Analysis
-
max time kernel
168s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220112 -
submitted
20-02-2022 05:14
Static task
static1
Behavioral task
behavioral1
Sample
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
Resource
win10v2004-en-20220112
General
-
Target
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
-
Size
203KB
-
MD5
8431a207fab74137df795fb46732544c
-
SHA1
abb80c03d3aa69ac38f62a447636b0fc1bf21d45
-
SHA256
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
-
SHA512
98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
ryuk
Extracted
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.html
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Executes dropped EXE 1 IoCs
Processes:
SjvaCxf.exepid process 3620 SjvaCxf.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exeSjvaCxf.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe Key value queried \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\Control Panel\International\Geo\Nation SjvaCxf.exe -
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
reg.exereg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Users\\Admin\\AppData\\Local\\Temp\\SjvaCxf.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchos = "C:\\Windows\\system32\\sihost.exe" reg.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5552 2700 WerFault.exe DllHost.exe -
Modifies registry class 10 IoCs
Processes:
RuntimeBroker.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- = 999f4d3e2426d801 RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- = "Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy" RuntimeBroker.exe Set value (data) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- = 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 RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System RuntimeBroker.exe Key created \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- = "8324" RuntimeBroker.exe Set value (str) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- = "\\\\?\\Volume{018D5B2B-0000-0000-0000-D01200000000}\\Users\\Admin\\AppData\\Local\\Packages\\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\\LocalState\\StagedAssets\\1964ab63ff8313280b54753a0b30f12b588d56dd122e3b7352077f3184fa661e" RuntimeBroker.exe Set value (int) \REGISTRY\USER\S-1-5-21-790714498-1549421491-1643397139-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\SystemAppData\Microsoft.Windows.ContentDeliveryManager_cw5n1h2txyewy\PersistedStorageItemTable\System\12282a43-b513-45de- = "0" RuntimeBroker.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exeSjvaCxf.exesihost.exepid process 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3620 SjvaCxf.exe 3620 SjvaCxf.exe 2200 sihost.exe 2200 sihost.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3620 SjvaCxf.exe 3620 SjvaCxf.exe 2200 sihost.exe 2200 sihost.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exeSjvaCxf.exesihost.exeStartMenuExperienceHost.exeBackgroundTransferHost.exebackgroundTaskHost.exedescription pid process Token: SeDebugPrivilege 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe Token: SeBackupPrivilege 3620 SjvaCxf.exe Token: SeBackupPrivilege 2200 sihost.exe Token: SeBackupPrivilege 2888 StartMenuExperienceHost.exe Token: SeBackupPrivilege 1376 BackgroundTransferHost.exe Token: SeBackupPrivilege 3376 backgroundTaskHost.exe Token: SeBackupPrivilege 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe -
Suspicious use of WriteProcessMemory 62 IoCs
Processes:
