Analysis
-
max time kernel
128s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2024 10:33
Static task
static1
Behavioral task
behavioral1
Sample
LeawoiOSDataProffesionalStup.msi
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
LeawoiOSDataProffesionalStup.msi
Resource
win10v2004-20241007-en
General
-
Target
LeawoiOSDataProffesionalStup.msi
-
Size
33.2MB
-
MD5
bdb5f302e34d205b26a4c915563f73d1
-
SHA1
c3b23fd809b1b31a466cd75147ccae5d6747cc74
-
SHA256
5d1e0937fefb17d3df6ffe8b5c5b9816b5467f5d853512f0af1c918fe8911a06
-
SHA512
ad22efb7028e87ad72ed42b4bb549d6fc760f8a11a3d4ee2f4f9ca8033d750e9446fb1c5d0d0e564a6478fb7f49f68bd511894a0ff4c5b23b5fdc2aa21d99685
-
SSDEEP
786432:WOlIAe16UtVShzx9bPAX6Bs0HeA0IoYvhzcZ0v2cSR85Gj:BlPe8UPSBw0He29vJuT8Mj
Malware Config
Extracted
C:\info.hta
class='mark'>[email protected]</span></div>
class='mark'>[email protected]</span></div>
class='mark'>[email protected]</span>
http://www.w3.org/TR/html4/strict.dtd'>
https://pidgin.im/download/windows/</li>
Signatures
-
Phobos
Phobos ransomware appeared at the beginning of 2019.
-
Phobos family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 4 IoCs
Processes:
bcdedit.exebcdedit.exebcdedit.exebcdedit.exepid process 3656 bcdedit.exe 4532 bcdedit.exe 5676 bcdedit.exe 2164 bcdedit.exe -
Renames multiple (520) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
-
Processes:
wbadmin.exewbadmin.exepid process 3732 wbadmin.exe 5168 wbadmin.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 3 IoCs
Processes:
CPPlayer.exedescription ioc process File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\CPPlayer.exe CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini CPPlayer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
CPPlayer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CPPlayer = "C:\\Users\\Admin\\AppData\\Local\\CPPlayer.exe" CPPlayer.exe Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CPPlayer = "C:\\Users\\Admin\\AppData\\Local\\CPPlayer.exe" CPPlayer.exe -
Blocklisted process makes network request 1 IoCs
Processes:
msiexec.exeflow pid process 4 3428 msiexec.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
CPPlayer.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Documents\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Videos\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\Videos\desktop.ini CPPlayer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI CPPlayer.exe File opened for modification C:\Program Files (x86)\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\Downloads\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\Music\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Links\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CPPlayer.exe File opened for modification C:\Program Files\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Music\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\Libraries\desktop.ini CPPlayer.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini CPPlayer.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini CPPlayer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini CPPlayer.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini CPPlayer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini CPPlayer.exe File opened for modification C:\Users\Public\Desktop\desktop.ini CPPlayer.exe -
Enumerates connected drives 3 TTPs 46 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\N: msiexec.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
Processes:
netsh.exenetsh.exepid process 2212 netsh.exe 4784 netsh.exe -
Drops file in Program Files directory 64 IoCs
Processes:
CPPlayer.exedescription ioc process File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextLight.scale-100.png CPPlayer.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.pt-pt.dll CPPlayer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-180.png CPPlayer.exe File created C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GOTHIC.TTF.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\System\MSCOMCTL.OCX.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-200_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSplashScreen.contrast-black_scale-200.png CPPlayer.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\bcel.md CPPlayer.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libspdif_plugin.dll CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\RuntimeConfiguration.dll CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\MedTile.scale-100.png CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\images\themes\dark\close.svg.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File created C:\Program Files\Microsoft Office\root\Licenses16\VisioProR_Grace-ppd.xrm-ms.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\cs-cz\ui-strings.js CPPlayer.exe File opened for modification C:\Program Files (x86)\Common Files\System\Ole DB\msdadc.dll CPPlayer.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll CPPlayer.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\sr.pak CPPlayer.exe File created C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcDemoR_BypassTrial365-ppd.xrm-ms.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\it\System.Web.Entity.Resources.dll CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\AppIcon.targetsize-96_altform-unplated_contrast-white.png CPPlayer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ppd.xrm-ms CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AGMGPUOptIn.ini.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sv-se\ui-strings.js.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ja-jp\ui-strings.js.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File created C:\Program Files\Microsoft Office\root\Licenses16\Standard2019R_Retail-ul-oob.xrm-ms.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\main-cef-ui-theme.css CPPlayer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\selection-action-plugins\epdf\selector.js CPPlayer.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\j2pcsc.dll.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoVL_MAK-pl.xrm-ms CPPlayer.exe File opened for modification C:\Program Files\Mozilla Firefox\mozavcodec.dll.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\ShareProvider_CopyLink24x24.scale-100.png CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\AppSettingsCppCX.dll CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\css\main.css.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\System.Xml.Linq.dll.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\ko.pak CPPlayer.exe File created C:\Program Files\Java\jre-1.8\legal\jdk\relaxngom.md.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\VideoLAN\VLC\skins\default.vlt CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.Runtime.Intrinsics.dll CPPlayer.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\et.pak CPPlayer.exe File created C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial1-pl.xrm-ms.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\rename.svg CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\plugins\rhp\convertpdf-rna-selector.js.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe CPPlayer.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\deploy\messages_es.properties.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.SkypeApp_14.53.77.0_neutral_split.scale-125_kzf8qxf38zg5c\Assets\Images\SkypeLogo.scale-125.png CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\ExchangeBadge.scale-150.png CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreLogo.png CPPlayer.exe File created C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\System.IO.Compression.FileSystem.dll.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneMusic_10.19071.19011.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_contrast-black.png CPPlayer.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\VisualElements\SmallLogoBeta.png CPPlayer.exe File created C:\Program Files\Microsoft Office\root\Templates\1033\OriginResume.Dotx.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ro\LC_MESSAGES\vlc.mo CPPlayer.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\vlc.mo CPPlayer.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\TestResults.Tests.ps1 CPPlayer.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\fr\System.Windows.Controls.Ribbon.resources.dll.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Car\RTL\contrast-white\LargeTile.scale-125.png CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxMailWideTile.scale-150.png CPPlayer.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\fr-FR\MSFT_PackageManagementSource.strings.psd1 CPPlayer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\pt-br\ui-strings.js.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\System.Xaml.resources.dll.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONBttnIE.dll CPPlayer.exe File created C:\Program Files\Microsoft Office\root\Licenses16\AccessRuntimeR_PrepidBypass-ppd.xrm-ms.id[E98474B7-2686].[[email protected]].Devos CPPlayer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\System.Runtime.Serialization.Json.dll CPPlayer.exe -
Drops file in Windows directory 8 IoCs
Processes:
