Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
40s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/01/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe
Resource
win7-20231215-en
General
-
Target
2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe
-
Size
4.1MB
-
MD5
50480cb8170b0d97e73ba781aec7cfe9
-
SHA1
ec38f88ab9a828640c1a8cc982896014287de814
-
SHA256
d1094678869c29df3963bf90c661e4c82b228a2017252f9dec64167232d4967a
-
SHA512
075571b1fb6dd2d6fff774d8aaa628afccad9b4c803e05a563eb57af881ef8db25385c894b41228e82e942222f117224601accb2893437a05cab6820bff11b22
-
SSDEEP
49152:Q5Viqwo4KxghcyJLBaSbvviqMjfBV+TFZ1bBzP7n1Y8/17MVfw1QSXm+RFvTCr9s:QBfr+TFFqRlw6a+dU7dG1yfpVBlH
Malware Config
Signatures
-
Executes dropped EXE 21 IoCs
pid Process 464 Process not Found 2768 alg.exe 2604 aspnet_state.exe 568 mscorsvw.exe 2940 mscorsvw.exe 1528 mscorsvw.exe 2928 mscorsvw.exe 524 dllhost.exe 2276 ehRecvr.exe 2336 ehsched.exe 2468 mscorsvw.exe 1648 mscorsvw.exe 2208 mscorsvw.exe 2808 mscorsvw.exe 2556 mscorsvw.exe 2868 mscorsvw.exe 2464 mscorsvw.exe 1072 elevation_service.exe 2036 IEEtwCollector.exe 2424 mscorsvw.exe 1100 GROOVE.EXE -
Loads dropped DLL 6 IoCs
pid Process 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found 464 Process not Found -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\system32\dllhost.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\system32\fxssvc.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\system32\IEEtwCollector.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\System32\alg.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\eb146ba83db14c9a.bin alg.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe -
Drops file in Windows directory 27 IoCs
description ioc Process File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{D65B6E56-FC76-4FE4-91A4-76D9714ED143}.crmlog dllhost.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{D65B6E56-FC76-4FE4-91A4-76D9714ED143}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.Net\Framework64\v3.0\WPF\PresentationFontCache.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File opened for modification C:\Windows\ehome\ehsched.exe 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe Token: SeShutdownPrivilege 2928 mscorsvw.exe Token: SeShutdownPrivilege 1528 mscorsvw.exe Token: SeShutdownPrivilege 1528 mscorsvw.exe Token: SeShutdownPrivilege 1528 mscorsvw.exe Token: SeShutdownPrivilege 1528 mscorsvw.exe Token: SeShutdownPrivilege 2928 mscorsvw.exe Token: SeShutdownPrivilege 2928 mscorsvw.exe Token: SeShutdownPrivilege 2928 mscorsvw.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 2212 wrote to memory of 2740 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe 28 PID 2212 wrote to memory of 2740 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe 28 PID 2212 wrote to memory of 2740 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe 28 PID 2212 wrote to memory of 2724 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe 30 PID 2212 wrote to memory of 2724 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe 30 PID 2212 wrote to memory of 2724 2212 2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe 30 PID 1528 wrote to memory of 2468 1528 mscorsvw.exe 41 PID 1528 wrote to memory of 2468 1528 mscorsvw.exe 41 PID 1528 wrote to memory of 2468 1528 mscorsvw.exe 41 PID 1528 wrote to memory of 2468 1528 mscorsvw.exe 41 PID 1528 wrote to memory of 1648 1528 mscorsvw.exe 42 PID 1528 wrote to memory of 1648 1528 mscorsvw.exe 42 PID 1528 wrote to memory of 1648 1528 mscorsvw.exe 42 PID 1528 wrote to memory of 