Analysis
-
max time kernel
169s -
max time network
27s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
20-02-2022 06:31
Static task
static1
Behavioral task
behavioral1
Sample
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe
Resource
win10v2004-en-20220113
General
-
Target
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe
-
Size
212KB
-
MD5
3920d0157efcfbc01837be686e636a8d
-
SHA1
494414c45d655abf60b393c7c299f7647c0dbe1d
-
SHA256
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629
-
SHA512
30ad22af397df2f0d4757e9fe45a17cdee92a19ed582b93fc24250a6bb3713b8fa01d487deae5fb99b46519ffa3c007b4805a3b785d64ebd8c27d6459879eb48
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 49 IoCs
Processes:
taskhost.exe646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exedescription ioc process File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\8927RJE4\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\ZKOSACOX\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\AKOZAZUE\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temporary Internet Files\Content.IE5\DBS3QI6C\desktop.ini taskhost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini taskhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exetaskhost.exepid process 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe 1256 taskhost.exe 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe 1256 taskhost.exe 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe 1256 taskhost.exe 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exetaskhost.exedescription pid process Token: SeDebugPrivilege 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe Token: SeBackupPrivilege 1256 taskhost.exe Token: SeBackupPrivilege 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exenet.exenet.exenet.exetaskhost.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 1540 wrote to memory of 1256 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe taskhost.exe PID 1540 wrote to memory of 1360 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe Dwm.exe PID 1540 wrote to memory of 696 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 696 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 696 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1004 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1004 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1004 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 836 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 836 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 836 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 836 wrote to memory of 896 836 net.exe net1.exe PID 836 wrote to memory of 896 836 net.exe net1.exe PID 836 wrote to memory of 896 836 net.exe net1.exe PID 1004 wrote to memory of 1524 1004 net.exe net1.exe PID 1004 wrote to memory of 1524 1004 net.exe net1.exe PID 1004 wrote to memory of 1524 1004 net.exe net1.exe PID 696 wrote to memory of 1852 696 net.exe net1.exe PID 696 wrote to memory of 1852 696 net.exe net1.exe PID 696 wrote to memory of 1852 696 net.exe net1.exe PID 1256 wrote to memory of 1788 1256 taskhost.exe net.exe PID 1256 wrote to memory of 1788 1256 taskhost.exe net.exe PID 1256 wrote to memory of 1788 1256 taskhost.exe net.exe PID 1788 wrote to memory of 1964 1788 net.exe net1.exe PID 1788 wrote to memory of 1964 1788 net.exe net1.exe PID 1788 wrote to memory of 1964 1788 net.exe net1.exe PID 1256 wrote to memory of 1104 1256 taskhost.exe net.exe PID 1256 wrote to memory of 1104 1256 taskhost.exe net.exe PID 1256 wrote to memory of 1104 1256 taskhost.exe net.exe PID 1104 wrote to memory of 2040 1104 net.exe net1.exe PID 1104 wrote to memory of 2040 1104 net.exe net1.exe PID 1104 wrote to memory of 2040 1104 net.exe