msiexec.exedescription ioc process File created C:\Windows\Installer\SourceHash{103BE42C-0596-4670-A964-002CD247CF76} msiexec.exe File opened for modification C:\Windows\Installer\MSIBBEA.tmp msiexec.exe File created C:\Windows\Installer\e5bb91d.msi msiexec.exe File created C:\Windows\Installer\e5bb91b.msi msiexec.exe File opened for modification C:\Windows\Installer\e5bb91b.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe -
Executes dropped EXE 2 IoCs
Processes:
CPPlayer.exeCPPlayer.exepid process 3972 CPPlayer.exe 640 CPPlayer.exe -
Loads dropped DLL 51 IoCs
Processes:
CPPlayer.exeCPPlayer.exepid process 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe 640 CPPlayer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
Processes:
netsh.exenetsh.exedescription ioc process Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\NetSh netsh.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
mshta.exeCPPlayer.exeCPPlayer.execmd.exepowershell.exemshta.exemshta.exemshta.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CPPlayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CPPlayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshta.exe -
Checks SCSI registry key(s) 3 TTPs 9 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exevds.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 00000000040000001397c7f967de25740000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000c01200000000ffffffff0000000027010100000800001397c7f90000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d01200000000000020ed3a000000ffffffff0000000007000100006809001397c7f9000000000000d012000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0ff3a0000000000000005000000ffffffff000000000700010000f87f1d1397c7f9000000000000f0ff3a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000001397c7f900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 vds.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName vds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 vds.exe -
Interacts with shadow copies 3 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2252 vssadmin.exe 1368 vssadmin.exe -
Modifies registry class 1 IoCs
Processes:
CPPlayer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings CPPlayer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
msiexec.exeCPPlayer.exepid process 4504 msiexec.exe 4504 msiexec.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe 3972 CPPlayer.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
CPPlayer.exepid process 3972 CPPlayer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exedescription pid process Token: SeShutdownPrivilege 3428 msiexec.exe Token: SeIncreaseQuotaPrivilege 3428 msiexec.exe Token: SeSecurityPrivilege 4504 msiexec.exe Token: SeCreateTokenPrivilege 3428 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3428 msiexec.exe Token: SeLockMemoryPrivilege 3428 msiexec.exe Token: SeIncreaseQuotaPrivilege 3428 msiexec.exe Token: SeMachineAccountPrivilege 3428 msiexec.exe Token: SeTcbPrivilege 3428 msiexec.exe Token: SeSecurityPrivilege 3428 msiexec.exe Token: SeTakeOwnershipPrivilege 3428 msiexec.exe Token: SeLoadDriverPrivilege 3428 msiexec.exe Token: SeSystemProfilePrivilege 3428 msiexec.exe Token: SeSystemtimePrivilege 3428 msiexec.exe Token: SeProfSingleProcessPrivilege 3428 msiexec.exe Token: SeIncBasePriorityPrivilege 3428 msiexec.exe Token: SeCreatePagefilePrivilege 3428 msiexec.exe Token: SeCreatePermanentPrivilege 3428 msiexec.exe Token: SeBackupPrivilege 3428 msiexec.exe Token: SeRestorePrivilege 3428 msiexec.exe Token: SeShutdownPrivilege 3428 msiexec.exe Token: SeDebugPrivilege 3428 msiexec.exe Token: SeAuditPrivilege 3428 msiexec.exe Token: SeSystemEnvironmentPrivilege 3428 msiexec.exe Token: SeChangeNotifyPrivilege 3428 msiexec.exe Token: SeRemoteShutdownPrivilege 3428 msiexec.exe Token: SeUndockPrivilege 3428 msiexec.exe Token: SeSyncAgentPrivilege 3428 msiexec.exe Token: SeEnableDelegationPrivilege 3428 msiexec.exe Token: SeManageVolumePrivilege 3428 msiexec.exe Token: SeImpersonatePrivilege 3428 msiexec.exe Token: SeCreateGlobalPrivilege 3428 msiexec.exe Token: SeBackupPrivilege 1420 vssvc.exe Token: SeRestorePrivilege 1420 vssvc.exe Token: SeAuditPrivilege 1420 vssvc.exe Token: SeBackupPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe Token: SeTakeOwnershipPrivilege 4504 msiexec.exe Token: SeRestorePrivilege 4504 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 3428 msiexec.exe 3428 msiexec.exe -
Suspicious use of WriteProcessMemory 53 IoCs
Processes:
msiexec.exeCPPlayer.execmd.execmd.execmd.execmd.exedescription pid process target process PID 4504 wrote to memory of 4548 4504 msiexec.exe srtasks.exe PID 4504 wrote to memory of 4548 4504 msiexec.exe srtasks.exe PID 4504 wrote to memory of 3972 4504 msiexec.exe CPPlayer.exe PID 4504 wrote to memory of 3972 4504 msiexec.exe CPPlayer.exe PID 4504 wrote to memory of 3972 4504 msiexec.exe CPPlayer.exe PID 3972 wrote to memory of 2612 3972 CPPlayer.exe cmd.exe PID 3972 wrote to memory of 2612 3972 CPPlayer.exe cmd.exe PID 3972 wrote to memory of 4304 3972 CPPlayer.exe cmd.exe PID 3972 wrote to memory of 4304 3972 CPPlayer.exe cmd.exe PID 4304 wrote to memory of 2212 4304 cmd.exe netsh.exe PID 4304 wrote to memory of 2212 4304 cmd.exe netsh.exe PID 2612 wrote to memory of 2252 2612 cmd.exe vssadmin.exe PID 2612 wrote to memory of 2252 2612 cmd.exe vssadmin.exe PID 2612 wrote to memory of 1792 2612 cmd.exe WMIC.exe PID 2612 wrote to memory of 1792 2612 cmd.exe WMIC.exe PID 2612 wrote to memory of 3656 2612 cmd.exe bcdedit.exe PID 2612 wrote to memory of 3656 2612 cmd.exe bcdedit.exe PID 2612 wrote to memory of 4532 2612 cmd.exe bcdedit.exe PID 2612 wrote to memory of 4532 2612 cmd.exe bcdedit.exe PID 2612 wrote to memory of 3732 2612 cmd.exe wbadmin.exe PID 2612 wrote to memory of 3732 2612 cmd.exe wbadmin.exe PID 4304 wrote to memory of 4784 4304 cmd.exe netsh.exe PID 4304 wrote to memory of 4784 4304 cmd.exe netsh.exe PID 3972 wrote to memory of 2252 3972 CPPlayer.exe cmd.exe PID 3972 wrote to memory of 2252 3972 CPPlayer.exe cmd.exe PID 3972 wrote to memory of 2252 3972 CPPlayer.exe cmd.exe PID 2252 wrote to memory of 4840 2252 cmd.exe powershell.exe PID 2252 wrote to memory of 4840 2252 cmd.exe powershell.exe PID 2252 wrote to memory of 4840 2252 cmd.exe powershell.exe PID 3972 wrote to memory of 4084 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 4084 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 4084 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 2832 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 2832 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 2832 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 1792 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 1792 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 1792 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 3896 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 3896 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 3896 3972 CPPlayer.exe mshta.exe PID 3972 wrote to memory of 5940 3972 CPPlayer.exe cmd.exe PID 3972 wrote to memory of 5940 3972 CPPlayer.exe cmd.exe PID 5940 wrote to memory of 1368 5940 cmd.exe vssadmin.exe PID 5940 wrote to memory of 1368 5940 cmd.exe vssadmin.exe PID 5940 wrote to memory of 5508 5940 cmd.exe WMIC.exe PID 5940 wrote to memory of 5508 5940 cmd.exe WMIC.exe PID 5940 wrote to memory of 5676 5940 cmd.exe bcdedit.exe PID 5940 wrote to memory of 5676 5940 cmd.exe bcdedit.exe PID 5940 wrote to memory of 2164 5940 cmd.exe bcdedit.exe PID 5940 wrote to memory of 2164 5940 cmd.exe bcdedit.exe PID 5940 wrote to memory of 5168 5940 cmd.exe wbadmin.exe PID 5940 wrote to memory of 5168 5940 cmd.exe wbadmin.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Windows\system32\msiexec.exemsiexec.exe /I C:\Users\Admin\AppData\Local\Temp\LeawoiOSDataProffesionalStup.msi1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3428
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵PID:4548
-
C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\CPPlayer.exe"C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\CPPlayer.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\CPPlayer.exe"C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\CPPlayer.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:2252 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:1792
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:3656 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:4532 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:3732 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\system32\netsh.exenetsh advfirewall set currentprofile state off4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:2212 -
C:\Windows\system32\netsh.exenetsh firewall set opmode mode=disable4⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
PID:4784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c powershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\CPPlayer.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\CPPlayer.exe"4⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:4084 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}3⤵
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:5940 -