1648 1528 mscorsvw.exe 42 PID 1528 wrote to memory of 2208 1528 mscorsvw.exe 43 PID 1528 wrote to memory of 2208 1528 mscorsvw.exe 43 PID 1528 wrote to memory of 2208 1528 mscorsvw.exe 43 PID 1528 wrote to memory of 2208 1528 mscorsvw.exe 43 PID 1528 wrote to memory of 2808 1528 mscorsvw.exe 44 PID 1528 wrote to memory of 2808 1528 mscorsvw.exe 44 PID 1528 wrote to memory of 2808 1528 mscorsvw.exe 44 PID 1528 wrote to memory of 2808 1528 mscorsvw.exe 44 PID 1528 wrote to memory of 2556 1528 mscorsvw.exe 45 PID 1528 wrote to memory of 2556 1528 mscorsvw.exe 45 PID 1528 wrote to memory of 2556 1528 mscorsvw.exe 45 PID 1528 wrote to memory of 2556 1528 mscorsvw.exe 45 PID 1528 wrote to memory of 2868 1528 mscorsvw.exe 46 PID 1528 wrote to memory of 2868 1528 mscorsvw.exe 46 PID 1528 wrote to memory of 2868 1528 mscorsvw.exe 46 PID 1528 wrote to memory of 2868 1528 mscorsvw.exe 46 PID 1528 wrote to memory of 2464 1528 mscorsvw.exe 47 PID 1528 wrote to memory of 2464 1528 mscorsvw.exe 47 PID 1528 wrote to memory of 2464 1528 mscorsvw.exe 47 PID 1528 wrote to memory of 2464 1528 mscorsvw.exe 47 PID 1528 wrote to memory of 2424 1528 mscorsvw.exe 50 PID 1528 wrote to memory of 2424 1528 mscorsvw.exe 50 PID 1528 wrote to memory of 2424 1528 mscorsvw.exe 50 PID 1528 wrote to memory of 2424 1528 mscorsvw.exe 50 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 --annotation=exe=C:\Users\Admin\AppData\Local\Temp\2024-01-25_50480cb8170b0d97e73ba781aec7cfe9_ryuk.exe --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.73 --initial-client-data=0x138,0x168,0x16c,0x164,0x170,0x140315460,0x140315470,0x1403154802⤵
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
PID:2740
-
-
C:\Windows\system32\wermgr.exe"C:\Windows\system32\wermgr.exe" "-outproc" "2212" "468"2⤵PID:2724
-
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2768
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2604
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:568
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2940
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2468
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1648
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 25c -NGENProcess 24c -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2208
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 250 -NGENProcess 258 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2808
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1f0 -InterruptEvent 264 -NGENProcess 244 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d8 -InterruptEvent 25c -NGENProcess 268 -Pipe 1f0 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2868
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 258 -NGENProcess 26c -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2464
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 270 -NGENProcess 268 -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2424
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 278 -NGENProcess 270 -Pipe 244 -Comment "NGen Worker Process"2⤵PID:1288
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 25c -NGENProcess 1ac -Pipe 264 -Comment "NGen Worker Process"2⤵PID:2032
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 24c -NGENProcess 25c -Pipe 1ac -Comment "NGen Worker Process"2⤵PID:1180
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 284 -NGENProcess 260 -Pipe 280 -Comment "NGen Worker Process"2⤵PID:2248
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 284 -InterruptEvent 28c -NGENProcess 274 -Pipe 288 -Comment "NGen Worker Process"2⤵PID:916