80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exesihost.execmd.execmd.exeSjvaCxf.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exeDllHost.execmd.exedescription pid process target process PID 3148 wrote to memory of 3620 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe SjvaCxf.exe PID 3148 wrote to memory of 3620 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe SjvaCxf.exe PID 3148 wrote to memory of 2200 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe sihost.exe PID 3148 wrote to memory of 2224 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe svchost.exe PID 3148 wrote to memory of 2264 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe taskhostw.exe PID 3148 wrote to memory of 2520 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe svchost.exe PID 3148 wrote to memory of 2700 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe DllHost.exe PID 3148 wrote to memory of 2888 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe StartMenuExperienceHost.exe PID 3148 wrote to memory of 2952 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe RuntimeBroker.exe PID 3148 wrote to memory of 3032 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe SearchApp.exe PID 3148 wrote to memory of 2640 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe RuntimeBroker.exe PID 3148 wrote to memory of 3344 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe RuntimeBroker.exe PID 3148 wrote to memory of 1712 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe RuntimeBroker.exe PID 3148 wrote to memory of 1376 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe BackgroundTransferHost.exe PID 3148 wrote to memory of 3156 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe backgroundTaskHost.exe PID 3148 wrote to memory of 3376 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe backgroundTaskHost.exe PID 2200 wrote to memory of 3196 2200 sihost.exe cmd.exe PID 2200 wrote to memory of 3196 2200 sihost.exe cmd.exe PID 3196 wrote to memory of 2884 3196 cmd.exe reg.exe PID 3196 wrote to memory of 2884 3196 cmd.exe reg.exe PID 3148 wrote to memory of 3868 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe cmd.exe PID 3148 wrote to memory of 3868 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe cmd.exe PID 3868 wrote to memory of 4324 3868 cmd.exe reg.exe PID 3868 wrote to memory of 4324 3868 cmd.exe reg.exe PID 3148 wrote to memory of 4728 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3148 wrote to memory of 4728 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3620 wrote to memory of 4744 3620 SjvaCxf.exe net.exe PID 3620 wrote to memory of 4744 3620 SjvaCxf.exe net.exe PID 2200 wrote to memory of 4948 2200 sihost.exe net.exe PID 2200 wrote to memory of 4948 2200 sihost.exe net.exe PID 3148 wrote to memory of 4940 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3148 wrote to memory of 4940 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3148 wrote to memory of 4956 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3148 wrote to memory of 4956 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3620 wrote to memory of 4976 3620 SjvaCxf.exe net.exe PID 3620 wrote to memory of 4976 3620 SjvaCxf.exe net.exe PID 2200 wrote to memory of 4984 2200 sihost.exe net.exe PID 2200 wrote to memory of 4984 2200 sihost.exe net.exe PID 3148 wrote to memory of 5192 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 3148 wrote to memory of 5192 3148 80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe net.exe PID 4744 wrote to memory of 5388 4744 net.exe net1.exe PID 4744 wrote to memory of 5388 4744 net.exe net1.exe PID 4948 wrote to memory of 5396 4948 net.exe net1.exe PID 4948 wrote to memory of 5396 4948 net.exe net1.exe PID 4984 wrote to memory of 5404 4984 