C:\Windows\system32\vssadmin.exevssadmin delete shadows /all /quiet4⤵
- Interacts with shadow copies
PID:1368 -
C:\Windows\System32\Wbem\WMIC.exewmic shadowcopy delete4⤵PID:5508
-
C:\Windows\system32\bcdedit.exebcdedit /set {default} bootstatuspolicy ignoreallfailures4⤵
- Modifies boot configuration data using bcdedit
PID:5676 -
C:\Windows\system32\bcdedit.exebcdedit /set {default} recoveryenabled no4⤵
- Modifies boot configuration data using bcdedit
PID:2164 -
C:\Windows\system32\wbadmin.exewbadmin delete catalog -quiet4⤵
- Deletes backup catalog
PID:5168
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:2740
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:2624
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵
- Checks SCSI registry key(s)
PID:1156
Network
MITRE ATT&CK Enterprise v15
Execution
Command and Scripting Interpreter
2PowerShell
1Windows Management Instrumentation
1Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
2Installer Packages
1Netsh Helper DLL
1Defense Evasion
Direct Volume Access
1Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
3File Deletion
3Modify Registry
1System Binary Proxy Execution
1Msiexec
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD545fb86927db3b091693a5528c1424daf
SHA181066b0cf8a6169ddfc63edc0578f02369365697
SHA256a47213800bd7227907dcca053ffc05ccd9d3a3e5898ed8153b6d29a9b380b09c
SHA5122cac5fdcd754835a753214d7f0d0c191f36a305fd67de3c078b959277dd22864a2c3fb34163f6a04e42ea0e68486856d9eb7397afb4de4a1304bf61ec06d7e37
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\themes\dark\selection-actions.png
Filesize1KB
MD5eedd2d13e3671d589714446755b78b38
SHA12fdd23507187a259f5a7edb01611a37b6b09f4da
SHA256467082e15a8ddefd51088e12a6189f9923dadfdf363ac1b0448ec43dc483cb3d
SHA512ef47a62ce6ffb0c5b34b2c6d72f5874dbad4109b98aaa21f56b8b2d83471f5ebf983f6dfd889399abe4fead6296cf2ca3f409a4aa4badad8cc3c48f688323837
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\remove.svg
Filesize1KB
MD5b651e9101be833e87337050028831efd
SHA1ee594ba38a6324369ffc7b4dc89407d3436e34d9
SHA2564717e5fb82c0ee85a7c97d022f410990a62efa2492070e42385cfeab67afd619
SHA5123552858c2a688c95a76c0bb8a6a76b119b744b2e8ae7e7f30135ccd8a145318762faa52c1783a639fb179056317caeaed20c15f211db1d45bc957bc3ce591aef
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_comment_18.svg
Filesize1KB
MD51bf37c0336c12ccaa1c62386acacc858
SHA1f1e187c79588e4e9fce931997443d7e5cafd1db6
SHA256a9044f3c6877f4fa6789bd90f11813a22696bda53e0be17bf52229b70fa87673
SHA512f75100874b1dd43c49f54a9aa4621e8bd1efa84359ce44ece2444b639c7bcbddf6564f6c4be089f5d656550c7293b9f5ec4a4b20880939fbeb5ebc21e30866b1
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-default_32.svg
Filesize547B
MD581cfb9735fea15ca8791a3c34a78d992
SHA19b4962166a47f5edc62e5fe3c4f8772446db9296
SHA2563d89171c24a889bce28f04adb60f08a141584b7c345b158536a72a8070c252b8
SHA512f6ac853f4012ddcb29e5079ec00bf058343af1a6d6cedbc9613056db0575c77e964b0864c9693a6e02a525d5e13ccc54e0e7fd938ea39c3d2c6005db959b346a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filterselected-dark-hover_32.svg
Filesize642B
MD555215e8f92d35f26cca06fa9d5d221e9
SHA1994838c8df5921e3828749a7703ebfa8383e43b6
SHA256e94ac27227c8a25c3f8ede219fd80ace01e7176a12111125b31ae1dcddd487ae
SHA5127972d3fb8c305a1b41f3ec4a618c9904c1e655fc757f1dc83f9d9041433f3c30e6708ed3d4fb3166cc41d9773df3f159aa44333f76fdde28f317676046bc9c67
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_newfolder-default.svg
Filesize552B
MD52807924fc18c958c38a7004a5dbd4091
SHA185534040543c3306284e6a475999c46249a35e4b
SHA2560345bffb28f80f4d0ded1a2af09a337b18ab3a80c68205bc8321a6ad4d409500
SHA512264d29c6b920b3005ebda1fdb0e0ee6e17059c69d63969c61ea4b5c5464022166ccc04b2c1f69b91052c3e3dd551a087e8e5379d2a62c452184a12b278a8ac3a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_reminders_18.svg
Filesize1KB
MD53f16cc51cf788a50e6cc1ae60897bbf7
SHA1e5a8c8f5227ca6da79589192892e81b6a3f43686
SHA25630f1d12f90b61f22130b22667f722aeca0aadd59ba3e19d866d72a99a3f0ce3d
SHA51217686bb9e01aa108b9b62b33bb70bb8aa35e4d88199281aaacbc8d8da7d54f1f353bf31a109dc22a4e404780ece4cb3d23f0ec81f80e9553ef060011e568134c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_remove_18.svg
Filesize711B
MD5cd5d2472a2bf9ac7eb4e15146b30bd2f
SHA1bca600423f99b87df44fde9d96ff874017037afe
SHA256038589c0f8f0b9fbed7fe7835de0237de4a28ea404078955a78c0b8145fa323c
SHA512dde83047b85cf0afd4ac77c9f4e850ebba48a1e1d581ed78c30733f58a9d5e2e22d34a2b2e57e4527f3c314f84922c3aecd6366052d46e0d6157990ed888a27e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_hover_18.svg
Filesize783B
MD50498cfb8aae1383c049e8ccdd85f3abf
SHA1c5fbfcc70b441e91a5ecd23295c745aaf076aa4d
SHA256ad125b854735c81b5782a65b5b006c7c991e28688b6dd8e5998f432976b9223c
SHA512113f19bf726f79473ae2b4406a76676ec0bc4709a26f374aaa3bbd9d0b5790ee4fdd8ebe1a3ab68995973923ae33df7c1c6798e93bf060643c14acfabd4e9302
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_up_18.svg
Filesize979B
MD530c9bd1aee3794fd46bc99fc2a359212
SHA19817640da0b98babc461d277a39b323dc9a76cd3
SHA2564b10fc416763ad7b65a6d6fb3c0016505ec5aaa7a117021a26e4dd6d11fe7d1d
SHA512bae367b7555f5f7f677abbad1dd548225c2580ffe21bcae5022f8eecf8c97cfe8f7813fd86c31a7f9052c174610ae9d2ae21ac22b381701975492e2386f67f94
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win8-scrollbar\arrow-right-pressed.gif
Filesize56B
MD5e3c4dd21a9171fd39d208efa09bf7883
SHA19438e360f578e12c0e0e8ed28e2c125c1cefee16
SHA256d4817aa5497628e7c77e6b606107042bbba3130888c5f47a375e6179be789fbb
SHA5122146aa8ab60c48acff43ae8c33c5da4c2586f20a39f8f1308aefb6f833b758ad7158bd5e9a386e45feba446f33855d393857b557fe8ba6fe52364e7a7af3be9b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\hu-hu\ui-strings.js
Filesize3KB
MD50d3a12fd3f68decc694da04b57e61d8c
SHA1f73d4d591f6ef0b2b04fc90d2e840329f7590743
SHA256ee0352f75df1009fa6f5eaf323a1ed55c127cc679ac6b9de70b1b3f8dc9ece76
SHA5122c58a879d4022b441056c85c301ce26401da5f7bc9619debd35fa3bd98b5f1cab8f21e2ae5a177865c64e741dae18f39f99fac1cf00c468ba0e281037d5e883c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\ui-strings.js
Filesize1KB
MD568b6f0644d50595a97c9fd60b8d8e697
SHA1a4d0edf9264ce1922dc419c7f3b3cedb2814bea7
SHA256bf9b3f1f9a3a163d41b1b20a2c410355e6ee72ae97725a7bad97ad23993b0b5f
SHA512d1a26cc27c302f06419abf97507c0a4d06729aeadab615acaaac0c3fcec6d7715e10642121a4d773ad3d5f613030728e49fb3d07303fad05f7a342352ebad003
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\images\rhp_world_icon_hover.png
Filesize388B
MD565c9f3fb24b80d8c470d518f901b9c60
SHA1b9521c39944357d4b55b91f9f3739575d1f3bef1
SHA2568de76ee7eb6b32c307d4a46a43ac55bc15b917e2a24d36c3d001878a97fd39d6
SHA5126572d65abd587055a69980558b2568266ff76555faadf3ddc93fa65bdd7a009a2fbca10f37f44c27ae889d3de99a3673c2b9ba6e6456242e951703fa32d9c636
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-il\ui-strings.js
Filesize1KB
MD5a778c47dd8521d6a12093b3e97ed8474
SHA12099d940cc672373884e1c622bbb606e9e9438b9
SHA256d5343776747d802d64faedd9954d2a4bf555a6cd85396c55c39a8fce4c5353a6
SHA5127c9c9b406c1b79b3298e975abb3f64927b6beb9e8784b75927e19ba649936c19f04d958d07499a5d5c52049cf2d3600e32f6f437c98b2946a977ca82c71e7224
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\fr-fr\ui-strings.js
Filesize1KB
MD5dd24e91615f1963a5c64bc9878a0a8d5
SHA1407ece3322d57d16a448b5522d4f29229f80b8b1
SHA2564cf9816ed1062189ff0c8d427fba5e912cc68fc9af76cf7f08fd255977de3b33
SHA512a88d5e6fcfd998b0abe79b5b314f3f83f424be9447dca01e1a64a3e7313eb247baa894c10c5758c6788cad27582c09207d00d2e7bc41515e7f1751e05aa812ba
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\example_icons.png
Filesize683B
MD53f7323acc829bc8b3799148d439b3d47
SHA13d3c540c4080462a8013d6db9383ad69606779e8
SHA256d9de646d51650572b66a6cf8a52ad1efd46b7a47830fa7972da0bc05baa2fad0
SHA51209e2a175dd874ac369331fbfd863be20c9ecc005bfd6c7eeadac071804653265e4f7195d70058f2f73951a6a6e202fc96930f2ce71c2d815b228edf01729b559
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\root\ui-strings.js
Filesize1KB
MD5fb4aa89fb89bf94d0590a3174d1193ff
SHA1c3812f2105099071c24141a994a9d5087199dbf7
SHA256655a3ef0465a9f30fddf25f4dde0c19a05c6f9069b83961800c1944165955273
SHA512a494c0d9faf3defa9ff320421d0c00e4e39845f7e998c6a06c50b5e7edbb1ed7a948dda23ace06a3433843615553d2357f1cb04acb4ad1155ec43f1d07511524
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\images\example_icons2x.png
Filesize1KB
MD57ab2ac51d33778dac850c5dd8b4ba45d
SHA1b3f47f20c438aa488fe835e0145c014853ee48aa
SHA256ca17d6cc1f7ab317c34a7cb767ad017163e71726ac648518679c6b1c59fa86dc
SHA512c14ac0ad209625e0acb2ca9e0afc5f6c98901b01f92b675d073b72929455f47ccf29cbfdaa248c602b02fc2bce484c56753b1a54e66f6ce9df2ea57bed88962b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\hr-hr\ui-strings.js
Filesize1KB
MD507bcf4e882ae521ec6ddfd0bb2a608db
SHA188e2ab25dec6ba9fedced9bbd21da03639da9409
SHA256bc9df2774317cdca8e5a702f249a6994fa3b63852e7749124e82ef1f37b89aa6
SHA512ceafee63fb03e94b418bd87c6af91a53c9bef53b86eddb51a7aee77d8ad5e6654045da12c3c28f3ab4486d2f6f135f7f834790991037708b0301085f62e22fa7
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\root\ui-strings.js
Filesize1KB
MD50ec670fd70f5e89c3d2727df9f2a5398
SHA1d19c88c8e11361d4f29719518b8543e0ecf5ff09
SHA2568267479623714339b61159b2f8235b15a38ccc1199eff859e5dc13359f8711c3
SHA512a429234afdc29df1276238d3e329299a6fb5b1ef6044429c1acd8abb95c0b76a14836b47805c5d464cfc95978f5e3b10eceae6c26a2964e2c352fafe1d7dd6f8
