Analysis
-
max time kernel
168s -
max time network
138s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
19-02-2022 08:20
Static task
static1
Behavioral task
behavioral1
Sample
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
Resource
win10v2004-en-20220112
General
-
Target
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe
-
Size
203KB
-
MD5
ea9759d8023c9f6f269fbd0875561783
-
SHA1
1c4c718294647cb7df8dae914100394f2668715a
-
SHA256
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f
-
SHA512
2be12260b22224132c27f60c8943303c89210d58b22acc5efce03fb379d912254493df9eee97a7d1777faf7bf5702537331373711690d9621e642cf698140e81
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exetaskhost.exedescription ioc process File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Links\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Searches\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Maintenance\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Start Menu\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Start Menu\Programs\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Desktop\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\Sample Music\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\Sample Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Startup\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Accessibility\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\Sample Videos\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Videos\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links for United States\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Desktop\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Videos\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Administrative Tools\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Start Menu\Programs\Accessories\System Tools\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe File opened for modification C:\Documents and Settings\All Users\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Documents\My Pictures\Sample Pictures\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exetaskhost.exepid process 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1124 taskhost.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1124 taskhost.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe 1124 taskhost.exe 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exetaskhost.exedescription pid process Token: SeDebugPrivilege 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe Token: SeBackupPrivilege 1124 taskhost.exe Token: SeBackupPrivilege 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exenet.exenet.exenet.exetaskhost.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1660 wrote to memory of 1124 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe taskhost.exe PID 1660 wrote to memory of 2044 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 2044 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 2044 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 1180 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe Dwm.exe PID 1660 wrote to memory of 1628 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 1628 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 1628 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 980 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 980 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 980 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 2044 wrote to memory of 1104 2044 net.exe net1.exe PID 2044 wrote to memory of 1104 2044 net.exe net1.exe PID 2044 wrote to memory of 1104 2044 net.exe net1.exe PID 1628 wrote to memory of 1516 1628 net.exe net1.exe PID 1628 wrote to memory of 1516 1628 net.exe net1.exe PID 1628 wrote to memory of 1516 1628 net.exe net1.exe PID 980 wrote to