net.exe net1.exe PID 4984 wrote to memory of 5404 4984 net.exe net1.exe PID 4956 wrote to memory of 5412 4956 net.exe net1.exe PID 4956 wrote to memory of 5412 4956 net.exe net1.exe PID 4940 wrote to memory of 5420 4940 net.exe net1.exe PID 4940 wrote to memory of 5420 4940 net.exe net1.exe PID 5192 wrote to memory of 5428 5192 net.exe net1.exe PID 5192 wrote to memory of 5428 5192 net.exe net1.exe PID 4728 wrote to memory of 5444 4728 net.exe net1.exe PID 4728 wrote to memory of 5444 4728 net.exe net1.exe PID 4976 wrote to memory of 5456 4976 net.exe net1.exe PID 4976 wrote to memory of 5456 4976 net.exe net1.exe PID 2700 wrote to memory of 5552 2700 DllHost.exe WerFault.exe PID 2700 wrote to memory of 5552 2700 DllHost.exe WerFault.exe PID 3620 wrote to memory of 5904 3620 SjvaCxf.exe cmd.exe PID 3620 wrote to memory of 5904 3620 SjvaCxf.exe cmd.exe PID 5904 wrote to memory of 5956 5904 cmd.exe reg.exe PID 5904 wrote to memory of 5956 5904 cmd.exe reg.exe
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
- Modifies registry class
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2700 -s 10082⤵
- Program crash
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup1⤵
-
C:\Windows\system32\sihost.exesihost.exe1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Windows\system32\sihost.exe" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Windows\system32\sihost.exe" /f3⤵
- Adds Run key to start application
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe"C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe"C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe" 8 LAN2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y4⤵
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y4⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe" /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe" /f4⤵
- Adds Run key to start application
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" /f2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" /f3⤵
- Adds Run key to start application
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 440 -p 3376 -ip 33761⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 488 -p 1376 -ip 13761⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 2700 -ip 27001⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 572 -p 2888 -ip 28881⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp.RYKMD5
19eca2be09836b4efdb725b0ff707efd
SHA1237a89f64124df2b413a5ff0d6edbe7500c77ab3
SHA256ac0cd0958eb07be9e807d7b09a5c6af52b9d1a5e37890358b4e836b95163e5ca
SHA512178676bbcf494008345970e4203ae7965519026071ebd8b8801435ef61f48793196dc2eb0e62f4055ce7ee8db56f3afc071db2fbf7c50e164f6a56f9f3aabbcc
-
C:\Documents and Settings\Admin\.oracle_jre_usage\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\3D Objects\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.RYKMD5
4bd79b6ed47dfb8769bd62f1ad848935
SHA10fc1399b6f53722afe0fdb86a1a17229b79c3de3
SHA256733028e9cd26f613fd5e48cabc4482f195fddd4d664c428170b5603b783115bb
SHA512252c8432d4179d56f957b1f5d0fb857af500d7739c89b93d57735ca797d79e402979ca3aee4b11a2ba4a317af49c7f36e8668c094ffc90416eb3bb41e4eb81bf
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\UserCache.bin.RYKMD5
10cf4c89750fe37efa82f5557caa73da
SHA16ac7e9665e74fbea62cbff42a1570f9e8fd074b4
SHA256e4381ec45beedab4458576fb39d724c535b6d204b6f34a0ba34428e85b5eea7d
SHA512a8434895041bf5ea14a660b793fe5d9105819188f1a7f452c410a392d7d40d8c907d834513d30b819be0bf4a60be4e514cf099685340fd2db010fc0026452a58
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\ACECache11.lst.RYKMD5
c20eac683a455fbb640bcf6da1927747
SHA1d6a58cbe9787ad6e3139ca486bd1c8425e369c55