net1.exe PID 1256 wrote to memory of 1152 1256 taskhost.exe net.exe PID 1256 wrote to memory of 1152 1256 taskhost.exe net.exe PID 1256 wrote to memory of 1152 1256 taskhost.exe net.exe PID 1152 wrote to memory of 964 1152 net.exe net1.exe PID 1152 wrote to memory of 964 1152 net.exe net1.exe PID 1152 wrote to memory of 964 1152 net.exe net1.exe PID 1540 wrote to memory of 1780 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1780 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1780 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1780 wrote to memory of 1700 1780 net.exe net1.exe PID 1780 wrote to memory of 1700 1780 net.exe net1.exe PID 1780 wrote to memory of 1700 1780 net.exe net1.exe PID 1540 wrote to memory of 1760 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1760 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 1760 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1760 wrote to memory of 1940 1760 net.exe net1.exe PID 1760 wrote to memory of 1940 1760 net.exe net1.exe PID 1760 wrote to memory of 1940 1760 net.exe net1.exe PID 1540 wrote to memory of 4888 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 4888 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 4888 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 4888 wrote to memory of 4912 4888 net.exe net1.exe PID 4888 wrote to memory of 4912 4888 net.exe net1.exe PID 4888 wrote to memory of 4912 4888 net.exe net1.exe PID 1256 wrote to memory of 4924 1256 taskhost.exe net.exe PID 1256 wrote to memory of 4924 1256 taskhost.exe net.exe PID 1256 wrote to memory of 4924 1256 taskhost.exe net.exe PID 4924 wrote to memory of 4952 4924 net.exe net1.exe PID 4924 wrote to memory of 4952 4924 net.exe net1.exe PID 4924 wrote to memory of 4952 4924 net.exe net1.exe PID 1540 wrote to memory of 4968 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe PID 1540 wrote to memory of 4968 1540 646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe net.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1360
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "spooler" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "spooler" /y3⤵PID:1964
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:2040
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:964
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4952
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:16956
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16980
-
C:\Users\Admin\AppData\Local\Temp\646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe"C:\Users\Admin\AppData\Local\Temp\646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "spooler" /y2⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "spooler" /y3⤵PID:1852
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1524
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:896
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:1700
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:1940
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4912
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:4968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:4992
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:16908
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:16932
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵PID:16996
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:17020
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding1⤵PID:1836
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\AcroFnt09.lstMD5
fe071a5e549399e5b4309bdcf8a99cea
SHA1ed0221a057cf283d90397c0681c129252c4d8b30
SHA256ca40c24159424e44bdaeca9328821dfa39efa6ec687e3a66363902dd48512b15
SHA512cdc63fb8270d2af966baa523ad97ec2054462c4c71509f73e5ddd48f6d4296161d47df9565533809899919ea878a0d29e6e1e8d74ea64f882d65bb2e69d7fd44