memory of 1532 980 net.exe net1.exe PID 980 wrote to memory of 1532 980 net.exe net1.exe PID 980 wrote to memory of 1532 980 net.exe net1.exe PID 1124 wrote to memory of 1140 1124 taskhost.exe net.exe PID 1124 wrote to memory of 1140 1124 taskhost.exe net.exe PID 1124 wrote to memory of 1140 1124 taskhost.exe net.exe PID 1140 wrote to memory of 1264 1140 net.exe net1.exe PID 1140 wrote to memory of 1264 1140 net.exe net1.exe PID 1140 wrote to memory of 1264 1140 net.exe net1.exe PID 1124 wrote to memory of 1780 1124 taskhost.exe net.exe PID 1124 wrote to memory of 1780 1124 taskhost.exe net.exe PID 1124 wrote to memory of 1780 1124 taskhost.exe net.exe PID 1780 wrote to memory of 1608 1780 net.exe net1.exe PID 1780 wrote to memory of 1608 1780 net.exe net1.exe PID 1780 wrote to memory of 1608 1780 net.exe net1.exe PID 1660 wrote to memory of 568 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 568 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 568 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 568 wrote to memory of 2040 568 net.exe net1.exe PID 568 wrote to memory of 2040 568 net.exe net1.exe PID 568 wrote to memory of 2040 568 net.exe net1.exe PID 1660 wrote to memory of 6152 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 6152 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 6152 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 6152 wrote to memory of 6344 6152 net.exe net1.exe PID 6152 wrote to memory of 6344 6152 net.exe net1.exe PID 6152 wrote to memory of 6344 6152 net.exe net1.exe PID 1124 wrote to memory of 6636 1124 taskhost.exe net.exe PID 1124 wrote to memory of 6636 1124 taskhost.exe net.exe PID 1124 wrote to memory of 6636 1124 taskhost.exe net.exe PID 6636 wrote to memory of 6660 6636 net.exe net1.exe PID 6636 wrote to memory of 6660 6636 net.exe net1.exe PID 6636 wrote to memory of 6660 6636 net.exe net1.exe PID 1660 wrote to memory of 9580 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 9580 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 9580 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 9580 wrote to memory of 9604 9580 net.exe net1.exe PID 9580 wrote to memory of 9604 9580 net.exe net1.exe PID 9580 wrote to memory of 9604 9580 net.exe net1.exe PID 1660 wrote to memory of 16952 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 16952 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 1660 wrote to memory of 16952 1660 0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe net.exe PID 16952 wrote to memory of 16976 16952 net.exe net1.exe PID 16952 wrote to memory of 16976 16952 net.exe net1.exe PID 16952 wrote to memory of 16976 16952 net.exe net1.exe PID 1124 wrote to memory of 17000 1124 taskhost.exe net.exe PID 1124 wrote to memory of 17000 1124 taskhost.exe net.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1264
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1608
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:6636 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:6660
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17024
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe"C:\Users\Admin\AppData\Local\Temp\0cb5ed3a60aee458e7a5630efb81c85af025938f0469e62772675a2aafc1c27f.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "spooler" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "spooler" /y3⤵PID:1104
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1516
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1532
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:2040
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:6152 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:6344
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:9580 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:9604