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:524
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:2276
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:2336
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1072
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵
- Executes dropped EXE
PID:2036
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:1100
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:2924
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:3040
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:2352
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:2996
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:2624
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:2676
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:2916
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:1564
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:2920
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:924
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:2528
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2068
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵PID:2792
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:2572
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe_S-1-5-21-3427588347-1492276948-3422228430-10001_ Global\UsGthrCtrlFltPipeMssGthrPipe_S-1-5-21-3427588347-1492276948-3422228430-10001 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon" "1"2⤵PID:2684
-
-
C:\Windows\system32\SearchFilterHost.exe"C:\Windows\system32\SearchFilterHost.exe" 0 588 592 600 65536 5962⤵PID:672
-
-
C:\Windows\system32\SearchProtocolHost.exe"C:\Windows\system32\SearchProtocolHost.exe" Global\UsGthrFltPipeMssGthrPipe2_ Global\UsGthrCtrlFltPipeMssGthrPipe2 1 -2147483646 "Software\Microsoft\Windows Search" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT; MS Search 4.0 Robot)" "C:\ProgramData\Microsoft\Search\Data\Temp\usgthrsvc" "DownLevelDaemon"2⤵PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5e5c41adddb7cce0550f2b98f61451415
SHA1a5ba4627fe664a0c872999c91dc44b935b71475c
SHA25624670d0c1a0445407066bb554918d568fa03a912a4048f6512526e752d622beb
SHA51229aa47049e6fcc8fb170477313bc0f81d588f2256f2687a8d801b2b361b3a7cd40fb3d0123651be4004290ff0d1fa2108605dfb53dc89caea81639d8a7acb153
-
Filesize
2.8MB
MD52bdd572e5d1d90e5ff3571049764e2e6
SHA130b4b14bb240abab5ca5db9a91bac33cf6bc8332
SHA2560d3d927b0bb411cbf6ef3011d3b23e900cd25788fafb52e504408bb3cd176b45
SHA512c32b4e6e9d51ace180ab46cdcddd86f0345b683cd68b83aa5bb64399d50b3f48c122f46cbd71738ae4510b240f27dd60c08575a1d155c683c3f92bf3954b236a
-
Filesize
448KB
MD514cc9499f7008b751bad6bca0b4077e5
SHA1dcf664c079ba45c57bdbb48f489c9093f9caaa24
SHA256a61544249b17532ca1773cb092bd1577369f89d2103f747a137385aba283fdc5
SHA5124f4305cbc76d2991a3d76b721f6b1ef170559540d849c8b66661392bdd2c4a0470c93d422a3d12a6f887b8c0dd269a3e59bc4d7e9afdc368360aad62f3295b08
-
Filesize
2.6MB
MD57e8357e6422dc3c13b43d8c7dfbd8176
SHA180746fc5d18966e0351fa0115a4b4ac3446cef23
SHA2565675a9fb71d85cbcdb83e88d3177f82b55282a731ce8f588bcfc242653d0e95d
SHA5129dfdde6f0f5d36622092191d15de6ea8aa0d1b15a19fef1d5a4be17c0a492a66b5f6412f9497b603888745597a5928b26228fe9bc316d516ae06b08b9ca6af7e
-
Filesize
256KB
MD5e8abd44cc79cffb7b1fde0af92349ec0
SHA1f30ce6604adce4a249a85681fffe67efbe0209f8
SHA2561a6bde1e0294a15634591c53649ff212da4552bcdd4bb87be95368fe90ae7dcf
SHA5121c3b4eb2e9ec4b7426e83e8fe8d35c935ae56866c727f55fb4bbcd3659735e625d35e740d9cc275c6d66fd1372fc7794de2bb5f0ff05446df06442781551cb45
-
Filesize
1024KB
MD5070825070fe2ad27fe6916a1c85fbc1f
SHA1e61dd571327cf256c865ece3432c2a1fee79dfe4