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon.png
Filesize445B
MD52a78f84427d1d591409740722e60d793
SHA1304f17d9c56e79b95f6c337dab88709d4f9b61f0
SHA2564eae979bb805992739f77e351706e745076ed932d3ef54dd47ba119c4c2fb5c6
SHA512d687c646bba8b801511a17b756f61a1209ea94938940fbe46d9e4893f14606f9e1e5ff468ba4a77474603f5cdbe0cb9df3d24767e5c9ac81a0b373dcf4a4f3ac
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\images\rhp_world_icon_2x.png
Filesize611B
MD5c7fc95def1d53bd3e747248ecbd3cd5e
SHA11b251f02465f9c7dce91aac5aa0679a3c34318e8
SHA2564049b739e6322c7d7caa241ac41c8e0b1f2893957204a910c9708c7731a7a8b5
SHA512f4b90435a3b250c1d3dc8df9bb4d331dfe9b1c0212eeb1768073afb81b3915fe61a7c4af151c8090565f778dbdf1f4fad7b5f545c9a21b7782cd7671be2ac96e
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\exportpdfupsell-app\js\nls\en-il\ui-strings.js
Filesize1KB
MD51ea3b76135bb4a589027d6243075a936
SHA12951fdafcb862ef53fcf213572368bd5e08094ad
SHA256c960c819e997c1c9d080235a5e24e65059b63cf66b95ff3da9a44773ebf81c1b
SHA5123c10075e71d2e44535e19c8660bee7071a110d07dbef67ccc4cc94c45f93afd72f8ce6b24be31e6193549823b7db204e20950e5c1a075ae159c39682db295d27
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\@1x\[email protected]
Filesize162B
MD56cbbe3240a203b0ff387d9bbdadd49ef
SHA12c65f6ea9acd8d164ece87edf2f142942d8cdb42
SHA2567b3bae54e7a2931a1957c1ca23189cdf913f567e92af15089f033b99e33351f1
SHA512cdd8e32fdf610a0c00f7e8093c98d421f6c60bb75be67fe0a22ca1b5144351526a2b56ffd955f350039e4dca823e45a3f1f4595c3f9f209b3de28cab972cd140
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\themes\dark\line_2x.png
Filesize550B
MD5b513ae819f7d8d10fa4f6cbfdf055b22
SHA1b4228971cceadd4a698f3c206d8f4bc24a37f991
SHA25625778f162c4243167f8eaa876f1b0619e67afc158de7805600471a563ec5e8b7
SHA512c11266406d79494f7d74f8f8a5f955e2bad14b8924877e882fb3e7cc7442998cf6e7a9be3aa7f1a945af8bb2add9dfcdec0ef54239f6ee80748d77444dafe6fe
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ui-strings.js
Filesize1KB
MD5b17a6a8826832fc2e1098d0286242861
SHA18ce2bb5944d61be2b628fc80ebabc769768e0b48
SHA25682a1cc52037ccd1ee4a73cc41b86ef4c9b45db28025d56105566bbc9f06bc41f
SHA512688757cebb6aaf1a9948ce1dd30318ac2b7afb7a47938e6eecf1bbbc1be058ba78744c208d71a9747ae514242b09322489ad314119cf612a7e4a717907521962
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\en-ae\ui-strings.js
Filesize850B
MD5d3e4c2fefeea6e6c467df305f7a8f3af
SHA1a4468bf4d5abcb4d720b0fefb396dce5864e4717
SHA256e9288289beec2fe3b6ac24c1311451c8d079786a09515b95cbf2eda7f87f0b22
SHA512b81a9d38a4a6cd54c2081289192ce7aee3e34d71f834c9b94eac8cd79a5cb90a0dbd3ee0da89be68e4fb69a82903c658addc272a9d70d8f8f8f8cff5c2c18f10
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\pt-br\ui-strings.js
Filesize857B
MD5a3f07671642038caece41ff2a52d8673
SHA153442624b01b79a3729a23d4f12efc8dae4b1002
SHA256088d391d696ec15140e7b4dbe6fe17e95296af9d09c7eeff17a0a9c241925b89
SHA5125d1ab4b072eec924d13d760da6aa958cc81fa58cfec3de8ff239d131d37b31cdd547eac0fa5ab34c060f0f28a2295e071a1a9573815541c5b92cf0c63f11bdb7
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\tr-tr\ui-strings.js
Filesize856B
MD574ca2c01b07af0dda4bb39ac330fc49c
SHA17cc7781cca7798ce0940fe9be999e85f8b5064e1
SHA256ab9ac8d62fd064748c921e6bd4c123f5cc8910a384d1804bec33ffe27da27c4c
SHA512cd71201d364c7cfc9d317f091a9dc318d77bdc7340ec4abceee2fa23e3f58cfb1a8f45b5216f5ebb40b3738fef28eeb37717b2508aa1369316da6b7c82c510fa
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ui-strings.js
Filesize1KB
MD5df3b4d35decc08d05ef8ee0644ab7274
SHA16b0381b9ee40dc8470a63218e5cc5feb579f7334
SHA256e27e5eb93a24a2d866e30bf027e4f0c3da9fae8968cf5eb69446e7f668356164
SHA512257c770416a94f5b79ed837fa0f5e7926cede3ce06c1a9b819c1ca77c645f37bd366564cb028b0ba6afc5444aa5ac774c3af36cd7c108164d1000254cf85c94a
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\css\main-selector.css
Filesize802B
MD5651bcf535ed50ffa7724c8751bec1a66
SHA15758c4862740517ba28026c298d1b3a61f43716d
SHA256359f38eef400e2fa3924a3258652e74ee19cd46cb92e47bce91f1194fce25e9e
SHA512492b73f1622e8a1a064141a2edbac9fb29e5f604b629b063fc7251289d237e50721e1295b4f3450322fe72f01b57561a79f0ad4b3a20290cf3214ccf0204d372
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\themes\dark\bg_pattern_RHP.png
Filesize179B
MD5bec4473fc43b77e28e60f89da4e29c00
SHA1d5dbc7c6642a8a23da14f952a0f64fe874e8191b
SHA2565e06bfa9ebccfa3d8759270620b6860f0b92be9d69ef7d7802b78ee5b5f07f96
SHA512ff2c101c1172e64481be5e98b2216d5eba93b81210a1a67adecfe05bcf37c3d965c06b368ddc1ffb7e4187cda0373720f6a27476f036a41517762d5cb3729aea
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\bg_patterns_header.png
Filesize703B
MD539e7048d412b94bb2dad145a2daa5875
SHA108778bbd84d9411f2e531867dffe45fee5d60d24
SHA2564985216f1f370fff03c45d4a711c18b3f49165f8278e6cfc231bb38b920095a7
SHA51265803d69def3517f0021a291748b55cb5bb2e8437732e6cb9b99b1f778f766fbff2c484b664d16ccbedcd51c14f89e99cd5f977cf97d680eca78a9d4f8b87fb0
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\en-gb\ui-strings.js
Filesize823B
MD592f1f77de0ce17e9486d53787f69618e
SHA141198fdd6a18321c15c3d4647962e687fc036af6
SHA2564ecb5e390829b5b11dd02db2f22ac1349e32a24e5bd3a8489f6fb5fb0f07eeb6
SHA512b389c8364936fbb96a407fb1a848254fd8b7bcbde05637ac1acfb48ba0b30e887dd44b2447e1e3eb75a902241d67571584a819927cc8d0a91d325f5df79f12ce
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\ui-strings.js
Filesize1KB
MD572542b122d453927f3d6c59552165606
SHA16e2b7f049b60f10edcdec06f357114448c0896f8
SHA2563b17f8b83bec3e72acd0d014f58e7de206106a7644bf3293f93c7456ced47419
SHA51225eade5c88cc35325978ba2e103050608fed4330a1677280eb2e0445946a3367d26796ca1233aa6d7ec4c87f04faf7706d82c72b3f3485d80c18e088813f7a1f
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\images\dd_arrow_small.png
Filesize289B
MD53d55e1e012d3824e53e84d404a6e2f2e
SHA19983296698d4e2736faf1c529e8d27f8071d7939
SHA2566559f403524ea6ef9bf2e1d0bb66d1af8152920fb002ec2c4ced993083124a88
SHA512ec75d4dea30bf7567b2f6e30ffed408815c57680a38659f6055d770c85393d8a5678d38a066ceb7fd0ff9c5ef49cf9fd73d7e8eae5a9a83360a41ca74343f576
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\en-il\ui-strings.js
Filesize924B
MD5421cd12b43e660f10da31bee36e85f4b
SHA1b568bb931d5bf4b5805d20fc339b06f9b3763c9d
SHA256ce7c16adff608d624a412164fdc692305fb461f4b14f9167e6efa78dbbad12ba
SHA512f56bf5a7a713cbf018203c24a7f9dd426a2cf018cb3ddf9e27f3a7765be3571339421fa5a2cc68f677eb4929a2a2835238a723db4de07bb0634e3f151878ac86
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\tr-tr\ui-strings.js
Filesize931B
MD57d8302df4582de342a31d0335e979ae7
SHA17a3e918e23dc8002dfbe1695f8e8fd52db995d1f
SHA256899ad5e0b3501d7e00d2f3bd3c7729b4223839e8629c61328db0f818ba0870c9
SHA512cbc23b3285f6d8d72221d0fc05ff59336402005e7d3f50d66249ef6076648ec2e22d33ed64f5436767c123f59d37dae45270a259153ed98b885f9c43ec9bc2aa
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fi-fi\ui-strings.js
Filesize1KB
MD50900039f6502c5c4418f5b712f0dc94e
SHA1cb39e28be0988298003a966ac208c54f83a6ae27
SHA2567037318dbcb8809fd3d03ab0293d58666df18363f0144ef65b738ca3fbe028f0
SHA512be9fc36c81963737569c65e4f295f347585bcec88b4fa6ef9da1478f4e0f947b64b8ccaaffb816a74216f713060ae0a56f58c3bea1d12b16bb8488a7663db391
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pt-br\ui-strings.js
Filesize1KB
MD535d5c7b80ed270a94872c0e56a6c59c6
SHA1bbc4ed04ea6c922213d7cc19c62c3c4cd23b7113
SHA2565c03e31975b96b3d151d9e034b884cab9c6fb29576d2b5653c375fc5661b6dd1
SHA51257ec341f6ff49f24516e117d5c0b119ba4c62dc0537cfcaa15bbba248729c06d29ca224462bb331c44ff1b3abd724df86d0b2ec473ae9f5d54e31ae2002e8bdd
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ar-ae\ui-strings.js
Filesize855B
MD529dbb24810bdd7f802c1165f8bc3a714
SHA19ed5ed2ea58cb6d9196e8d88fccdd8f0d522ea47
SHA256c9fdf06266cf9e6d61f7989471abe569239a93cc2c0f65a7c596a81af8d6a67f
SHA5123802320bcf7b20a6656460456d5b03ac4f85e4572d7530518dcf99f28162964adc211c5adcfb7ace603b6734271581cea26c9e85821b88b1915e13780a19ec24
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\eu-es\ui-strings.js
Filesize851B
MD5b54b9c5d611b062aea9d8ec0d192335d
SHA1a6a96602b80181ef494a0da49dacae1c44f7c739
SHA256d70a13e9b9e9f4026679200872160d667979bd0ae57e6527d44090e49bbc2c83
SHA512e56e4a0dba26c3bd824bcd397d495249466a3732bbe1466f9ed1c23ec3a25d79e44e360fb5ee5a229fb24d6961ac32a2a57d0a29fe669e767bd33b956f57ebf5
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\hr-hr\ui-strings.js
Filesize849B
MD57a232b079f30771ada44ab6a1843ec14
SHA172349db2853443af021d538be9417fe32369d2ab
SHA256e33edcde1654c47b3f834797623932ff5dd99a4331b255b60452d69d61ccfb4c
SHA512431073f497196ad03ba92a8087aa6c50717ae137b05aba341cd8f7ec1705b46f2878b30455c10d7339f89ef16022ca5d054b0f96e5956ef0590121ad8e1a6638
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\search-summary\js\nls\ru-ru\ui-strings.js
Filesize852B
MD53b8883ab58438b245c89bc76ee848752
SHA17b01b457344fcf92362d14247f2c389ed0c89b6c
SHA256b3b87c3ad568de5a1f07702392e3bfc76f41a47b2fa1d710198406c3c5172697
SHA512200a52dd5e9334f2c768fb2d152a82cfd551c0991eada79ee92ae41e8beb82a1eac2d90fdac2d9741afe0b7edcbe046cb92a6cf339d25709b53d51f5feb55b1c
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ko-kr\ui-strings.js
Filesize1KB
MD5edbd91ead174c60fdacb765349ea4fcf
SHA1e55660206658be80e2033a93abd8854653246eea