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:16952 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16976
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:17288
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17312
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:1216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1ecb7c74dbf04129fad3215d8593eb9c
SHA1ab9a736480b84052248e3d77fe8366771f886bca
SHA2568bb921a52c0c1a72bbaef2fcf1be60d1a0866200281e13eb243728a3ebe5aa2d
SHA5125f12adbd14b8e4e69a25a1e76f72d3f558db4d49526ef8d505015a888166b510a8f124324ff12f6a694035ca5712d951934cfeb1b687084004f3d80f6609bb8d
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
6841d1cf3109cdeefacef980f75b68ed
SHA158bc5881e04fc1b5265804ad97de149105160230
SHA256f593b6a50dbe577a9c9ba65d8a47dc46edd08a5eb5fa89dbaad362d202cf8c3d
SHA512578244cbca0c1ea94caa5642e395dcc204e19f7b736bb7d4b251dd23aba6eab1e06d770d8840c3fd9e62f17f62e1496e9ae782a55cc3993843ffba43a32441a5
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\wscRGB.icc
MD543240b61f6f3c6f47858e1ff2a5ba04c
SHA13eba62ab672a522f00aee62044c14af503da0bf2
SHA256ee0b18cc789ad093839a25d56adcf667991305529c636095546d735c80b25308
SHA512a6b57d6eaad81ec275a8639eb638f70745de12fdbf2027262b204b904d0c604c97dc1b1890e2949f6a08f63c329a6176b99d9ee2be92faf0267ad8724ae43a4a
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\wsRGB.icc
MD5329e2f6dc707cfa12c6c778ca5c6d810
SHA18d5678eb8d14d7bddc890c95a41fd1ff0a038225
SHA256c3c120ad2111b0bebe93cbd39e8e20e560ec6b5dbaf5cc37b91a06855ac6efe6
SHA51273c7ca712e28b199f010fcf7bfb67707ff1522976f847ef2c34920fa21d2f8b4ee458b55fd9dfd96e818d0e39194a3c568134f85f95c627ac83df972d263faa0
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini
MD572b6c81ced2e3246345a49f79c4124ce
SHA11a726c52d3b72dec513cec79015872ef79e0ab95
SHA256b13af2a5029c8614390f6f569de3ce2a882bab38c7314bd514e5c61237341e20
SHA5126a34df8e56680aeb7807e6b0c5b92bfe003b890f2b7153ce309fbcd5be283b1e394f2ea2f69f6b3a8188b3d61abf0480e3e9a8dc3dcc226cf0b7fdc4699f39bd
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.db
MD54a18dce12229ceb9c49d6b84042cd9da
SHA1455ea3bbf4da725a66c5a40f73f9423a12feb9ee
SHA256200f8170dd78cd9b857f2e315ffc0254e025265b9d72cade70c00bae0d4a0b8a
SHA51206841865027103258d9df89c03a8256352354ad59672e64e0d1cd5ae1476437e39988b4342c5e02530e8b1777e0bf5ff9b8438b478d0253d9b8fd7bbbdd156df
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00000.log
MD5052496932cc2f92c99bdae587c8ff21d
SHA1949f06de337748b1fd4c419d17a5e10554fff6b2
SHA2560adbc0bae17e556f9348ead20e216d8cf0a93ba848db9e00734d90434ca66103
SHA5128095ebc9fe845251eeb1efedb2254f495e12a07b6038d3c2669bcb71e81d5d4b66d86123a5ced2be27ebc5a6540692cac095aa113c6c4d74efde7c833ab72c91
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00001.log
MD50eb9c880064416ad16ac3cd58df041b3
SHA1987cb923170b45250ba37e768f4181a03c7310ea
SHA256de41e2ea2ccf422aae003595ec6012741528564c9733c3b967613a120836e0e6
SHA5121b05346e8b54e42656a9f363ca929d9de381d7359202b82485cdefc95d248942aeef9e71909430df2ed6716258bfcde19113721bb58ec10d64ec487ec4d5004d
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Admin.bmp
MD5e679ab6d192ee96f691518bda30d9d28
SHA1cfe8880551d668c11fbf563ddb731712ba6109eb
SHA25688d004594623b861b606314a569d94359cab7c6d879d0f90aed9d8a07870600c
SHA512849cf03674524a02bd68b6266eb84082c1029d9d0339c196bd2a1feaa71baf2f89cff651cbb8462b2c78cd5fb73ee19d0f69cc045e06955d66f41f0eebd49e31
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGIFCB7.tmp
MD5ec71b010755bd3617a2c755887b2b585
SHA111cccca4fefbf92bdf263af0ecfa3998ea1fcdad
SHA256abaa3e2cf9800f281a82c9bf4bab8aec6be12b8453ce00f1d3839b5c3e369d4c
SHA51202daf98c8f0b6804cb41f366ef3c88d8e62cc8204f14bda929faf05266ec349a8bf55e16da37b8ce0edc0ec0ecc214f3ede2e14ac7fc39c4744acf065133a2d4
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGIFCB7.tmp-tmp
MD5004104235c9bd413e2735306db0d4025
SHA15d7ce29b99aab6687b5ce7e6535d52ad65676f20
