SHA5129e6cb07909d0d77ebb5b52164b1fa40ede30f820c9773ea3a1e62fb92513d05356dfef0e7ef49bf2ad177d3141720dc1c5edceb616cef77baec9acdd4bbc5bae
-
Filesize
37KB
MD527422233e558f5f11ee07103ed9b72e3
SHA1feb7232d1b317b925e6f74748dd67574bc74cd4d
SHA2561fa6a4dc1e7d64c574cb54ae8fd71102f8c6c41f2bd9a93739d13ff6b77d41ac
SHA5122d3f424a24e720f83533ace28270b59a254f08d4193df485d1b7d3b9e6ae53db39ef43d5fc7de599355469ad934d8bcb30f68d1aaa376df11b9e3dec848a5589
-
Filesize
37KB
MD5c84f50869b8ee58ca3f1e3b531c4415d
SHA1d04c660864bc2556c4a59778736b140c193a6ab2
SHA256fa54653d9b43eb40539044faf2bdcac010fed82b223351f6dfe7b061287b07d3
SHA512bb8c98e2dadb884912ea53e97a2ea32ac212e5271f571d7aa0da601368feabee87e1be17d1a1b7738c56167f01b1788f3636aac1f7436c5b135fa9d31b229e94
-
Filesize
37KB
MD57cfe29b01fae3c9eadab91bcd2dc9868
SHA1d83496267dc0f29ce33422ef1bf3040f5fc7f957
SHA2562c3bfb9cc6c71387ba5c4c03e04af7f64bf568bdbe4331e9f094b73b06bddcff
SHA512f6111d6f8b609c1fc3b066075641dace8c34efb011176b5c79a6470cc6941a9727df4ceb2b96d1309f841432fa745348fc2fdaf587422eebd484d278efe3aeac
-
Filesize
37KB
MD528c50ddf0d8457605d55a27d81938636
SHA159c4081e8408a25726c5b2e659ff9d2333dcc693
SHA256ebda356629ac21d9a8e704edc86c815770423ae9181ebbf8ca621c8ae341cbd5
SHA5124153a095aa626b5531c21e33e2c4c14556892035a4a524a9b96354443e2909dcb41683646e6c1f70f1981ceb5e77f17f6e312436c687912784fcb960f9b050fe
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
132KB
MD5919034c8efb9678f96b47a20fa6199f2
SHA1747070c74d0400cffeb28fbea17b64297f14cfbd
SHA256e036d68b8f8b7afc6c8b6252876e1e290f11a26d4ad18ac6f310662845b2c734
SHA512745a81c50bbfd62234edb9788c83a22e0588c5d25c00881901923a02d7096c71ef5f0cd5b73f92ad974e5174de064b0c5ea8044509039aab14b2aed83735a7c4
-
Filesize
79KB
MD5e2e3268f813a0c5128ff8347cbaa58c8
SHA14952cbfbdec300c048808d79ee431972b8a7ba84
SHA256d8b83f78ed905a7948e2e1e371f0f905bcaaabbb314c692fee408a454f8338a3
SHA512cb5aeda8378a9a5470f33f2b70c22e77d2df97b162ba953eb16da085b3c434be31a5997eac11501db0cb612cdb30fa9045719fcd10c7227c56cc782558e0c3bc
-
Filesize
11.0MB
MD5d60d266e8fbdbd7794653ecf2aba26ed
SHA1469ed7d853d590e90f05bdf77af114b84c88de2c
SHA256d4df1aba83289161d578336e1b7b6daf7269bb73acc92bd9dfa2c262ebc6c4d2
SHA51280df5d568e34dfc086f546e8d076749e58a7230ed1aa33f3a5c9d966809becadc9922317095032d6e6a7ecdfbfbce02a72cc82513ab0d132c5ffa6c07682bd87
-
Filesize
262KB
MD5644a43fda332b29e94af26722ee4a836
SHA148cb8209570f74fa24b12d2b6f951278710a6364
SHA256803fe3b2d32cc2e6bf37a8c2e87d32f2d0974899452c2b9771fa305f8cb79162
SHA512dfcc95396cbd11ec76f288a9ff6634dca81ef739ba0868a2a2e4c01107447b55e5e52e9c5024c1f8a08ca72f1b39a51253dc18ca485c84d6df6e8fd7393c1cfb
-
Filesize
1.7MB
MD5c726a4eba148b17c9ccf3692fbc90701
SHA152d203ff30f7a23fdc4cb45caa2efa40324a43d9
SHA2569eb758edc7a192e4a4fcfe1eac1799c1e64408cc57809628f2ae8c2114ff8eb6
SHA5128499f446c1a7ae0f52f75e61073c916e2531f09b4cf7fc133c63b874d3c42a5cddc280f8b9b9d1be038c6bb789e763213c8d0a1e27add3796cb3a46523ea707e
-
Filesize
278KB
MD592ae7a1286d992e104c0072f639941f7
SHA1d2c0fe4e7e9df1b4a9a4cd69e3167003e51c73b2
SHA2561771c4e6e34fda6a68c7b1d980cc3dffbe587c651f985bf7235c6af9a8904fd3
SHA512bed93d1e09f576c52b231046cbf9a4ef81ebb2f68eaa6fc7b0eea889418e5f3af440fef5da55882b5535f26d994fdd34c288ba62e7fb033f5bd372cf752bb62b
-
Filesize
88KB
MD5ababca6d12d96e8dd2f1d7114b406fae
SHA1dcd9798e83ec688aacb3de8911492a232cb41a32
SHA256a992920e64a64763f3dd8c2a431a0f5e56e5b3782a1496de92bc80ee71cca5ba