SHA256dfd68e26d32c27e8c7d096cd558b12da3228019525baaa2d4b32030339fb0b6a
SHA5129c664370c6c102a0e6992f2fe711e7fe7f6ac732a8562bcc1839a0d99d828e4ab0b3dc70f33f3cba444d04161d0df13b70e72b9079c5aabc7a85543168d58854
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\root\ui-strings.js
Filesize1KB
MD5ffaab524b0c94fd06a44c1b5b683e0dc
SHA117dcce5e4d3b9f718c902863652cb67e060e2f3e
SHA256d0a34414103960973357a239952bb0fab5f988ccda1b67ff8e6864afcd806272
SHA512a7ecbd3e9656cb0fc1304b4b86980e97680c73b673c4284bbca08c4a3f3ade0699a7de61f0905aee9d521da4beaed61d3ec943090ecc44833118f1f5a29318ab
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sv-se\ui-strings.js
Filesize1KB
MD55af99e838bada8e34b660d7fcecae2bf
SHA1ead4e402f4696ede69adb3e4cd694e7d52925844
SHA256e3f604ce27fb93d417b9e8a4a5f10f6fd17b59a76aad9754ea0cc5c56b31687a
SHA512e69f6f12a51382491b4bec6f19260df249dc6dd9a33fc590a90a055baa5f6dcc80894e2c65ecc7dd0d10040c90740dcfcd2f98dbd1f2fbd94c34941897f6ecd9
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_thumbnailview_18.svg
Filesize1KB
MD59b4c8a5e36d3be7e2c4b1d75ded8c8a1
SHA11f884298931bc1126e693e30955855f19447d508
SHA256ad47fd9e87159d651a53b3dfba3ef200684a9ed88c2528b62e18f3881fe203b0
SHA512e1acc0b10c92c2895fc916fc8feead869e04315e5e6e279f8e61b344545103b4c9ff808c9ca2121d1b013879071364f677da128caeba89bf918ec2791e5ed094
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\share_icons.png
Filesize1KB
MD545ad813c887294a1c5c88358f6e6fd12
SHA145266d0bda31888b67b10c601d303caca8786d30
SHA25691ed5badd0d99f45c65c0ccdec04fc59fffb1f6d055a4d2722dccde82a6bb73b
SHA512b06ab5889fdf50735ff0c3cfcac3e526b9f32d694ac631e7c2a06eceff357f17e92540df5f84426f8e8f75726c1e7df3592f1620728b70a4b5290c9e49e377f8
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\images\email\themes\dark\adc_logo.png
Filesize1KB
MD55c4cbc56377969e41dcf39d60690feeb
SHA1a20120d0d043af4d3b6a72db517ab8a623b3febc
SHA256c0601bc1bac97e69da3ef3e2898aafe64aec5ae4f3ccbdb7649471f76da4ca0e
SHA5124accc91aeb47949f1137ac69a0740a25c957853f59ff8d18077e64b1a3262488b71fc4bd45714075a0652328e1a49a602c7950b86edabbbd7e5abbd9000b705f
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\bun.png
Filesize2KB
MD5a7a19c86ac01e03111c30032ba417b55
SHA1fd7f42ef37d82cf1704b65762a8bc6b4a868234d
SHA256494032a3293df271c7cc5d26a5753acffc5f6df811d024e9b573f2fa380f3591
SHA512728d4755dd7d21c5ca285906d5f043728fd089de42d2fd04beb514563224104f7672e5f5144e4ed68770b933dd1069d76b26d140eb692d83d907176330f3f6dd
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\cstm_brand_preview.png
Filesize2KB
MD5f2f1d5a683617b2bdb6cb0b1eae67135
SHA13e0dda160b0f8b963dde8036b45aabab5d86504f
SHA25696497e49c11ebeb0f73bc01b033b7f45cd9f8eee478176e11b1c7342efa63569
SHA512cc9688ee19a6391296abbae9fb1422a6d72d87b7abe8552e860eeb092f8cf7e6864a7f06dae6a60784b77353c38103abd3632492f8b33b7b3d900531cdb673b2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\dd_arrow_small2x.png
Filesize385B
MD54eefd60f439096ed98b6d8a585da12ef
SHA175cb70498807b0c823cac760e00652842c1a63c3
SHA256e743d6195ff2f42282e101f9471874e8df79dc05a69ca20abf22015d48d28c6c
SHA51278241e2336f4ee826719d5adc70543db0f0767a1660f723ddfce72c170322a13c0f3c547eaea6b6cfc47cdf6d8e5edcaff4bd003cbf3eb9d3435bec5158fb8d2
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\nub.png
Filesize1003B
MD55991993dd41d6d2b062d58bb70971e0c
SHA11a75ce12ef1c4cb6a85225d0bf4f68d4a3edfce5
SHA256bd66e8f62d34f70917102405af895c0b07b79c13fd2d1ea65ebfba3bd4853aeb
SHA51275511589b1937aca668348061728734718d02065ae76446b61e3292834709e3b66f2a453717fd593a8fa1db92ad7b97af03f7d2e7f5538716582ae7d8c11e09b
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\images\share_icons2x.png
Filesize2KB
MD56018a4862e3cc6b434d517a47858a2bf
SHA123769e9ae485bb2c35630db9a6ecc8a40c2207cf
SHA256fde09d85ac7ec84dc0b5f2bf1c1f935b80a3e45dd9257af499d412302602f310
SHA5124fae17ef027649315cbc73ea47a2fbdd8c8c05b9d818af5b41439e9e5fd81d62ce13f6ad125a2817d0bb4b24a831358803c53003628520cb9c2a8376ac8e1aa3
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-gb\ui-strings.js
Filesize840B
MD5cf69901e6d4609009dff8be5b3045c96
SHA1712afbf4bdf24b6fa059f0fcd837449d75432800
SHA25616d0edc8b7ad7705b23a14058f366ff1c0dfa16a0ad14f741924c308754cf8d1
SHA51284b63e071f56e8e406fe361473dfd6eb17daec1809eed425b1b977f0135d6a78a3375c9bd1a65daf1ac7977f712b63ed735eac8ebc91e55c1a3f366e288a9ed6
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_checkbox_unselected_18.svg
Filesize952B
MD58c8fd1cfdc60f513bf20132a1d5aeea2
SHA140167e542ddfd848fd138e2914dbb7f116a8f99f
SHA256f438a4e713df6a982afbe2eec993cd582edc37a876fee88e1ddabb478f2b5ee0
SHA512e5a985404619bebfb615d4b5378942b56089b40170e4072c61eb9ddf722639941e820f039437b59cd3859944b3e06ed72ee49e879522e81fd9d49b56c8e40d35
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\images\themes\dark\s_close2x.png
Filesize631B
MD55e0d423694dc87169e1124f26d755117
SHA1340b47ffc7ffe45c30ce927f1c839d01600f6161
SHA25668df674391ddb32170020e5b55b8df9ac1bb5274419dbf8748ce53efb18584cf
SHA51217ace592b7b00dd530d923711160c39417b6c6412c3528cecb002fc065a16dc439555f61e4f6de7ac86291cd9cac5f5ea8411bec8ffe043faba887026fd2ec77
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\he-il\ui-strings.js
Filesize1KB
MD58ab4b211dc3d2947d2466033f6d524f7
SHA17c457aa6cb3b704da3c977bbcf3953c3c1a7a7bb
SHA2565bc633d52bc4345c9cc4ea7cf49422a85a9fe401faf3239ef72b53aa0dd667ee
SHA5120b7e9cda1a82a15fc9492a35808bd1ea43966cf5e55d84b9831f79d64f36a66583a14f0ba95eb12098bf9df6a95eef0bec6606aba1cf56bdee0e046aa60f8d5f
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\close.svg
Filesize1KB
MD52518c2304a390e60d20b53b101fc0056
SHA1aae24d58011859ff6986508882dd7eecaaa7f604
SHA25603e98670a1d9049b8e1f02c4fdd449d098465f7578ee0eebfaf3f138a78301ae
SHA512b7457acf824d68e7728088668cd8d44e06566dc71d156db7e9480b957305f2268778907a8e93e4e2d1937b3c3cbfeeb327399cd7f33a60274d91efab2ec3f534
-
Filesize
168B
MD527418f9aeb0fae483bcf13272efe6310
SHA19a28ce8233f1be05276f787e06f872f7dd49f8ed
SHA256e3c2af35d1dfc500e16f826a071cc311bf55003a3de77de7ea3376c6b6fa2857
SHA51235386ad7cb2b39b8d9dc94599e08bd68cc60e3a192090b511f1a2c99b3824b7f74949ed57494ea0e4ba32d25b2c6bdc30117687a5352ec96ca41b1a927ffa7f4
-
Filesize
1KB
MD569016e6a597d194701476b8e04d4e028
SHA171a24ddb0c5bbd321d3f09d7b322c3655fb5e129
SHA2564740d289d0a31bc1fc00e255845b3d8ba7cec2d6d0ee92177d23aa293f9fca3a
SHA512a9399ea57f65c6569e2a9e9ebe9fa2da7184ec92a555549f39cbbe9dff15530ad526107a2a2304d822be37580a965c6ea4e88a46adebd8ff3af402d2c25321ae
-
Filesize
1KB
MD5d8d0face111912e6dcc93f665bfa10ad
SHA1e171cc8b4abd73e2e6f9e0145e8e3d46e333133b
SHA2565efe288bf88e3a66ead387ee327d7f2ae6637fa507e14271cd1c30024279945e
SHA5122bedc86a79225d3c23067a042a219976a670ee164222cbde077edc2bf5618181eb5e26edf86946e2797016c5a87f3534e47dc4ac76d40487354a701ef77aa51a
-
C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\MSFT_PackageManagementSource.schema.mfl
Filesize1KB
MD51fb20e4a02ba1ad84aca9d99fb1921cc
SHA1169ea6ad71a5c4f4d8312668259ffb793e6cac0d
SHA2561c55f2acd075736d1fccd0e7bca9292072d933e2811b8e042c172e9e7f112f39
SHA5123516ca18f6f5b64fdb2de80c950d114b2c5d979c24764cad4328411eca14c47c4758816bce45c3a691adaef50fdeeef64ca51a7ce603aa5ac11bd308a9166621
-
C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\en-US\MSFT_PackageManagement.schema.mfl
Filesize1KB
MD5125863dbbbb069fd535aaf5f8b17bfbe
SHA1ba601b96a414c6e3dddc42e6a0608ecf099e6310
SHA256424c38504d88d0f7b3691471d18b1a21141b9e31b1cee5dad278963613252480
SHA51218e068cfb976f972322e12fe755aa37a3f44fe79e2da094042f22f1a3b0a6328033e05a625f4faa2a373c654751ed1094f9c04d9411e86888448e367ded915d6
-
C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\MSFT_PackageManagement.strings.psd1
Filesize1KB
MD59cb17fa9b59645c7f574893b4565d2ab
SHA1274e027aa39e24845fd11fcbf265523de44e69e9
SHA256e2e70c766bc6c37a41a221b53a0e62ef616c8fbcf7a244c4863f6a74c06b8e64
SHA512d28e543a9355274fecea9be5b1120fefea5e4652835e477cc9886527c0a67556582368618ef1ad98fc95a406541cb7541dc30451033a77b8c0f2011874b1a774
-
C:\Program Files (x86)\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\de-DE\PackageManagementDscUtilities.strings.psd1
Filesize1KB
MD55f3c20c13de3ac54a574e3dfec50a560
SHA1ff983979d46433ed43e738f5c34c5340083cca11
SHA256a6f6e59f677587238a2b472d2f214b1c95d61d86a7973cdd89a61e2c05ca7594
SHA5124caa9867ce2b6bb9abe419a9306d1e417a2da05d5af5624bd92f433872338f39d5b88cbb4d94efc34ff29ced991cb38ac531ff6b6bcd9f899bc7061c906f228a
-
Filesize
209KB
MD5b8c1bc869e29bde7eac0ee7ac2d12252
SHA1736b5a189298a21e28802aa74fe2c850779d56dd
SHA2568cea6bd04491ec90697c9a1683fab86ff62f319e337e71fa2029c23f2657234f
SHA512b2d99b4b1a4ea85eae7cd30393c282d6940081d37c6ed5e8a7cb1fc5373823ec9b0d98b939e285e752bf5153ea71cc075ab251f3a0c5d7b505297a39ee4266a2
-
Filesize
2KB
MD5ddc4cb14453391bcb5f4d645b2916a6c
SHA1c4738d174c90c285e17bf51a9218256f45f96ea7
SHA2560c19ba9eeecab3cbbdf38da08c3fa0266f10ce8166e056715931efc543335eeb
SHA51234a32b92ffb2945608439653b5ecacba49fd3312ba5487ba14796c75b07655f0d8f735453dac117d46d204d3f810126f8a189f82c015fa8bb6ea37d9b8e0e30f
-
Filesize
190B
MD5c5b7a97bda04c48435a145f2d1f9bb42
SHA1bd94219a79987af3e4d4ce45b07edc2230aaf655
SHA25607ec9bf950252d0254d4d778698c2e4173f36dbc3f57f51f34d1b85a07c2eab0
SHA5127eb1a26cf8ef725ba6d1934ca4802f70cc22539017334c1d7a6873afeea6236bcd643b52630f7fa9d8a9e692f718ba42cc704ed5f8df17757028be63c3efad80
-
Filesize
153B
MD5d13b5ffdeb538f15ee1d30f2788601d5