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Adobe\Acrobat\9.0\Cache\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Adobe\Color\Profiles\wscRGB.iccMD5
f05a1ae799d10878f61257b9e2281773
SHA11c87927fd863be96ed3de4ae5d1c7c0688069ad0
SHA25613588d623d1ec9e5b28a96d63dc2f04af0795e3c799b79fce53129ada6ae9c54
SHA51212579be117ebde3a3a087cd85c238b344d930982e4f795512a29c37cb8ca56fa811626e768481d68528c43023f8d8e1dca6280eca7467ab37ff6f66fbe4c19b2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\ACECache10.lst.RYKMD5
86d8fc59e4fb20a26352f4c93c8c562a
SHA15d417d0f545468bb4e19f7fe58eb10e03742ac0a
SHA256dd773cce2ab1cda856e7bc14503655a256bbff5d898db7c95f22cd008d9f45b4
SHA5129d6925a6a0f289a02975350309bc3e6eeae2465419715ceddad3e210f86e5eb7f6ca43e32e01cd917921715b7cb0a358654d25b726909cc4279996ec1a866f5f
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.iniMD5
854fee44132391ff385ef2d888b44c2f
SHA1c6a0267dbb3d650dc8567f745c93a8889938d3ed
SHA25602ac436738dea4e5196c345af422e63b0af2283b83b3bb542407d85e60edcc56
SHA512b07b25f724d93be6cd39ee495adf22aca648144b9a25749b16ff7adb34da73f33ea8ef52d948468f27a2369c62da72bd5c2b466db0f171a1490fc0458e167252
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.dbMD5
69eccce685ccdc091437cc187b85ff44
SHA145af608f2cbf10c03c3130865b7facca78eceb99
SHA2561f1b29788901a74dadc7fc77479e3752e91235294c70b6a28de175f5a3bfb22b
SHA512440653d2d7924623246d81cad794ba72eb9360bbb9afa46228d117b98e1478fd0d68fba3b80101e5127f94492efb478cf3f1dbdaa92b3ff7af20f011c474b18a
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00000.logMD5
823577c7e9b82616b2c8d6a4390a6fd2
SHA1017d47adb553159967ae12769eda7f2ff4a850a9
SHA256faa7fd901e7189220975c2568a37346d34d7bb230ca62fdbaa239efb262cd388
SHA512cbc85145fe63011971f52f1ae4c7672f08d608ca3f61a6a0aec69dcf5d5a915f49fb552c1e1168793f3b4cec6f4d1c250e0618de060f5b5cd0722eb71bdbe1e9
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00001.logMD5
b5a52420ef3f2b60bc605ab81c6db6eb
SHA118c0e59a3e59f05d974eed9ce3ac825fbf669023
SHA25645a0e2cf6c2b105c8322865f78b13ea5829d80387d549941ecaf12f6c537b9e2
SHA512e439adbfe8555f2367bc7130f102c201206c9d566aa81513d8e78b279a61b842543f289aa9c3856fa8bcc0f9f2c2f0df1b3f3ad65032addaa0a268c6d99e70af
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGIFCB7.tmpMD5
208c284cb82bd029a68ff70c85746dc5
SHA13006e255d1295f592aa0560033b3b2d313c45d48
SHA256110f5f862a269b3c626f56d4478cb21380eecc43a22f349cdca67f9bef5a7dd1
SHA512ac2370d78a25e6c51923b9c6fda8724ab02bf5f8ed97f9f08e4434efe215ddeb45ec37aa92425a2bb1ee2d2b3440d430e313e0d478b0c1024ef9ddcc08ee6d1e
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGIFCB7.tmp-tmpMD5
b70398b3048577f804681de4daf83c1d
SHA13730da7f39fb0186965ee552097602cca7a1da66
SHA25614e87f90726a55a223b168f01f4ddab8b9006bfc09487c490c5f72dc2c3d691f
SHA512db79bc25a33843a61efdee9ce57573beeceec994c30ca4581f593724bc980a40b0370a84023f2ea061c6b13a4f38355b680dcb2880798f49b4444c2c250a59fb
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\WPDNSE\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.logMD5
49c2d60987fc6e746cd03cf4d9ec8082
SHA1bcf38467ddf5e6f966c92d0ee7c20dc01c7de96a
SHA2567a3c9258d8617bb9ea26cfe07f9945f946b624aa8b8f62712a10d877f7d1f5bd
SHA5124e9ccf9a80c08be1090f4acda19095613608276a10538b1e7a738f45138e0b8d7e015556755d81779cbd89098a04bb1bdb09806d749e5a293815faadbabf9ff9
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_SetupUtility.txtMD5
bba07942c789766c42d67745e109fcb5
SHA14aed1711c8a26e4752db18b0bfc96147e38f3b45
SHA25602fee08f3199b88afdb9a43c3f34f2376233e32e96c22e42e2284497ff75561e
SHA51244a8db39a36f81d6a98c637586ddef4a397b92f586e128554bbc53b3a184ae1ec47239c7be775273258495fd7a290330533494a9194f9081f4069b3794c73063
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI1E30.txtMD5