SHA256f2ff3aff3c345eba047e4b2e31d96196685bf2a995201a3e0cee34aaab645f73
SHA51231b60aa98cf509997edfc1c09ee86893e73769889390bc68d08e6dbf97bdac7be8ccffbf6d9421c7d6d8a71fdfd336adc7274a8ca0ceee947d29752d8077893a
-
Filesize
152B
MD58d18fc2c470e3a012ea7faeedba5ef9b
SHA1fbb54728dcc91aa6605ea2f6c12ce92561458efd
SHA256a0295bd95fec3f95a2d34ef5c2b74ce5ce8d8a11b1513f018089acfe930c73ab
SHA51218ed669280eae5b9f827117da8f0c62abf5c88531299aa7e9709681ea72d6a50ec8f1e8bdf575d18d9a90b60452a417cd904374b720f858932de25521bbec930
-
Filesize
20B
MD59e4e94633b73f4a7680240a0ffd6cd2c
SHA1e68e02453ce22736169a56fdb59043d33668368f
SHA25641c91a9c93d76295746a149dce7ebb3b9ee2cb551d84365fff108e59a61cc304
SHA512193011a756b2368956c71a9a3ae8bc9537d99f52218f124b2e64545eeb5227861d372639052b74d0dd956cb33ca72a9107e069f1ef332b9645044849d14af337
-
Filesize
1KB
MD5cc31548c407f0537a0cf7b8f7706c97d
SHA1a2991eb9b90afa4849e71d90f2747e675c04016c
SHA256666d41c5202fd7acada39495828a7742a2515bddfbf54a8075cc861127d5a96a
SHA5123885f12fa035a219682d21abb012112dda2bea1aad9f18ebe06b8e0d5413b682d769dd646a2cab22d6296c8362b3de38614e868523bb2111ec71727ebd77c24b
-
Filesize
12KB
MD5532ae37524255354bc67acef686c3072
SHA14ad49711d698c53adefcbdad764e4b4de9cb7f6b
SHA256d6fcc2c44704167553a8bb4fbef404e4eff7a1bb3e829364fb59326df3defc9f
SHA512de0f5ebd4a05280339583c90f089e6e5a5e6419784917f46f49fd55b6e40c40e2b0314df877d259c7aca185680ae9a521831c48f0c16bdef085d0f148ad02e9e
-
Filesize
872KB
MD532acdea5a4245ce9157c785db9b4b2a9
SHA1f9e82136268d3e9f8e9a8e965f05ae1ff5e0684c
SHA2566459966febd3019d0fd342d4880cd2c87f8f48e3170604340f76971529626934
SHA512058648bd7f0ceb384b4f72e361e930f2ce44993c558c59b0e1e727d58ae7801ac878114a1c3b79f3a48e081b59fd0b3b4526a818a9501516adf0fcfc3689f739
-
Filesize
678KB
MD50a68a2c3119a51b6473543886e8795b2
SHA1a004d2dacf6829669242047f02f650db6c03cf3c
SHA25633c7d29a0eaab11d630e0afc39dd91f91dc9e4ffab07f981f578b2e5c219ea4e
SHA51211847cfb8170247d1b1289471c82f63933aaa651ebe56db7c52ce7d5791fa47b72d8473f17dab1d6d777ba96fd762897c3edfe62e5ab28a6598ce38c5163bdd8
-
Filesize
625KB
MD5d08b2065e3a1f3252b1621377f07c7fa
SHA1274bdb6cf8986e56bfd7ff6bbfcefb592b0537a1
SHA256efd5fc921f24fb2a67ec09ef635bc7201269e91bb087df3504dfb6c184033826
SHA5123c1f2002c57170d32bebe8a3591f3a17515de445a2fa1bc0e032ff7c11cf8cfa79e0de648a949b4f3a920214e50191a31825e79cf043235b7e57101032d2bed4
-
Filesize
1003KB
MD5b474e6376315dd57c50fa387c19913a6
SHA1c7b4020a336518dc470554b91c07dbdb134beb16
SHA25658270eb399a2f57eb32803eeeba0d39585dbfb476fbf48c86f01ae443b2f92a5
SHA51217e1ff072f19875ab3d6da1dc7efb022d8126db1de0c26c412439416ef12266351066d849ae7cc872754eb1449439d87eb2e137a93acd611c35d52fa220677db
-
Filesize
656KB
MD50ffebf246ada492fe1a643a607d21cf6
SHA1dda2feccde806884ce6274aaefea8cb321278907
SHA25663fb740aa9e5be9c5d18be41b97a328f0ce82cb5e8f5a94dd3d3d2966618b950
SHA512a64b802198a6dcce2982a4bce5dc5abce8b297f41c691605372eed97ccb3dde3b81a52ff09e395866bd6d5fc19ef5b9165c4a4009284b98fd4040ed6d8a8ffc3
-
Filesize
587KB
MD57331ff03c15180a659dd48394bb649d9
SHA15574b4db1c7321aeb2b41c739748559b1949db98
SHA256136972c7f3adb329c2fc1fd5453390b7e77729ea65a0f3f3077bdfa3521d657a
SHA512751ff602fa7fa9d7cf08741b40704651c4cb03d835caecb1aa4143aff33524b4cd3add1ec69b407fa24b77a98daa10dc7c81741275943a528781b52391d2a4b9
-
Filesize
896KB
MD50dc5922a4623bd2b18d493edb4e13c54
SHA1ff710d90a2a83a32f3a95ab5cfc900e09cc3f862
SHA2568e2e7762b8331f5ee4cf8e5f7437c7831ac195a76055abcdddae37b994d0b733
SHA512e3e904fb7270f0030f600fee89b5aa4246d46bbcc4c5ca8d3f0db2f3047eceedc677546f5e55635a6f7e84cf94efc9f5fd9e5787b842eab5ea79622be7073883
-
Filesize
1.2MB