SHA18dc4da8e4efca07472b08b618bc059dcbfd03efa
SHA256f1663cceeb67ba35c5a5cbf58b56050ddbe5ec5680ea9e55837b57524f29b876
SHA51258e6b66d1e6a9858e3b2ff1c90333d804d80a98dad358bb666b0332013c0c0c7444d9cb7297eff3aeee7de66d01b3b180629f1b5258af19165abd5e013574b46
-
Filesize
744B
MD5809457c05fe696f5d34ac5ac8768cdd4
SHA1a2c3e4966415100c7d24f7f3dc7e27d2a60d20c9
SHA2561b66520d471367f736d50c070a2e2bba8ad88ac58743394a764b888e9cb6f6be
SHA512cf38e01d3e174ff4b8070fb88ead7e787143ce7cf60b91365fafd01cacc1420337654083a14dfb2caa900141a578717f5d24fa3cadd17c1a992d09280fd8dc44
-
Filesize
114B
MD5301657e2669b4c76979a15f801cc2adf
SHA1f7430efc590e79b847ab97b6e429cd07ef886726
SHA256802bbf1167e97e336bc7e1d1574466db744c7021efe0f0ff01ff7e352c44f56b
SHA512e94480d20b6665599c4ed1bc3fc6949c9be332fd91a14cef14b3e263ab1000666e706b51869bc93b4f479bb6389351674e707e79562020510c1b6dfe4b90cc51
-
Filesize
113B
MD5b9205d5c0a413e022f6c36d4bdfa0750
SHA1f16acd929b52b77b7dad02dbceff25992f4ba95e
SHA256951b1c95584b91fd8776e1d26b25d745ad5d508f6337686b9f7131d7c2f7096a
SHA5120e67910bcf0f9ccde5464c63b9c850a12a759227d16b040d98986d54253f9f34322318e56b8feb86c5fb2270ed87f31252f7f68493ee759743909bd75e4bb544
-
Filesize
1KB
MD53be680b6a8edfdeed37bf5068a37dccd
SHA175bc261fc558634731e683e431e4a31c5b463107
SHA2561777e4f7955cb5900c97d92081efc4b11704ee3b265717a7d7152972b49a36c4
SHA512a3c8a91689105a14c49b020826944d32540353c56fb9e9a011639ff5107d25e1d3466f0fc487ef953c6bbf0c006abc5204e3a8f0093e1c633013a547f8ecab21
-
C:\ProgramData\Microsoft\ClickToRun\ProductReleases\42FD2028-E94B-450A-BE0E-6B9DC3935D12\en-us.16\s641033.hash
Filesize106B
MD5f536fbf78e26387affb82ee89943b870
SHA13ac8e44a9491c16bcd86dab6781acc4f7e1f76a7
SHA25634dbd6bf55d0d075d666181d9278b8387482a8b5804e44e1ddaafe6876dadc15
SHA512d9ad640884f40495b4255bd221f0902ff64f84e3136053d03abee7ca417d32a1d72f24a75cb67bc50629e102bdb2f81c0bb087e0eb5cb82fa3d67c4fa5d92450
-
Filesize
57B
MD5ab9d8ef2ffa9145d6c325cefa41d5d4e
SHA10f2bf6d5e1a0209d19f8f6e7d08b3e2d9cf4c5ab
SHA25665a16cb7861335d5ace3c60718b5052e44660726da4cd13bb745381b235a1785
SHA512904f1892ec5c43c557199325fda79cacaee2e8f1b4a1d41b85c893d967c3209f0c58081c0c9a6083f85fd4866611dfeb490c11f3163c12f4f0579adda2c68100
-
Filesize
2KB
MD5234c58fcbf2775edbfda910d2e0cb945
SHA116314a6f5604aab01e76d5e7f7794b40c23a4785
SHA25668193f3f98611b2aa42be4d2995b0b9a2465277c7520231324a08460639a41a5
SHA512fddd87a902c108de1d986dc6e4fa7347e3908076d1ec3f64b19602d3a2318ad5ee0a1d46599ba860dec61843c2954d3cc9e91aac9718a82d1043e32b3dfb6bdd
-
Filesize
3KB
MD5703493f4417c30ed1e1856d3628945a4
SHA1c8da0fdf2d0580a739f0d11a4322131581b67f77
SHA2567c23b4ec3b42f260dfffadaf7d59a0efcc8f6547149b45907b1fc5242a4e6c2e
SHA5122876029ed71708e31bce2871dc62820c6684a16be26802560341a07dac9394095d7b672ccdfb65bcae8177539c4f20cf4e8b8b8e892fd117f21cebd3632275a4
-
Filesize
1KB
MD58b550761ab80413c9c09f7fb472dbfaf
SHA167122822562203c17dd3f762194e470f90ddfa97
SHA256f5ea79165516de2e7e1efb53d016983f5d18c3184413f044a4002f4b751c918b
SHA5129546013cf4d45a2c4c609524b7ed4adecc7dc2fecded7c3b7085415a1bcd1c25db5d88bb591ac05fa5a6313763a8e8d5d8fc6ee6610b454cf7696b647e7781fe
-
Filesize
634B
MD58776c367699ad807af292f1f5d085d4c
SHA19209e352bf9d3999f94881a75d6f7d39bc6d7f77
SHA25618b602cdbb7656129a359046fc68faf1b990da88c6c3b3e6b20c1df399cc0645
SHA51283a17d98d175a122fe98cf89c476826769d8fae0d74dc93c8fe48d12089e26bfd501a586db3783a03e1bfe07864ebec2a6b5a48415554c61cd565131ed40a9e1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_A30EA9B4E1BC5DBF09A8EF399E086D27
Filesize471B
MD5a50b718c3518b630251fb54b92bde360
SHA1a9582222b6f4df2b4e3e4ee5fe91d25ff086b943
SHA2569d2ce1c032646d2a3381b68bc9201e3dcd53b764e83a0d356d67cc4926ece015
SHA51295e0676e3177262d29c4105edd4ce1fa1c2a2da5cd3289ab0f873fba782a0185e4bbede5d64fae1f6c4cea5ca3ae0697d7113e6ee63f229431bfaf3f8990c517
-
Filesize
834B
MD54f00b32a70c5d829f8199614fe56af64
SHA1ff2afa238f88ce8cdb4430fe578c58823cd6d752
SHA256e3833793f7412667cdbe15693f5dc4994934d1a6695392f8bebb74f985658256
SHA5126ca12db615454c1b842040e5047ab24906d372b15b547653553d39ebd18cf4f90a360c5032e415d00ba313cb27def27aa8eb7e94ae3d86fefcd856b693f0c6aa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\26C212D9399727259664BDFCA073966E_D53C01423A36DBCEB0BB7256A7DA6D8C
Filesize400B
MD5a75d7d422fd00bf31208b013e74d8394
SHA13d59f8de55a42cc13fb2ebda6de3a5193f2ee561
SHA2567a12e561363385e9dfeeab326368731c030ed4b374e7f5897ac819159d2884c5
SHA512af3a1e15594a0bf08ae34a5948037ef492e71ee33d5d4ac9f24b18adf99a34563ab40ba8f47f2adff5d928f18d8a8cd60fc78e654e4d6cf962292d2f606def66
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A
Filesize412B
MD580be6efdf5a776659777bf07d4aff891
SHA11f98e7ba8de8c6b39f4b202739ca71fa2629fd6d
SHA2569ebc694d4895efc802ea27714a71986f293edf4b63e9918c27d65871b06f43a9
SHA51203a5434f25209a74a0abc6045c66a45e098d487227cab71004363c8c823840b49596857e8f757f42b8953f9bc2066209b1e8f52104d1837705828cb2676119cc
-
Filesize
16B
MD54ae71336e44bf9bf79d2752e234818a5
SHA1e129f27c5103bc5cc44bcdf0a15e160d445066ff
SHA256374708fff7719dd5979ec875d56cd2286f6d3cf7ec317a3b25632aab28ec37bb
SHA5120b6cbac838dfe7f47ea1bd0df00ec282fdf45510c92161072ccfb84035390c4da743d9c3b954eaa1b0f86fc9861b23cc6c8667ab232c11c686432ebb5c8c3f27
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.82.1_0\_locales\hr\messages.json
Filesize935B
MD5798b4a7c5a9f20d24f36ba8daf7b8f70
SHA10f007b82783ddea5da7374c96925b77a7fe9f57f
SHA256e5cbc8e3a6e843009fc9a9de7a83df9d05532e08d48da06c66f907f58d0c745e
SHA512e3faa4376d03dad6cd714dee6349733abe29d0c2118456f80bcc4c758015b12a06b4ec6532a6e98d512f5c6dec7a7ade5c1d2a418db0f739ed17f18c0cd6b54b
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.82.1_0\dasherSettingSchema.json
Filesize854B
MD5310614b10980392ebdb5a5a8b90b527c
SHA18c8fb36e7c2a1574cde7fdea30e8e5f14fad7691
SHA256445c811c35e2fbd4aa59389ec805492c7b2db50d65f5d161417ce8302b103fbe
SHA512416650adf9a61cbbb6eff7af635264e5bdde903477465cce05b63773927b8afb35e75fb68497882bce7778f524b9c7f3f2befcfe3840e99bff90ccd305bac66e
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\ghbmnnjooekpmoecnnnilnnbdlolhkhi\1.82.1_0\page_embed_script.js
Filesize338B
MD5fc91658bb81ea407fd37a59d65f0d86e
SHA16cb269ab1a592dfd2039dc8c50c00b86af94d3e6
SHA2564bafbcbc4cbbda94d0a315a09176de0ce6872cf1d85113539a7b04ff2360efa1
SHA512c5b8832097ab5e74a0c31cc243c98c6a2b9734da4eb6e25cfc28070529ff4b6d77de1e97388f188f00148cd8db32f3ea62dc86aa841d47e25da8d8dd2267061e
-
Filesize
41B
MD5f5cfd73023c1eedb6b9569736073f1dd
SHA1669b1c85ecbafe23c999100f55a23e06bf59ead7
SHA2569e1736c43d19118e6ce4302118af337109491ecc52757dfb949bad6a7940b0c2
SHA5125d8c1aa556fc17d6dc28d618f521aee37fc0e1826fdbcf8d106e456fc3bcd3c76e712d23fef3378bd2be17b80eb5bfd884ccd89b67490b63c7bd118eaac471d8
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons\192.png
Filesize1KB
MD5fb2c9147b4c08176906fcbbf37050af5
SHA15713791d2f134bce1867efe52df57fd8aaac3ab7
SHA256a469add28a869f891a4a0ba4bf6cb716c4202c06e439d51b29280a6693ba93e7
SHA512f4da8ad6192fd9777480e279362c78cdb8b5695fe0d457cda9f9002010c90bf160c7c90e0c83526eed4e154302b6501e24cf1f5bb52fedb470583a4fee5c0ed6
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\fhihpiojkbmbpdjeoajapmgkhlnakfjf\Icons\32.png
Filesize1024B
MD50f343b0931126a20f133d67c2b018a3b
SHA160cacbf3d72e1e7834203da608037b1bf83b40e8
SHA2565f70bf18a086007016e948b04aed3b82103a36bea41755b6cddfaf10ace3c6ef
SHA5128efb4f73c5655351c444eb109230c556d39e2c7624e9c11abc9e3fb4b9b9254218cc5085b454a9698d085cfa92198491f07a723be4574adc70617b73eb0b6461
-
C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Web Applications\Manifest Resources\mpnpojknpmmopombnjdcgaaiekajbnjb\Icons\32.png
Filesize914B
MD52b0e63420f5cae3932461d8c74a9e788
SHA1d19b5095d30f9f01f09864c26386dc5b911ecd55
SHA25642345ab2147d5dd09780b2e286347110011a769f122210e7b9e9c2249036f15f
SHA51211a25eb4cba596d1b203bb88e2b69231c8f8ee59786ea335a66ca77dcfbc36ebb8a9b4e957b992c3ed38f58d1ef8c7c606d8a16dc84f8220cf517999b4f7577a
-
Filesize
277B
MD57d3165882b27dc69918cc2de97baab96
SHA14970307efcbff0c15053a742d6db65c4528d4308
SHA2565cdcd733b8b630509bac08589db291ddbde33d79f64664cb9582e66589555257
SHA5122be106c204c36cdd721247bf95eff0f8137b67b3509598719fff28a54dab7cee596796bd356e0a31492cd3bf4ed87b5b555ec82da8a11c0f967a4c15766de28e
-
C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Code Cache\js\index-dir\the-real-index
Filesize48B
MD5b203621a65475445e6fcdca717c667b5
SHA1c17fd92682ca5b304ac71074b558dda9e8eb4d66
SHA25617b0761f87b081d5cf10757ccc89f12be355c70e2e29df288b65b30710dcbcd1
SHA512ed68f5f49945dcd0d81dfebe2f2fd1fcfe016807d5c64ee0377d046efeb0a7fd9b4b9589b3df8a14194d51dcffbd89c8aaa072cea2ad4e7976bdf53528ea90cc
-
Filesize
279B
MD52dcea950234175e3edf672936843ab5f
SHA14ca6dfb9ed642bbfc0002cd47abaa2dc895ce0d4
SHA25674ca16b1138459ef2afb19324097332626ee7c897687c5adc5488f93bf0c11ff
SHA512483866f3ee1d730f1052b0ce34832e0e42145296df490a68901b95e616f2dfdc39fb13e2ed80bd259c43475830f6a74257a5fc8d163e7f1dd17d39556501dfa4
-
Filesize
297B
MD59ee38aeba19f4d46fcd9eda4661325d2
SHA1d458ade2d50d219b089b0985ef765a80843602ad
SHA256d99258f5d81067df4e95825381104fe6c90d04d01bdd2915954dd06f75d07c10
SHA512f352805d5ebb6b3351dee65dd1f66ae5493ea36dc342c31d8e714fd11095739f755a50d865b9bcfc40c60616c9bcee4cbbcabb6c18566fdb73e778cd41112738
-
Filesize
1KB
MD51595ed4372d33dbecabbfd411c6c8f46
SHA18b8ba962b765110f762f873edbc3193adef48b33