9ebab6883687ac3d805085a65cdd97e8
SHA17186f05e8873e0d46b299891d6b0a55c4da9752c
SHA256990302fdc50190cf6609e0e645c8cfbdd1650909022c77556d675aff860d13a5
SHA512eef9cc77538d92952adb46ccc4bd463b0aefbba6e1d695cd6f24e81280a41a50178a31a99cff669bb7463a6190e43adf445799c2422962e56902beff0e8b9353
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\java_install.logMD5
4a0fadc3147a7b2a23bf6852c29b64ab
SHA1bb5790457013cde7f6099d237a001f6703789259
SHA256d60966aa0713f00fbdf0f6e653cc6631f22d4d9fd183e1e00df657f5a0559bab
SHA512e9b39abb26d8ed16126c59f39d175d97dad41c4b562ab6f60adb2742af289d10ecd1ac0acd25da2f4847eb2c6df6c4dc64747b96d923e7f1cc6424b455b2a4a8
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\jusched.logMD5
be25f3c29bb7421963cb09560f8aea34
SHA1d05cdbd733779a2c7851dab5f1237e5ee31c6e7e
SHA256974425cedc6d4fac8f3568479a14e44fda548bba843e56e608c015f8582e41b2
SHA512bb000060ccb90e5b4a7225fa5ae65ad67240c644ad31864c6173f4424002337e427406ed7d834987c539a3edf7417ebf0061a2ad07db40529f405eda32573dd7
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.iniMD5
65a9baa7985e1bc24770014bc157f822
SHA1ad833537c4bb2fe18f1442e1bb5d20d49dabeece
SHA25610a744361784410ccf951e3d98fc7a9282deea8419d940d3844160b019750702
SHA5122485ce83a14ff774c0f4fcba47dca3dc94ad0c5f4b56e72aef9dceb00718f5ee54f82fa0cdaef3b829f9c1f1cce898d90b8fa29d5fab43bd469ebffd60454a17
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.iniMD5
de2358c65848035f87bb78cced7700a5
SHA13ea6357097a463b45e607b7fc6f7ce6f3c70df81
SHA256117b3c33a12e0932659541d9179eff10251035e341765cde9c92b93ba68ddf6a
SHA512d459f4716129e52539d37a18092adfdf9482a300320a5013929cf3675e5914be50d26c26bb273e30bdab048de2c80cde42db16ec35b9fd58bb10dcb17760dc7c
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.iniMD5
c9b98c92d7358c4cd7e6ab85e91d4517
SHA198760a25fffdfb2896661c4e5544fc0167390226
SHA256ad390444f687828addee20c87c709bc6808ce9cc6e97d191f5764f4598bfdc38
SHA51234092faa7da86f6525a422ea4ce5057bfd6a104c562789bc255c02fb465d49fa6b48ac0179fd2222256cfea4277665039a4c53b6cf8a5ce62797ae7f670ca214
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.iniMD5
bcc3b6f5fa6aa9842fc2c9ee03ffdfc3
SHA1a28b128b9489f1981b6a6bde97d3f04fa9af9e58
SHA256b7ec38d681c402d2e91d8050bfe34ae27f1480001ec56d3efaf383f4c3bbe1df
SHA512aa4ae65f60edb32d33305d466b224ec391ec5ec42f7cac073cdbf0935b44076291e7e11b20a053831ecdcf15209fa35b6193a3650a742f2d7b525e924193679f
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.iniMD5
48fdc4b02de1cc92a3bb6c1b8adc97d7
SHA1497a7a190122ab010f65e2cd842b0149f2a76342
SHA256b887989b1d46b035aac125787927bd69cb8da235661ea04d6e05bc04b3fc38b8
SHA5122de5f803f5b9e41921542444f274e7adf824f5de75f6c89164ece44da609be9ad8133d0794029aca4b433fb00d774a2a13aacbef05285e28b13aa9c1ef97376e
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.txtMD5
408eb355d2412c199040269a15fa7024
SHA1835769d38b9b527459d85fd0dcb870538b2a1cb2
SHA2564973403241892201f6462af5e29ef05c0ab52780cd01ebeecf56dd4f9e19e53e
SHA512deeea5cd0d30d345a15685bffbf338b9d12f82b129a4eb34d736b3128ba9f03bac0764596e8e05263bd9be8af372afdda69d1b7a1c13b946b848358ac7d32130
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\User\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PlayReady\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.htmMD5
17d0d9a2ae62249b7f3344c032542139
SHA1555ca359994454dfb202a3e19a27bf0ff5241cc8
SHA256455ad241a571fe8792c9d85470860530cbe34689e4eaa7e5d32bae47ee52ce90
SHA512eebcb4ff177391677ed06f4df6e07e4c89836a97e3febd1dc1e778c8258bf7f28b3ac652bae70d3f5ca45ea4159e69ea1bda702b1978c9e0c1e01046c6355312
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Graph.emfMD5
8a9f870624be05dea735859f99b82230
SHA1210fffde50d3d7412d7cf3d92a018c377b5adf79
SHA2569b6f46a602d5393e29993d485f7b882952bb19d5b1c77d6a362a7e998151168d