SHA256ab8d222e562e85118c1873ee4e3cac4aaecdc1435d24db2b700ce313a1061ee1
SHA512c6b3c77042a146ee27516193db9982634e6a4978f7a986dd6d82a41050a433eaaac02ac402f73752489429b2c4f17bc93c83835cb79b5fda9e35a0701dfd48a5
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wsRGB.icc.RYKMD5
ca8158f7979285cf88d3fde31829e7c2
SHA1d4e588fd649cb62e3dd81e1b4e0c26e6aef2e794
SHA25672f35a1df463887442208496dd3ce6df5691f919a9a0b4a8759628f67fa0bd19
SHA5124ffb1528a6c228c130bca470c1278252e65ff261eb849987cd0fd3e0f8199cb4bff1be8876414eae45858fcbcedc61271ed34fa759f7641af2ee7cd6ff2b6110
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.icc.RYKMD5
a42fc9a77e18f516d3826933139c78e7
SHA1a2d75c8424f4c1fff3cfcf2d7c751451d98414e0
SHA2563bd4a467b59f07be10bc4509d385c8771855fe6b5bb981a5d2ea7c8e59ebd41e
SHA512f40b618db903d3d4a8bcc98e5c26a6921cff44eca51a041ef344ca24056f6d4430edb8a7b870d7d9dbb9b070973ccc432d607eaa6d4ef833bde384f4ba3e7a77
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jcpMD5
5aeeeab8d93245fd68cb104be7476cdc
SHA12dec5a828afdaa631f33bf2a1f82022ce84c14c7
SHA256e2d84c6cafefca44c79c0716e1e3a3d7992653be0c1813a3f4fdd995fa721a28
SHA512d439137ca4bbffaec08315d9d6e3894f487d33ec684c29f59b4c30f2bc0accd33887b71fd664f160db78942cadca7baaba2ede7caf507db93a7486bb304c8f77
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jtxMD5
2a23f69282c8984018d89e96a284d98d
SHA130864c46581508e22701c6f2642296d70d5007b7
SHA256d7c2bcdd43df205a2aa10da617edbd5db0373680a66f1e7bc8d165e0c3f3421b
SHA512e315ff8d049bdb63bb8da3615902c9b3729eeda0284be0f9b022275759951ec6506d46d2391501ffec4b9e67d312130a44e14cf81b9b6f5c1106b7eecd3eabd7
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.jfmMD5
8ddf63fa08d2f60e4fd1a31c5cfc7405
SHA144f17ff1ad5c2316c25fe754273c84b628ef873d
SHA256d0547a7544a13d49cf81db13623eaa1f11c05c89c96bdf8644d2f4697039fc68
SHA51206c8b49cd110843faba7b57cf74611735804f38c945696220a07e2a7b748b42118d07292ad75458551f5ee08fd7b5397e58cd0e24175ff0ac58df18a15b20650
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.volMD5
ca53c7f1b4844801fd589d05ddb8cca0
SHA165bc2e5f8ac7ce9675b4c53095cbcd3618000ee1
SHA256005e079cd9bbc173d735509cc9e7fb85bdf7c367dee0e50046aeffbea3bff7dc
SHA512dcf0aece6a72df3805a80da47c2e9f07de13ca605ed750fd49151cc6a44aa3488c1a34e7b14e72d04e75b0f754da0e499c382ad3b46af61f4fb06df3c93788dc
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.volMD5
d361070f76e8a7398c0a8e600eae7857
SHA16cd28fdf70d4b91f594569fbdf8c2961569b1303
SHA256816fe71a374f01825d5a291cc19e04df54d569db3d5af9daa511112f6deada7d
SHA512ab64929377606afbd329a4ac35d4d1af7871efd44c89dc11eb7736a0fbc522a57cb9a85dd0118d9e6839ee2b32cbc0c67480cb7f87e780ce421d60b1b5d04dfb
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.db.RYKMD5
d4bb46b4280f29b4c8932d9a561227c1
SHA13de6f779fdf008fac0b2a438e2cbf46bf8d4f60f
SHA256186d5e3b40aec29762bdabea54d0cac2a3bd864a0032708638233dba4a12961e
SHA512af3a14f1029138d8d089b23b6851869128d9e570cd164e0e31372cd3489c418c2bbab9d824cc21ad294312348475e23a3f8e9012bec6e9715937bfebbdd2a2a8
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\AdobeSFX.logMD5
f453819b7b7c64df5eeff59905314e9c
SHA1d5459dafb1650c52c92f5dc371909b55d14819b7
SHA256de737f1dc5ef9364540192f797d43c879bcf8d3e602767fc9ca78bd2f673ab3d
SHA51295b6cb712bea670193a2e30e59021b32caa446cf884d9e8b654c85d6b905d438484abd3867eb9fb75af3401e4a0b42f74f71c89a07eac719754f8d8657e03338
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\JavaDeployReg.logMD5
01a4f1fd1f2a820f5720169371e81c2b
SHA161443373b91b89a1ba1aa89e1a58c731b35c4398
SHA2566f7b4ecc5a11c60fbec9dee46757b52140407125fe425407e2595d33da67b3b2
SHA512a0bc9b6cfa5a84a8e2c22d77f1ed19f77e0b33ad6bcc897645cf0ad4db4c7f0b6626e2ccb6f1e6f513c82372fe407caf75eb063cf1467c683ba6a92c739f5d18