SHA2568f6abb9e202dd8027ac9abbd475a24e62659a0b2683613f219c21d1238816ed7
SHA512e0017291c0d0685ede7a6492c2683a90b37482d21037840ab3e2cef4ed381bbffa8c31ef3c8d06db0a800eff69ba4505012886f88a911997657b3f26284142f1
-
Filesize
647B
MD597d6d52a254a9cbd2bad939ce1926af8
SHA115a64b0f07658da802cb0bdd43c9c6f2df2f0af9
SHA256bbfa41253ad301a1cd9c7f6321bff365068178f26cd84e8afb127fb4001bc4be
SHA51298e76665962acd459228cb9635d95bb37c6e538eca7ae50107c665c93be334b907178f87749b3a4f33db34152b9d9035163fe2429306eb3ac45ee539e242c3da
-
Filesize
72B
MD5ac3b5a19643ee5816a1df17f2fadaae3
SHA10d0e47938f6e00166e7352732ddfb7c610f44db2
SHA256834a709ba2534ebe3ee1397fd4f7bd288b2acc1d20a08d6c862dcd99b6f04400
SHA5125ec97cc048a3cb5da03093bc6d2b63cf5252abab6a72b24214ff885c062f58dc43c6cc05c0dc428a1a4e4b95ea84140a8883d81795416281b4ac4fd52290e0a1
-
Filesize
174B
MD5897208d5df122e307ab837d982b2c085
SHA1cf4ca14a7adcbc197cd84c1997efdd076911d608
SHA256eaae98aa73fe0b561c8b02607a524fb4853bbe81c6de8c3d8a9b7449366809d4
SHA512b0aa03063c42515de12fbf6d89924a3ae7d8bdd64d7c9bae94c75d571c939655253f3e87368fcd96f5784b2aee8fedac8f66200b8672ab47cc8b37c57a9ad334
-
Filesize
24B
MD51681ffc6e046c7af98c9e6c232a3fe0a
SHA1d3399b7262fb56cb9ed053d68db9291c410839c4
SHA2569d908ecfb6b256def8b49a7c504e6c889c4b0e41fe6ce3e01863dd7b61a20aa0
SHA51211bb994b5d2eab48b18667c7d8943e82c9011cb1d974304b8f2b6247a7e6b7f55ca2f7c62893644c3728d17dafd74ae3ba46271cf6287bb9e751c779a26fefc5
-
Filesize
749B
MD5ddfd9afa54d20919ae66441a744336f9
SHA132724e6f76182615e538e6eee7271051ee0a017d
SHA2565ee22d093851bc73da6dacfcb95436d732c09c90e009b201e0183a5b35918b50
SHA512d05c8c3ed46f9ac585470276235ded25e78a54219e35537ea5ed5b34360e6175cce138b131c9099e3de7e9bb24ceeb695cf15dc155c91c408fd2326c30206473
-
Filesize
1015B
MD561d2c715839bcfa06ce4d23dd84e7457
SHA1cdb61e6100ac4882ba4863875f63e38b8b804ddc
SHA2561f9ec15f6ff239e14a3a243a98f19ae7db16d425a63b2da0908cc0ffcb1258e7
SHA512cb6577068e0b746a0ff0148238fd5be9e02e4ff6218fc21d78194a06ebd3f54aa12a1a9b80a4cc9a9f66f72f49eb875eb367b344f674807af11373770f75d952
-
C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\yuzka873.default-release\safebrowsing\content-track-digest256.sbstore
Filesize511B
MD50f4a36c4a3ee08de2cb188696ee51696
SHA17fe50a4d03657c96c699ad893c375377891bb78f
SHA256117985087e92cba0e8fdd6b35599d4ef451dda3ed40c865cad00b01708721666
SHA512fa96916ea3ba40cf51740fa546e51ce05b32fe8f0aa564bd46a6466164750799415d9980c3dd40b9aed9c0c126418be53c2142fd84a90be85cb3dd5b610e6d2d
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\LocalState\PinnedTiles\6501008900\tinytile.png
Filesize1KB
MD5535ee7f4b7959a29e1d1be5a67e00334
SHA1c8b3bcb1c1fbf79c59a847510d884da10dc62f19
SHA25646dcb7a9e7bde1f57e5ed2eef9257d2d0ad622c1b3da32700f6d9e2ec4a0e287
SHA512b0f9d39cb8200c35c564053454dc9fc67e68140861255f77dbe63679375ff3f892426109e95633fcf6e285b9547d890d1281d8ae4ef97cfb78433608961934b4
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\AC\BackgroundTransferApi\282c9800-4bb5-45be-846f-f681fd8b6aef.dea74d5a-1662-4369-baff-b910fc840260.down_meta
Filesize1KB
MD56f3b171c8081a7dfc1230d4b68e3f6eb
SHA18f4d1ed9000e52e1f637d16129b224b52a25be22
SHA256e830a58c5fb341b0909304355d8035c82c8f09fcb9da49f537bfc4717a9b246d
SHA51213a5ad6a38310496f40b851073cefda2f6c903f2fbf0f8b4229f002c5372938a93390fc9e41d513a2a97b0e1416f3b2d64665350b14bc10cb9de7fae31c1fc17
-
C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\ConstraintIndex\Apps_{055db0ca-4936-4fbb-9bf6-928f5898ffe8}\0.2.filtertrie.intermediate.txt
Filesize5B
MD5ca9c491ac66b2c62500882e93f3719a8
SHA1a10909c2cdcaf5adb7e6b092a4faba558b62bd96
SHA2568855508aade16ec573d21e6a485dfd0a7624085c1a14b5ecdd6485de0c6839a4
SHA51265faa9d920e0e9cff43fc3f30ab02ba2e8cf6f4643b58f7c1e64583fbec8a268e677b0ec4d54406e748becb53fda210f5d4f39cf2a5014b1ca496b0805182649
-
Filesize
3.2MB
MD500098438ab2cc364ce45d98902fb2b2a
SHA12a88a24a659f9a7962a4b6602b96d12249d2c790
SHA256bffea8bdb7811b3d52473c07ef2c539dcac00df6bce60c7cafebf8c7beefa52b
SHA512ca430ad171f53bbf3e7d670a9ba2961e3a0777abb640fa64cb722a1eb434f4c86bb71e2b3f6be9f1e3081e13a21fb38fb491a53134e9ac84f71c5fec237abf5b
-
Filesize
17.3MB
MD5b39fb3cf854f8628c2f38298e0965687
SHA15931c9f88231e2cbb86010224a4d8604809e7fc7
SHA256fa203e315d9cf5190da708dea03ff34c1df172c992df671aa3db2f5513a70d76
SHA512133c98145e4bc2012198593bfe23c0b3b965a69e3bec7eab4718832daf9013cbe96f040acd64ea0b1d46631ef96c1f779b7f0d5b1b5ca32c14b20c5b8995c2b2
-
Filesize
543KB
MD53e837b82501aa2f90cc774890656d02b
SHA1a62e967c006f6bf77fbe489b01ea30993e55fe5d
SHA256c85ca44b1ff1ad0af0ca3daf5f2302498846f3fdc2f48c6c7262f08280c6f5fc
SHA512a4a55fc0ef6ae87c5c73489993e2dc6e0e36f783de79dd7894966df3ebe13ae8341a5fe15dd0e26c72865b4a936247f34b08342769edd0a94ba2b90164b0d27d
-
Filesize
283KB
MD5b01a100820095dc05fdaa0d1c3b5ca14
SHA170af3c7337248cd4dc8c65d5ba1d18d3fba926b0
SHA256ee7205fa96539f9d9e62f5a403a06004c6c7235b7caee368dcb0db3a765c21ad
SHA512883891959202294edceb3a6360f450182d59e097bb4b0f9fe18b5316c6591aee04d0cd5bf01c1b23d1727b59eeee7c148e56eea2a7436902170993318386933a
-
Filesize
8KB
MD5a68ddb3ff23b1a4a30b5bdece947a627
SHA1ee05adf325fecd0a47072c98785c1030e493ac42
SHA2560b2282e242f5c8d7a1656754a2b67a3e61c50fd3c829501e0e97d94cefe09eaf
SHA5121e05703b451e0e41aac8321e937bd3c689b0b9084b89c72a7d91d95af30e689fe2e99fc2ea1d91ef47e88ee695ebb97805ebc19e0daeedfa19dad6f75b1762cb
-
Filesize
10KB
MD52efdff2a4025b4d321680416da710b58
SHA18dde40932cf15c7ed505305060e167f7db58abce
SHA2563cd69168c3a7a78dcdb13af0aee0b705a6dc53e67cd109c94c142c6db683a4cd
SHA512abefabe498d0a7db7badf2b0fcff8dbfba440fd386fac558929120b938f8182f267efc4542793f74b6d6b448437c7e08ba86443c9868eeb1a9602627cd40df78
-
Filesize
7KB
MD58d0ccf3bdafdb5b6d95d947feb17c4d4
SHA1038f90b23fa783e351d0cf200020595cd9d5fc18
SHA256df78c5471abaf0309cad3919f0dd9a4da0f874fce04ad8e9ec95e430b40eb56c
SHA512041fe83cba75048b3abf41688222e7fd683799a9342db7178c3b1b1ec0eafc1867f47d94cb48a78ec3eb9a9a6937521285de71e0b490cc2d45048424db16bf17
-
Filesize
7KB
MD51bf369413f5e5d58869f31bd492cce89
SHA19d18f93dcc2641201e697fc872a296b4b9d99ad9
SHA256fef38f2a65d18c1eebe705af1692c064ba27db9b9a06c9cd73503645da396b51
SHA51205ed9994c2953bb930f0fa8923184c57fd23426ac33ad6ae4efbf86664be274e0e3d14739ccc8d651ebdd84b0c91db0525c62a82f14d5abdbaf6d4e3c64a4d50
-
Filesize
6KB
MD5d3c281072a77bf18b91b88597a8e2279
SHA1662a8f6e5c8178217cd8ef148af14d8fe9d8301d
SHA256b5df9fc5647b8751a26c6d9c2e906a826afc3fa15f1664bb8de1ffe4952c6b54
SHA5122ff61f9ab2b06a00be2a961f8693bdb8bb7ea3c5d16582b078c72dad7c94dbefabbf3b9a1e6695fa93b14523a84b8dce3838feb6df4e2ea23a220dd7c9291874
-
Filesize
9KB
MD505e691fcb9b87105671aece6478acf98
SHA1266cedd9670378eced7df6a141f01b505691527e
SHA256ebac3b3263e277c23a0d2a244a44e1c90f3ab702c060386d7e02ab2f01da12ae
SHA5124c0792b5bac0c541af6cea8bd1643e42840e7f641d66d87b24d96dd82c00a88014f498970502c7137a8fb6344846a1e41166003e92297ec14b3c5235b1619b3d
-
Filesize
10KB
MD50ae2eb7e74c5927328aea8e45abfa4c6
SHA14966a8f547f3757a9f3ef9d9aa370e43f5bdc8d1
SHA25659f08cd59fc6bab8e19755f9c36194405cdec68e47f6059bc3613a320398c7fd
SHA512f1c2793ce9b7e5199485c9a98172d59d326d7ad2f425997e18726f3860419c26f9cc0f8a0e13d25f02dc594d6f11fdd75cd7b78b9cedf87f6c2e7ac9608901fd
-
Filesize
9KB
MD58bd29c0c15767d8d18dbeadb8af2de29
SHA1663d595a178d9b4fabd2217238eed3c35b2ee4a5
SHA2568b330240235d007fbda8da71880025c8ac50434a68fa7e828167670821124051
SHA512980f8e158df8afd340943733246a2df73a93643299e1a56de250024c55d50be04794b586a5f7c17d8061e548a1437595982edef31accdace64db6110b7193a44
-
Filesize
10KB
MD50efb3c90e6847d4dd083c8836625ed3b
SHA1bf3cd26e57660c57c4cf60e66aff21437aad7a84
SHA2560fdea5f20f648d193fcbeea675a2a50dc9d30555337cef4fd2dfab12b2f68515
SHA5125e5225c145a37d62450fead2ef1ee7509e25091af061d5f1b3d182fa063fa8e916ef07c1f280025d32e2dd1acd052b310ad79b3d40fda4514fbbbe76c6877b88
-
Filesize
7KB
MD54faea0fe4229308627ee05f91b5ca662
SHA11c0f924ae85f6c735a71b26032e1dc28a589eca6
SHA25689fa10c63719c0c5532b0ce383d24f0799eb75e9674d12e4a62b0521718b4845
SHA5123944e655f8ec2ef6fa18c0558dfea81497cc969133f1bab040bc3aeab15dbed3c8f705bb41b7b77e513354e726cf37aea0ab7f25dfd2999763984bdab5a7132e
-
Filesize
9KB
MD59c4cb26cf6697141622e9a38c9fa13e3
SHA104bb623c58b53feccc074367b00e18f0f0ee14cc
SHA256398b26c3a2a86d4cdb60f666f7e8f80277a40d0361e86d20dcabb2c83391442b
SHA512faffd15a34e79173d962288f8a6476a2592458e9b796cc5a812c3feac8073beef95342c6f67457e675d2bb8ffbebc707032282e06f8ae516d6df9f92c0ec8806
-
Filesize
7KB
MD5670bbc2328c3e406de947f50969b53b7
SHA12f8e16b68bfd562162dc636c195a4495861c20cd
SHA25620079627378ddb8672fd8b4197f30cb212a32d5ece1657612a794d7a94864125
SHA512b0c0a1d3dad20377e79a04198ec7c8d06279f7ef9d1f00dd842d470a5aab9e87b226fb28cf2d54a3efc5f8dc9da02a49a7824c52758578ffb051b71d87b6c00b
-
Filesize
10KB
MD51b1efb18bcfea56c2445d6bfa743ce59
SHA13f8404e9ea9987a8244ba0e37b8b6262de7c99fa
SHA256bd041dfbc1227fb68faed4694b172eb1d88c26aaaefba2b7fd8f04f2c019d88f
SHA51250bfc19cd678ed74b4fbae78c4b781a7ca14ada2a2d2f9adfa4bb32d39aa74493800b43bd5ec9f1793f95621a590a68f62d7db786fd09fe4c3eb84f4e1de904e
-
Filesize
5KB
MD54a0f1a666912e64f1ba811fc24d7135f
SHA1dcbadd9698e306f0cd6e80737fc44f53336cf36c
SHA256d6b418c619ba7456b594dff10c3face4ac28609a64f2bf5e635292d7ff4f57e5
SHA51236eba1cc1c0ac8d5fee7e88fd90b01ee800945ebed45ef92adf64e4aa356a2afe9acc6b07cae478cc467ca62b4a7895cecc3af9bbdf93c2a9c2271253ed00342
-
Filesize
246KB
MD5fa1f09de4d6f5059f0eb5e56af39da0b