SHA256c63b1f3e8935737c27612c0213883336d10c630c242053caad21f9508607f052
SHA51240bc17f2f1720f3e50ca64fe75488e19e62958f809b57dd3f2d234c8e7899597ca80705907051a1491bd8683ce0e8034201eb6858db26e2727c5e00bdbd14d9f
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_SetupUtility.txt
MD5251d34df4a677610d1a67c6b588a2c71
SHA12ab1826c971e65d22417bc2bf15d602ffdd2d529
SHA2563da9d2d383800b8ce5a68d32142d055647e7745ead9828557967b51684444cec
SHA5127b73484f13b73eac3c29af0a0c4aa79475ffc76cdfda92ef1498f85ced83be8b1715e4aa1c0edbe8f9559bcf81aa542b99a6e4581d9c69d42e229518a433f408
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI1E30.txt
MD5375def6a7b40997e1e2bdeb32336d004
SHA145c5ac03a21f85dc4e1096d291747cfb30cecef9
SHA25626dfbdd7400e12121d35805189e0667b96e8fc8668ae63bdb04c85af58e3d9f3
SHA512d28e94f12d41ae708e26ea96ddab8219cad6a0db089416c7335f625b8afc6cd6ef2bb702d83fd88a56c87ca69bf927e630df8f4e1eabcb2e33a3897f76748f17
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\java_install.log
MD58269b7a6d06c0d993f02c939c59a8ea2
SHA195cdfa4fe18920b0ccca87fcc8ab84552766d6a3
SHA25625f6f6ce7f43ed6bf9fb642f36b6dcf91ddf3651b5e0977093cfd09e4b4a5905
SHA5126604bc04443bce234cc9088113779bc7f10b938d68fe05eb464df671b611dc5728b6aee19c61323744c77436a4a835a7c8364f05c3cec95dbd79ceddeedbf090
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\java_install_reg.log
MD5fade05be88bbde6c7ba2790e434a3b7e
SHA1d5beda8a460f3b81ffc2835534c81b6946bbf7dd
SHA2568ca9c29dd44c889683d5a56ad19e31a2130578d37a0818a1dcaacd7bfb0a47e6
SHA512d788fba04c0a2ebe458cb1211a8c3820d1dd4b129cdd25f686008ad17b8a71eff819568990ecaac5e5e3bcd8ffe49e3406200f168e59d103233ded413f5b9aa0
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\jusched.log
MD5666e148a3863279005055f46c2611724
SHA128b26b8a0403558813bfe551c9c6ceaf19d29e6d
SHA256e00b22445a7169da50ad8ae69a31cfd4cd985462cf3c4ce115186134c65ec64e
SHA5127a2912d3b7c996e614630a201c30eb3f091b554443887ac70740d56231e86c149473d39ab0ff75a23772da8f09dacb46ee600df98a2fd1b744a39ef6302df5b6
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini.RYK
MD575da016f4431db61c01eda2e0cebfb25
SHA10fedfca3418770ceddaf3943b24c2c4d3b6366c9
SHA2569bc655e0a2dfbf03e83640fa876e969e661dbe86062174caab281d3e7dc7a612
SHA51280a770c45a90ccbc65f5b7e8fd9b64bddadbf3334c92272d7e442ad16f11fe0c15124b7b554eda48b0698901a9b32d8c3881e11ad8fbd6b16c26eeac82ddc550
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini
MD545fe58d181ee4e388a1d7c1c2b7802cd
SHA15fa08d28221a7362f78238dca5b6ab66f0cc3c78
SHA256e42f97ef4ea36da015b77ec3ff4579c1c3f4929983bebfd8c329c6dd5120140c
SHA5126b8c4b4e0380d4b811f95c1b9f358dafb315dffa4391586a5693f6a0ff5247b3a8ce9705c38db31355dd9dc14ed2083aa72461f67e3fb18d4342db3d2d99bc09
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini
MD5fc4af3f93c0b7a1d62d553634fa70070
SHA10d220383ba7422bb6d474bf42a2978b15b43c1ac
SHA2560ab1e14d286b42eb24ee180b78fdc00dd32a6ba06e890fc16a6f1c326637f209
SHA512114dcd830eb64ce45b4e486fcbd0bf1fc0b744bf5b8bc6bd0b0a7a4c59e1d1b4e6f29a58d6457bfc973b9aa607fe38f87cdefdf3d86687040f8279cdbd32d915
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini
MD57ebbce2563fd352eae2d64bf58b6c50d
SHA1776c7066c985158eab0d9c965bf87dfb7e2177b5
SHA2564a97a2d9d39094cf6c5afc94b1666ef6350eef29e50af3083b9d26f9f8fc472c
SHA5120ce130cdf20dd780cb190031cad7d5bfe85e0425e78dc4dc5f2247fdfe3735e00cb678149238a0df0a170ca2db02b58d199a0fddc1a5efa5b046bf5143dd284c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini
MD55d62d5a3f69d739c0505f1291f619094
SHA188bef3098688f8072950adddb2b08b09f1a5bd5c
SHA256804fceecf65aefc4f73029bf33f0baca27059b7d45dbbe810a2f3a95416c2bb0
SHA5123c912b5ec672b852c4faf0fd9aa6391c3ef3574789910633529cea2eca215a43e9d49f25e9db275acc91358e1f287e44c161b16197f75c07b86b524a261360cc
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini.RYK
MD5019e716f991aed2f370d3274091e760e