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\aria-debug-2324.logMD5
945bbad3712901f55c3f726ad38d9a68
SHA10f3494a530dabb3a288795354feceaef3d4c632d
SHA256d41cbcb891743b742f5e134347e8fd96b8b4e3c8f1866b6afa8dbc0de54f465e
SHA5120448cbfc0e4eb058462e65d6b0be50c5f43bf65976d939c6fdbe61c5dc6a74090b9192e61820e6ae2abaef827f9ada30d1d22ceda122219c054b0987670964eb
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.logMD5
784f11c4ba607806f24449cfc1a11b08
SHA1410365d1e8d584ab19c10f8a1ab0ac834fe8c2c2
SHA256eb454b463bd59458183a8b015b62e748bdb220be8ab6e8048eef5009fd8253a4
SHA5124d882cf40620589e303e7662109ca82369efc4e9dc0029c8b53d1334deb8ef7305eeeae519ba275b460598376dc453eb635acee83c269194360c2980cd2250c2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46A8.txtMD5
bcff6c7315ed06eb1a9853a694b7ee57
SHA11eb196912a2a020313ed6921f1e67a0559e43e48
SHA25617f1c25a575a42063536e220350c1770c6c1ebb4756c1952129b1a649a1a420a
SHA512e6258cb0c85ffe4e637927bda0cebcfb25390502d310c8a8367c7372ef2d3f9a5d6755197eb7176c41373ae2589370dc8086113feda39085b11fec30bce5e209
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46E0.txtMD5
b2aaf8e3811b66e1932daac35eaf6dc4
SHA1cc7f9de401dfd3335c36cb65460e83a634333431
SHA256f3685d893c3454ab2fb77c6d95440f638e9789c31357dbc040aedc215696d399
SHA512d5bbab8b96698ee2b11c5fdc3794af0b13033acd6752b22a0e8ff3482245fbef4a942b8d2d7c7207e9b97034dc7b8efdc4c5be0efc10e14f98db212efea4bc0b
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\jusched.logMD5
ab583a8f5282ac4d535632641a5c8da6
SHA122507edd43b193886897c9abba6d3fa519eeea8d
SHA256184cc9925aa80a9fee59b1613915354ffd8fa38f1055a96e6871bae18b83e293
SHA512f4f12f9d55cb029c8d7564662d1ad82e62d111c276c640d93698f7782aa400a0ae0c121f1c70ad08ef02f50542f8af1695aa5f3cd332ab1a0a02d19f90608094
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_installer.logMD5
51fe216fc224487e146dc38c7a81cd4a
SHA10a04c4072f8d4d3d2744ad5ff3b343af1483c6c2
SHA2561e7e681a360784490a0e1df734c0d8dcab2feb36c2052c9f74d06f4cf2dd5bde
SHA512e0f13ee7dc3145a378cb85589e6baa1d233e8a1bd86da257c5811e64c2c517a15e7ebde96c77945ea328d0a5c874d54add93287e9b864855aee637d9aeb0f3c1
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\offline.session64MD5
685d0f30768a2ca5ccb60ae6f690d78e
SHA107e7487106250671eb50f6d86139a5c2001a17d6
SHA25659521cb00d5af55f47ec859f72ed5d3b541991a500ef889cdbd0459f705ccf47
SHA51237491096a00d1d8ac1e05c67ff5bdb8fb11c3ee761c9e1de22f875ab32c9497fdb0812462204446d5f8224f80611419d7713234f56736b61e5e574da141f2b2d
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\tmp3097.tmpMD5
370773f0115ab92444862ccd15ac0d37
SHA1c3b569019bbd9167d7465c419c9281015db2bd65
SHA25631a8c150003f5ed5949cb8ebd1b7206877313fc3b59aa8466a478c7644fda477
SHA512a79c8ebbd4997c5d6a041f7c14864a40c36578f32dcbc4d46689a6ab274ad94df84bac42dd51f4e9de90a245ef009fae961ec0087cfcfc8cd5534cfd91334698
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\tmp3384.tmpMD5
5924f4ba540df8d9de78295b3aabc635
SHA1e2c7d8ad188d9bfbc3fdf361084b2d7cd2c543e5
SHA2569d6881ce139ff5f8661ba340d8db50daa49a7a8793397d0f6960b440f854370d
SHA5125ce826c6784f86232b5662b1e3d7b4ebac9eeede1eabd7a964f92d67925cdf9909d735b0d207c0ca02325b98be893c26f825aebe50eda0b22cb0c1a39235aebd
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct2BC9.tmpMD5
941c6153d7fd4f5099e334e621b16c01
SHA194eba97eef327b6fd1c10884e57581270036ec6e
SHA2569a55760c732460376ba6add08a3326affdc32688aceadc3f2e796a696df9e86b
SHA51236ce9be9d5b18d74de3f96beda4be9b6039abead4e9476de4f719e970cedd0dea673b27b0beb1ad3234e3695304711d5daab5c9f797a7a330e091f101a88c2b3
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct2D5A.tmpMD5