SHA1855bb8046cae4f8da354d608d3393f46746bb8c4
SHA2567396205722b32f53fa7770dd00f701562edf78244728ddd91534a0f9e5af047a
SHA5122a64df924337986633317e1b1a002cc8e0d43453488b0248ffdc62f05d646da6671de22759d5798549c310e4e2b34864d765ca7d613c5fd11102788ed2bb90ce
-
C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\Microsoft.VC90.CRT\Microsoft.VC90.CRT.manifest
Filesize524B
MD56bb5d2aad0ae1b4a82e7ddf7cf58802a
SHA170f7482f5f5c89ce09e26d745c532a9415cd5313
SHA2569e0220511d4ebdb014cc17ecb8319d57e3b0fea09681a80d8084aa8647196582
SHA5123ea373dacfd3816405f6268ac05886a7dc8709752c6d955ef881b482176f0671bcdc900906fc1ebdc22e9d349f6d5a8423d19e9e7c0e6f9f16b334c68137df2b
-
C:\Users\Admin\AppData\Local\Programs\Leawo iOS Data Proffesional\Microsoft.VC90.MFC\Microsoft.VC90.MFC.manifest
Filesize548B
MD5ce3ab3bd3ff80fce88dcb0ea3d48a0c9
SHA1c6ba2c252c6d102911015d0211f6cab48095931c
SHA256f7205c5c0a629d0cc60e30e288e339f08616be67b55757d4a403a2b54e23922b
SHA512211e247ea82458fd68bcc91a6731e9e3630a9d5901f4be4af6099ad15a90caf2826e14846951fdd7d3b199994fd3ac97ca9e325cf0dfeb9474aea9b0d6339dd3
-
Filesize
84KB
MD508c68e4121ceeac71745015bf17126cc
SHA1103792ab800377092aabefbf4b94d0a882afdc3c
SHA256e18254dd1e074eb57971d91ab62502611dee96aba1203f2b21810d8d0e761b3a
SHA512d66c9db8a876260f4b86604dd71a52b72dd91d79b7d1da711c45577b0dddbda8e46802f6184c2cd63a202f58cdb04d51da865968b7b203b8c5c2a76a8cfb5bce
-
Filesize
1.2MB
MD571e603e402afd0fdba84a781c9934446
SHA1b3a529f7e470e478a77404846d17c1ad2ff017cb
SHA2565ff3186465a347ce8a13991fdb659f77ee21ae5dc9813b9fb2aadafda8a86491
SHA51245aba98b564e4c18bc8fccb71ad4cf1f03770a916c074c1cbf8546f1385dba6e041c67fd870f792a5eec233b8d19bbbe4c4d047015266ac5c060caf037af9c28
-
Filesize
281KB
MD5a555f73041756d249093a1d6a6f28448
SHA1bc75a0047342fb157047c19193c02a8149187656
SHA2562ad9292c875cb8b71a437b0da803d07867d2ed8deae4568f2be1f623755d5b60
SHA512cb2166fcf3a73e60fef9b90102f6aba3a913cc0e84ca0a5c4cd43c52d21ad1696040215b302d2a46d61599024679cb2477fdaffedcc88396ae9c7ff1c649c84d
-
Filesize
9.3MB
MD55652bd787ca83cebefa2385b17871277
SHA1388c87774ceaba3fdf38dd1bac22b4eed8e32690
SHA256dbd3318b8caa09e80667fa8c2d29963afe4ec5a2383b988e4feffea3f524ac1b
SHA5127b5f9472020fa8012d3160953bc611a0c854240ef34fae466e160a81a3331366747800d66682e3da2480f83352e11109eb9ed709928ea91cd8e1b95278c47ee9
-
Filesize
1.5MB
MD56b007bedabaa20fb6d445bc62f1091d3
SHA1d3905661051c4415ac92bd5492100a5f2df6f659
SHA256bfc20232c4ecf4aece403d005624c82a64a2d54d5d84720341dc6d45b3522ba5
SHA5127b0cb0959434437f31ab3e6df721be412de003979f19a66d3855ee4c87fe8a79d5cc4b42e6cf453be9289575854d2176d2bfff88a9308f5ab9f0895c0a899cfa
-
Filesize
3.0MB
MD5fb9763ac3b3f51551b4a77e833c395fb
SHA19a3f8e9225f214b31b4e703fe428b0537a7cac63
SHA256c0fb1896ee5838e9f8bd1e4495367baffa0e71aa2d3785944d5b470f29aec53a
SHA5126eecdf0d290e259fcb1c8aa9da5f3ca32f760c9039b84b11f40b63b39b1119152bde54d2c6e1c7d0a1af9f64c6a340501f934000a2f3e232612f525dd9b0c7fd
-
Filesize
327KB
MD5f832d24b70a2f4583c57a5fa9b6f0d68
SHA1092ce5cb6bfe6eadde62c4cfb911eab2474196f8
SHA25667a0f7d47ceff1407b9c4851032346a9b81a75fee6569274f15d092610f04cdc
SHA51241048c023871b485718ae219f0d79bbe01a0704f8d2107d68ead2262e3f66737718afbb636b02109d1a2b427aab04dd394ef82d8014298fa3fdee0c61bfab185
-
Filesize
52KB
MD571f601f8151e34ef31307ab4e46e902d
SHA11f3d312e2f4755b7f2decca1dedb91bc795288ea
SHA256deac6221d0abe480012e836e5e9dd915828ae55401f0c46fb7ce8049c380c698
SHA512377e6c9540616cad77cf151a31f6461338910d441a12b26175d8bcc2020eba83f621b0df1756123b58fb4358786fcb6a3e187af11123f100a91255218a616aa9
-
Filesize
92KB
MD5355f1b97cad97743a8e70dd2803e2f9d
SHA1c7c12bc74483874cbdd39343d149509be355c2d9
SHA25600d4986dfff92cfdd45576da9100d49f374a8dba1a476cfc8dc7cf50f5a6735f
SHA512eb7f8d7b68ab01a95de5aad0023fc4c51c3828138610b488c92ca3ab5c320305f295467972b542c7fe436d08e21ba7926a997702e4383ce5f4cbc674f62479b7
-
Filesize
3.6MB
MD505fadcc9a6e4e8d2fd77d204290e7c3c
SHA15a42545ddc83d9dafab2de3ef0510111330bbc7c
SHA256a3fa4fc81b388c65609bcd7678c46ee05865353c8c74e4400135618884f1e047
SHA512a4ae4a7f00a39559d5b604c1b490176c00ccb3d7e7ac78d6e829fe6d6307fd36db6c4d4d044d33852971aed1c8019dd718e5351fa238e4892cbcc865309fd76b
-
Filesize
4.6MB
MD548225ffba480d90ff00735bebd4009ed
SHA14bf8de94ef8bd9714d3d8e2b6f7661512c290c76
SHA25662900e89b356af77a50f0f88f5670d2b9dfb6bf6c259e4416e2987dc92e71757
SHA512acda33e996677875e51dbb0bee9c46cef57437abfe1dab9d3f3c2e12dcb714af4e453667e5f953071fd37ae093feeee1e17439084bcfc1c8baa107383d49adf6
-
Filesize
185KB
MD5f75d1b175e1687ee0a9b9e4a7abd123b
SHA1026f4db79aa8db651964acf17233302d1809de1e
SHA25672180a408b13b7d98c0bc2395b886a5c3aa0b2dea39ef081e193f60ef373365f
SHA512200aec20c95b1ec2e7d1bb33ed89d846a128847b82c9d09aa2788b258967e750718414f05bdec0cf2e4f9c7af697404e19caccac354a1a62db52e76c6a45886b
-
Filesize
68KB
MD56f346d712c867cf942d6b599adb61081
SHA124d942dfc2d0c7256c50b80204bb30f0d98b887a
SHA25672e6c8dd77fa7e10a7b05ef6c3e21d3f7e4147301b0bf6e416b2d33d4e19a9c3
SHA5121f95a211d5dd3e58d4e2682f6bf2c5380b230e9907e2882097b77b99520cd2c788f43ad2abcce617dd8ded0043e4ef1c8b6e083c44688b23109868e6cdd2364c
-
Filesize
44KB
MD554aeddc619eed2faeee9533d58f778b9
SHA1ca9d723b87e0c688450b34f2a606c957391fbbf4
SHA256ee15e6e3f82c48461eb638c1ea11019ae9e3e303e067e879115c6272139026e7
SHA5127cec39f32804109b3d502027d1ec42a594c1e4a2d93512195c60bd41aad7e32a8b0eb21a0ee859fecb403ee939eebc4608d9d27a4002b8c282de32f696136506
-
Filesize
101KB
MD577bceb240f65c91d26299a334a0cf8e1
SHA1de9d588a25252d9660fe0247508eadfa6f8a7834
SHA256d179c01c646d821cf745ae5e66ffc7ed394a61a595ecc2bccf27dc144ba91a2c
SHA512b380b592c39fd22302fc4a36aa6f773a79253230f0dd73ad129500654dbdf24c5a0b0ae3b2a4ffd762da4f9705a0c8e48ad4372d85cdb6271c5d3f315c82a281
-
Filesize
490KB
MD52985c39796fb4a5f4357a1a7a134ad45
SHA1305dc537a03e0137a529dc30bfd2fc6c185402a3
SHA2564f17b1ceea162390f64f54a3d13de4bb9e553da1e51ae7061545b7843ddad9ca
SHA5124764dbf01defe417d587adbee16901bf374e0548d4a00f4f977f058dbe00c54712fd25162e1bf1986b55521cc2f005e7ed8e78db15e6cabfddc6b6924ec423b8
-
Filesize
1.6MB
MD54b9849cc19270c7edbc533a875e1d82b
SHA108e69a11ac61ca593baa9e9496df7b7667e5d348
SHA2567cb9a645ec4873309eb28a499137fe8df73adeb722093723cc4e56a779df02a5
SHA5124c6c66907faadea3df697c3fe0863068736bff64e4c3cf9c1f6b60cfb1eed37cf9804ab330858a092dd16aca20df6f756c34aa03848ff830ef6b76ea92fb4db5
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3227495264-2217614367-4027411560-1000\0f5007522459c86e95ffcc62f32308f1_423fd5c7-8559-4b8c-bf1f-c9d05c9f0fd3
Filesize46B
MD5d898504a722bff1524134c6ab6a5eaa5
SHA1e0fdc90c2ca2a0219c99d2758e68c18875a3e11e
SHA256878f32f76b159494f5a39f9321616c6068cdb82e88df89bcc739bbc1ea78e1f9
SHA51226a4398bffb0c0aef9a6ec53cd3367a2d0abf2f70097f711bbbf1e9e32fd9f1a72121691bb6a39eeb55d596edd527934e541b4defb3b1426b1d1a6429804dc61
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\dd7c3b1adb1c168b.automaticDestinations-ms
Filesize3KB
MD5d2a70550489de356a2cd6bfc40711204
SHA102ec1f60b2e76741dd9848ac432057ff9d58d750
SHA256e80232b4d18d0bb7e794be263ba937626f383f9917d4b8a737ba893a8f752293
SHA5122a2d76973c1c539839def62ba4f09319efa246ddc6cad4deb48b506a23f0b5ddbc083913d462836a6eff2db752609655f0d444d4478497ab4e66c69d1ef54b5c
-
Filesize
1KB
MD57a4228aa2003a72a296e741bfa8246f7
SHA1e94ca8cb43d671cdc3ed759980bfbaf73cf4c6f8
SHA256462fa5c6568794276673c9159500918afddf8f170e580fd1f3d483c48934b050
SHA512ed66dc35762f661f760eaf0feb82e22c823f11e552c9f938748a8b158ecf0828f40d48afc4d5cc07122f41a13e7b322950b9f156808b125bc7a1ae19e066d304
-
Filesize
75B
MD56e36ba0fe61f7c6334305d61299c04cf
SHA1646aaf623a9b65f3054571ba8680342cf02b6225
SHA256367467f43d580c3c07040a78c7890ae4262dad4778878f9a49d5f652c81689a5
SHA512ee5d694d66bb3ee0d55129c96c83116e7af28b6838854d110cafe9dcb530fc05ef8b97469d7fe0c864481298fba5008c97eb2b503e90b58b1e33f8856cb132d2
-
Filesize
1KB
MD545de417378735f7d0d1d3c3148dc6d00
SHA13295b1605ccb0910148b618c52b4d0c17fbf0a9f
SHA25643782c4d9b63da7cfe64f6a9a06a6cf8007d2a793b8a5f94c9b962bb5cb25b0d
SHA51223ee803d8a1619d5d5a3dcbdea08175b3a6dca7a29a9d37f37342bad73ad4ee383b68ebd237099cab565699150f90cfd9014aa35e2fa09a6cabc0fa6fcae9c04
-
C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\On-Screen Keyboard.lnk
Filesize1KB
MD535705a33e80294bdc078f5582784f4fa
SHA13b8d2bc3650098d604e3363fdc41e9bfc2f4609e
SHA256d0e438519a8e2075e13430b66debeb7204e5e8ab41fb24eaab20db0bdb66d835
SHA512e560c350940f15a8d5c5187ed833190cdef9e4862e8f06dde9b0204ad1a0decb9adaadd27c4b7015ea5e7fabe7d7a63538ba72def9997e56300cc8ddc4249061
-
Filesize
999B
MD5a9d5728f9b0e997753288b3a140c5335
SHA1a44e9168f2e351f3ad4ee2f7c0e0037d64f65066
SHA25684ba348aafb41879cfa434256c8657baff00a9bf41d5ebe041b0ef87e7419f28
SHA51213380300950d351ffb3256e3b65f6dcfda8c52dcedf6627e10ef231925e45b178d173e7a24406bdef42949f9919326e7abf8a9101e2fee0127c578a46a1df294
-
Filesize
33.2MB
MD5bdb5f302e34d205b26a4c915563f73d1
SHA1c3b23fd809b1b31a466cd75147ccae5d6747cc74
SHA2565d1e0937fefb17d3df6ffe8b5c5b9816b5467f5d853512f0af1c918fe8911a06
SHA512ad22efb7028e87ad72ed42b4bb549d6fc760f8a11a3d4ee2f4f9ca8033d750e9446fb1c5d0d0e564a6478fb7f49f68bd511894a0ff4c5b23b5fdc2aa21d99685
-
Filesize
6KB
MD5c287ce1e7f5e15578283dcb62a2e47a0
SHA1865a596db12c13f1ae162f1128541b8986cebb9f
SHA256ae56b13fcec82a15ac8b20f63ab8e09907d19fcf55ab9b7234f0869dbf993609
SHA512c904072cbba86d5eeddeab736919b423b245b78b7b8330d5b6c99b7e13340d80027cb33a564cd2d16fd3b7362d342409331098d787e5b8525f7942715b75bb77