SHA512b7fc70c176bdc74cf68b14e694f3e53142e64d39bd6d3e0f2e3a74ce3178ea606f92f760d21db69d72ae6677545a47c7bf390fb65cd5247a48e239f6ae8f7b8f
-
Filesize
100KB
MD5ce554fe53b2620c56f6abb264a588616
SHA177bbdcd30e7e931ef95c913406faf92fa70d4c94
SHA25693237a51bb710bd488b0e5bfa8288751445eafcc795364df7652535f3c210431
SHA5122330b9bdcd3c4d5d3f6a65cb277dce7d59bb655cce6285154ea8153b2b7df41c9a51b0bb62fa218e7345032e83f3b7e738fc1fea5f56a8bb4690733f51442982
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
39KB
MD57529e3c83618f5e3a4cc6dbf3a8534a6
SHA10f944504eebfca5466b6113853b0d83e38cf885a
SHA256ec35c76ad2c8192f09c02eca1f263b406163470ca8438d054db7adcf5bfc0597
SHA5127eef97937cc1e3afd3fca0618328a5b6ecb72123a199739f6b1b972dd90e01e07492eb26352ee00421d026c63af48973c014bdd76d95ea841eb2fefd613631cc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\AUNBSQUNE2VGLGUAR2TI.temp
Filesize7KB
MD570cb0be02a6fa4b55cf8b081075cfa83
SHA1b2331d24eb52ac030912625bfa156f02c72b9f6f
SHA256675ca2985f2b894906f8148eb6c9c7486544fa2de557adb5cd4043cd0601d091
SHA512e33758be37606ede01de22c4f553375a1297ee7f9dc427d22c4ed6c9e0148d1190bd0c3401e1e57e8e05ef42ad7208ff48e2dd3a7d30e184e2a3e7d65e7fc98c
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UGAR1S005V132C33S228.temp
Filesize7KB
MD5e80796fd75b2bfcb3c7e247435c3481d
SHA1f4acd7a2bf451c2210673caa7436b7046941a8e3
SHA256cff5d5b2463ac9f210dedf3c792648a6e3769703ef26d20cfe7fa8bb9c700e2a
SHA5129aafa8128876926bbe5dd30d109a37f16e848f28f8b55ddb5f1f0b9f04f06f34309aa71a94e8fe39e2ace22ec1d0445a1bfa727678f24f4be4150e3596e41684
-
Filesize
11KB
MD5cc5d2a68961769bad04f78a5f8d8739d
SHA18f4aa9fe7fd733cd11672c1c509d2fe8c2186b7c
SHA2564f6a9df4a17b94146b1200bfcf3d435325034ded2d42c5b6cb2587f3e38fd557
SHA512aee47004caadf6b34ca3d5f5c30528a5980f8206b9bdd3bb84ce867a7528d90eb26ec37c00318a41585de8771ab7488ae02cdf307b6de5806b8fcf48382c4aa8
-
Filesize
3KB
MD50880547340d1b849a7d4faaf04b6f905
SHA137fa5848977fd39df901be01c75b8f8320b46322
SHA25684449f1e874b763619271a57bfb43bd06e9c728c6c6f51317c56e9e94e619b25
SHA5129048a3d5ab7472c1daa1efe4a35d559fc069051a5eb4b8439c2ef25318b4de6a6c648a7db595e7ae76f215614333e3f06184eb18b2904aace0c723f8b9c35a91
-
Filesize
81KB
MD58517becdb3e0f03fbe579734c2e568b4
SHA13432131e988232c847dd07bd23338e1e9a0301d2
SHA256af1f73db0f26e309e279f0e51085179eb425ee2c080617c18be50935fd7992c1
SHA512016bd11ccf339d93a0d984db253c515a761860d487f30584b3bcffe2aab80a85975ffc809b22dd10c7f454f05dbb95b4d190ca46cbfc24c8d233c61687db1418
-
Filesize
10KB
MD52a94f3960c58c6e70826495f76d00b85
SHA1e2a1a5641295f5ebf01a37ac1c170ac0814bb71a
SHA2562fcad226b17131da4274e1b9f8f31359bdd325c9568665f08fd1f6c5d06a23ce
SHA512fbf55b55fcfb12eb8c029562956229208b9e8e2591859d6336c28a590c92a4d0f7033a77c46ef6ebe07ddfca353aba1e84b51907cd774beab148ee901c92d62f
-
Filesize
457KB
MD531f03a8fe7561da18d5a93fc3eb83b7d
SHA131b31af35e6eed00e98252e953e623324bd64dde
SHA2562027197f05dac506b971b3bd2708996292e6ffad661affe9a0138f52368cc84d
SHA5123ea7c13a0aa67c302943c6527856004f8d871fe146150096bc60855314f23eae6f507f8c941fd7e8c039980810929d4930fcf9c597857d195f8c93e3cc94c41d
-
\Users\Admin\AppData\Local\Temp\a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5.exe
Filesize159KB
MD56f8e78dd0f22b61244bb69827e0dbdc3
SHA11884d9fd265659b6bd66d980ca8b776b40365b87
SHA256a76e49df84ba2a7b33e8ea959995b5e6faecb90d551ef169d8272ce9042c35a5
SHA5125611a83616380f55e7b42bb0eef35d65bd43ca5f96bf77f343fc9700e7dfaa7dcf4f6ecbb2349ac9df6ab77edd1051b9b0f7a532859422302549f5b81004632d