aca60af2cc09738d013e6632dc22be5d
SHA1273bcc9f84c95f26a7a3ca7787140fb32816610c
SHA256bf8ad68b610f1718a7fcb1700bc3f100b1bc9aa4100b550eb7c68d3e20446c2d
SHA51237d808a058d0fbc2a54097437bf9993c83c6e6ae288d59d355160b30fda2e06429f8cbfc1da0602991a59f2aa79d470c977929c7362175f149fb68d60578f86a
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct530C.tmpMD5
e119bd2dae97c0e266d882b41413ddfe
SHA1b3806772fb4ce96025ebbff16dc91e20db526866
SHA2566b6911f05874994b52ad852eee9721b3e6496f3080d18c753dbffe7b057ceca1
SHA512e16f525022f274580951f54f54eb8ce89c79d5458d2493fbae208471cc53db2d62549f826e792e3585e92b2ce2f0551f544c832370bbd06a2f0264eace2f390c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wctEFCE.tmpMD5
07cee0e68d6373090fc64bc2667452ae
SHA178e13d070192446ad0376e313a079723560c3fd6
SHA2561b44769f7f20751ecf6dd4177195637c56e33a7ceb037d383d38465021058f63
SHA5126bf624361f713abdbc1580ba3d66453f3bea24dbbe0ffd964a962600507b47e5e15e7b370906e6f67197f95b63ee260ff4335c7f4ff6af3dbd0f35d706e15907
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wmsetup.logMD5
e2a3a50e124035bdd65079c363440097
SHA1c24f2c08ae04b89926e2f7da67721e7da0e28749
SHA256a1ddb99ebe9dac9de52d05357e5404a53d737a48ea3dc13370ecaf226ef40430
SHA512f7975571212a4ecdc46fdc02360894795c511ccf12d25d24f9ded3d4cc55d78df0a1c542072d523b2ac6abc63d72c2517d882f28f52f19d7c9aad8961be64fbf
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USSres00002.jrsMD5
e7dc7eda57723c7b4ee20a1d24281d6b
SHA1f061975f9cb1299aba7b133cb1db1be713240800
SHA256950c36365c938e40989d2136b910094b4d0aeb77e85212731fb5eb345c797572
SHA5127bdc0cf34ed570cfb00fa5d7b3e9c9b6a03661d02f621dd9fca3969fb496d4d981582c36b97241458ad6776b49630b9b6a94eff3d16b0dfb6f875e91edd41b1f
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USSres00002.jrsMD5
e7dc7eda57723c7b4ee20a1d24281d6b
SHA1f061975f9cb1299aba7b133cb1db1be713240800
SHA256950c36365c938e40989d2136b910094b4d0aeb77e85212731fb5eb345c797572
SHA5127bdc0cf34ed570cfb00fa5d7b3e9c9b6a03661d02f621dd9fca3969fb496d4d981582c36b97241458ad6776b49630b9b6a94eff3d16b0dfb6f875e91edd41b1f
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\temp\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0_32\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\AppData\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\Admin\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Documents and Settings\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_0d751396-3164-4736-b931-4f59d47ff1f2MD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_0d751396-3164-4736-b931-4f59d47ff1f2MD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Users\Admin\AppData\Local\Temp\RyukReadMe.htmlMD5
7aca9a85f47666aeb858d5c5c7d1ea44
SHA14e1921a90b9f972aaa4859ca3128da9de876bc8a
SHA256b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c
SHA5126ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c
-
C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exeMD5
8431a207fab74137df795fb46732544c
SHA1abb80c03d3aa69ac38f62a447636b0fc1bf21d45
SHA25680bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
SHA51298971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db
-
C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exeMD5
8431a207fab74137df795fb46732544c
SHA1abb80c03d3aa69ac38f62a447636b0fc1bf21d45
SHA25680bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05
SHA51298971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db
-
memory/2200-132-0x00007FF7741A0000-0x00007FF774236000-memory.dmpFilesize
600KB
-
memory/2224-133-0x00007FF7741A0000-0x00007FF774236000-memory.dmpFilesize
600KB
-
memory/2888-134-0x00007FF7741A0000-0x00007FF774236000-memory.dmpFilesize
600KB