SHA512ffaaced8b4c498acfb24cef31e40843abda8f5ffedbc552421b8a95737a686632fabac0c83ffe645bff6d1cf78aff3b706fae34dc9d19a63fc4d7e0a5f560957
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Music.emfMD5
3968f74c2dfaaec6d858b533ba05fdbf
SHA14c15797b628a22df804832a1c2cf4c9ddee57429
SHA256700551a974e92cd583c8c69f2df0357e46af0db2fe0cba527ef91d2f2cfa9d48
SHA51282fe61251d727631cc40c572d67fb058e92a91ab4b24ab950697d338ee12abf99c1398686a1102cb5fa33196d677a247afa77143d247ea523b26fefb3f35588f
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.htmMD5
64f9f898c27378a084648dbbcf5c33cd
SHA1dbf70ecd88605e712db06faff6ade721eb060702
SHA2569518ce28ac8d823cdbdc743bd4c875e920b4994123362d81092c7ff9f89ee8b2
SHA5123616f6d9d6193637296ea4f4a406369d4eefb6811c0f1b892eb421aa3f6e716328a5e9900d4539615ccf0240fbb960ff4242775bfd2bc3ec05c99eef98a50ad3
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.htmMD5
c44fe59cd1c20ea93157976cf3432d4b
SHA12960eb058a04754eb450ad953fc1a98313913b75
SHA2565ccc7fa417eb2027faef3bdd9a607c11058d64fb11b75adce50068093b090eba
SHA51294517cf8935d3e4b32589f7d23b07c1b8124afa14e58f27fcd7a1bc508b9873e28736059c7f03ee261c5bf11984149514bce3272c5d04fa3eb12310c533376dc
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Tiki.gifMD5
198e4f49023cf66b57c79fec216a4549
SHA17fbb6762804e715d87b6226d866618092ade75ba
SHA25671baeec5396338c5aba641d29fb4edd1636f7ba0aba588d6b9a699340c1a4e5b
SHA5126893d4b7a68c55787ef47188f998d98b7f8731a421ce15801966e01b519dda5c455b0a50c2a36b5dbf2ef09c362a101087db1d70171fed201f921e04a5bc85b1
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\WindowsMail.patMD5
1a45ccd67c9bfc67f714781075801ca7
SHA19175a6ba38f685f56bd5155ed33a1cd83f2b01a5
SHA256b98790d3261ad6713f982e870db29866d62690a32a9cb619f8cb321ba97925b7
SHA512824063190a83fcba1e1314b880773142784166d8b73a7141fb151e2d22bdecd313ac8675f91a974ddfde08e00e05c0516f72bd88f7177df8097bf0f8fde06791
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.chkMD5
c0ae2fb9e8c3f071e7fa2c7db47716e9
SHA1207e8a84dcef149009a19160a502ec4f174a23c1
SHA2561a13c7f81d3c4b35bbaaed2c4524b1b4a40bb801b32bbdb5279aa19651cb2b9a
SHA5127100e2a56d736c0ab9c5096199bfd28423218d4a6864e267407247a31f30b92e9dd9d39664f8305f68bcd884ecc78092b72a04885fd3b727623a9f728f574a14
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\oeold.xmlMD5
d2f52619f00b55e8071c956bcce25884
SHA17463ccde4e5ce853a4947d98ef05e5c1be7ab248
SHA2568744f07dce3629360a66ea6710cf7376e0f54f38bce78d9556f114649d0181b9
SHA512b0477617dfbe0d3e7ca407bcc37274e43ce41ef02a282d3deac38902eb917742d6fb4193a29227a0520ea535e55d2b56c0cb8c48e4bb6a3b924e4be24a748c8d
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Media\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\Burn\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Caches\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Explorer\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Ringtones\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\AppData\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\Admin\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\Documents and Settings\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462aMD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\RyukReadMe.txtMD5
83b18aa439053d822902d3a2e44454b3
SHA1b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58
SHA2567dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5
SHA51294e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2
-
memory/1256-58-0x000000013F720000-0x000000013FAB7000-memory.dmpFilesize
3.6MB
-
memory/1256-56-0x000000013F720000-0x000000013FAB7000-memory.dmpFilesize
3.6MB
-
memory/1360-59-0x000000013F720000-0x000000013FAB7000-memory.dmpFilesize
3.6MB
-
memory/1540-55-0x000007FEFBE21000-0x000007FEFBE23000-memory.dmpFilesize
8KB