SHA18b2813a5f5549169c0beee6f383e1c5ff00716e7
SHA2564670d8d98c40140fba1a0d836e273c5133d612fc7961343689f15e54c884c17b
SHA5120157202ba831a835b5b8aab14a2a78fd779715caef47f7fc65a56c93d185ec9ecfca3fe57ccb24acbdaceedc59a2885edf362c2dedd392376de3fe32e831f64a
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\FeedsStore.feedsdb-ms.RYK
MD5cb20bb1630f8e9feb79ac42892dd4dca
SHA133c300ac4b198f628b029b617094b119f98c5dc9
SHA256633588a34e7ea5ea041e98f486156c47aa29e39e9d41482b98345c73c851ae7b
SHA51251c44bc694af7222aca305414a941a5597e220079fa37af8fc2d9a2f86c732c89f7948c4dd82ed9a7172d96ca2190c64c4424e11a3139c6535ff1183d2f09633
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\LocalMLS_3.wmdb
MD51e8b54f06a27f130e27aab411e8cb185
SHA1746daa41f2046f59fdf8769bf51fa581cedea98c
SHA2566b22810696f983153f44f24f4d98ca6f37837f5c406b175a0c5c76c5a73ec4bd
SHA5122e20b2a1337ddea092bd6d4b0569f50c42aeffb14f04143432b809082e63338ae707929bcef4fcdf9fcbdab442fe7cd1d8081a64e8ae12a3a3975b1c59172bce
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\User\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PlayReady\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.htm
MD53852b8b54f3bc09f8323229bf3b6c0d7
SHA1f89815f3c75d98245f5067aea13d8c59fcad8ff3
SHA2568d1f8202d6c58df3b969ccf7819cc711d9fb0f830fae1e9857b3ffc48e5d10e2
SHA512b14ab7676dd4f6130ff8e5692873b17b3a5d527b3fab7abafefbd824ea0852d4202dafa4d62738030fe8d02c2e380c00d3f83781842258e6415565855bae5d77
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Tiki.gif
MD5cb58b0b050ae53de307f66b6b1f5da4f
SHA122db52ac599214afdb9f6e967ff58cca346d4cfd
SHA256014bd1d85ce447d0ee1f7177a91882d169a14b11c61c3a734afbb35a20edee86
SHA512a953bc198b38f7e2d7f27e602fbc702656b9bbb0332c32ba136de95ff12d859c39125ed8789144ac2d7f113c11b74ea1d6b9a77d74581a505e9ddcf47e35f974
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.chk
MD58842bc179fb854932614790be378a7b3
SHA1e0f59672f1dbfadde1a53a97ecaa1049047b408b
SHA256df504c08df53443eb33f64c04f43b00c20c012d9d64c5272eb7ed49d625f8dd7
SHA512480de7013a9b5d3d9f416f728f224802fd6cc8de9d86f7adffa56f929cab6089695d89db08076f86955f3ddf32dc08a50d0030cbe29d084ee2b2ea43e17821cf
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.log
MD522910a01b0e346324ab11b5abe65ca65
SHA1dfac387095381a154ac3f10314603484ee06dc34
SHA256101fcfe40b53ea2fe48a72c0c99ed0742054503172cb6e8061527589028cfbe5
SHA51297a7557f99a784cf7c6c4ae2b189d0a4c09849bd6a54184cf2b91cfcc028f1648f43489fb5a8363ea45e8011bd92a2346aa9ce8ffeb8f6755e08e9c9bd6692b7
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edbres00002.jrs
MD585df390b31b6c1e9b3de9b98294e583e
SHA186a6a369d95f9746684d525196e30b19630b251f
SHA2569c9de4ab6c7f2a35fca1635aabd4a78ff3b073c36fa4f35b4ac67af21025034d
SHA512c67762265a1d8f0bbca65b6b98cf863c4cd98c123d1f016ec71898147e35ce6871c77a66bece95b229b0cd0f4fa92d2a9eff22ee78d5d34a0959b0398e2fbae9
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\oeold.xml
MD52eb3225f5583a3d628f998330023aa98
SHA1b94e76747485234f5f544c6be490f67e185e4fe4
SHA2563f919348aeecc4f514e58a46e334c0612e967d90c9a6a5d8e50488424c29aa5b
SHA512bef0818b04b3acd4bf95160c129dbb691e2f4676447b1a4f1e2a957addd7c8a8904f65ba509b07f7d203daf8bcb8856afc894e92183ebdcf6da0ce92627589de
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\Burn\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Explorer\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Ringtones\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\RyukReadMe.txt
MD509dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462a
MD593a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
MD5
09dded3ea32b10a4b4a5c9a198fa6a42
SHA1d94c61cbfb148d4bead68745a73a42f5c9c277c8
SHA25643955f4614a6c78bc4c6ce715f38f90dbb411b2a0dea4b96ac8acb430e002587
SHA5123170889a4f84d62c762a2e98d3b2228cf4fe0bad0b612af555c3e90b811267079fcab38ee36ba0a4d3ef2bc0bf7fee3204241ac3a54285425c324743d2d44c8c