MD5a610cce647981eea7144a33a6f25890f
SHA18fb08fa3d7f141ed5af4a95d7932e22906d62c45
SHA2568c27933fb23e6f149109540aa0ea5b37cda66b6de77891251cffb98f848a7b56
SHA5125ffb25374aca33f05169986de620f006171bb491d14ba4279d56a64dbfc2f9e38e220241048732ce1b20058f3e2a3f4b368e692dac64202a4830a77345b45e1b
-
Filesize
384KB
MD5c7c193f18eae2e9bf6e8bf02ad433969
SHA159dc383007ac933658ffb4f8be6be44c62187019
SHA256624cb0b843e8258c3b595859b304063269354e4acbfc8a113563be78762018c2
SHA51228914e7da13c9a7844f63744ce38f49d49c925298854ad5d11247b8f8504ff7c74b4bc71e5aa77a4e0a951ce52b52c1006381d6f7a9a43df8d630dd7d2edc232
-
Filesize
320KB
MD595142cc294167e9d670968c0639d704c
SHA1123201813e132fd1e58903ea6beb11626bb19e6b
SHA2566466d07785e5f64ec1656ed9970fee9f53ff58dffb2a1953d93828c30a7d8d9c
SHA512ff37c7407416b998ad4eb4ecc66ada960a3d47dc16e804ead6cab835833b4e6394c35fa3397fc26e7d102050fb05d2f8713415c309de774bfe026bd82004104c
-
Filesize
1.2MB
MD50cdda5cee0ae0bd2a81b8cc4ef6fcc40
SHA11e968f3d9a9c60894f3b6d80f020c28ce6054440
SHA256b80415f943730a3a7c15180edabcbc79db329134463f31ee5e659de33efa35f1
SHA5124a02cb7cbad65be1bd0b21bea4c6ff5278405adfb9145b282a9873a178917dc9ace01581c37932dceb35d041447bb3a1251e943ed6366bf20bcd8696b13b3e53
-
Filesize
448KB
MD59364070ae4b7d62620c9e0da9fb83c94
SHA1d24dbbd7b536c9d5761387a40ad5d7c7a8136c55
SHA256cef79784530d77b770ac8437b92e03f7ce82bade80abc05c289dd1f0058a069d
SHA51281a57663da38c3bcfe9174ec478c645a11e7b35a1c71ec6333dc5ccd663b3d633c4c07824de0e0f9a3302a42ebad9716bf2f6e571fa8d6840c5e411a611cd05b
-
Filesize
2.0MB
MD5c269b1626d5d20b767cbf7a91e0bd875
SHA11ef60f5362aa05e0cc4c5262ea430dc54d3f9bf8
SHA25605d0ef91827f0a1105c111ef19a6a48f1edb363f31ea7fcd9a21d810def895a7
SHA5128f7a8057f013aecdc69ce0e4bea9f0f4f86b1e291bfb15d2c4de7ad5b01d64ea4c16e70d0ca9f560dda7db05c0898343ae34435f5d0c665844bbdbcf04f884f5
-
Filesize
960KB
MD58ad57a42a6cfee4774d19a37afe36e19
SHA162e5eb388fc0b4d5dfb28651d8f842233dde15fd
SHA256e6d4ccbbb24fdd9f8a22c021728e607f9385c32822405e884c810a77845e57bc
SHA512f6aad6ceba01c14272534e92525bc3fedd2d7995f26796d8ad8cc34a9252dcd40388e50f815cc47cf204e0bc710c8ffb3879c697e2fa0f8a1be48e30bdb84f1d
-
Filesize
648KB
MD543711815ac6cf6a6cae1e1f50fe70529
SHA14b11370855fa33b14afc272b0bd50a43184f36e0
SHA256ca45036fce26ad47e1f2c557081e097ca1a90bee6c5688b32f9f91ab9231c2fd
SHA5128088ce87519e625745ce0a015737f1840578924286339b6e620020461183e6ea88da4ec33aaca63125d3c62495fc2ac339e46a783b25f55b06c3bf9ca913069a
-
Filesize
603KB
MD540d9b3624108a8e045555a7cc96a8b94
SHA1a088e8c51ce5036e5aa1734f3cf6897f6a593cdb
SHA256414ad99d79952f19907f1a00ff5dfd0d78c010e8c8bb29007e6c81547c3d19ed
SHA51250080801cd7a726f9a1fc18123ae8edfd2cd5b37e60f3ded36de772af8ce8bf482b899bee6f55f4915957a81c400312556019315bd758f296a9c804d937ac2a4
-
Filesize
577KB
MD5e8ded9a673c06663cd5123287f7f9be6
SHA1932c665871c33e8f4b5d144f86665e14fd8e3b7b
SHA256f6d048c368b8d49d2eef77274fa72d072dbb1d8b25518d0eecddadd821fddc58
SHA5127dfd959c6e38438d057bc8f27fbcb240e2581a80586e667edac1b9a107af87c4b8b577f2c66ef89565980963677434cbc2e4e915ebc8c4b67c1264be4ed48e3c
-
Filesize
644KB
MD55c760ef3811efd3cb357f176d43aadca
SHA1eb4c4a2d7230a565918c99949345ef60b0e6bcfd
SHA256c42f0dab79fd8fd47df0b56c40d96a3f5a3d897a2f7c61b8359e29303b028eed
SHA51204e2cf6d793d03b965512f2a28577bcf48eb65ca045525928f40b0eef8dd2ecb2cea8379a5779a22387b0516587b6629136036155cfbd0b6defb66385aaae5b4
-
Filesize
577KB
MD5b4408a438d93fe471775dd912eea8621
SHA1ec7fb98e831d0042be21ab7b9eb301bb502e8044
SHA2562dd0c884f4f8c9c39ac6ef7c3077b57e5680e2e5469cb5bde7235814f91edfc5
SHA512c7d59675c2f986a6ff08d23738e030e1dc1fdd8815dc40e9f64676b4e0994007fe4f13cc28042a0ee01c3c52b30d5a46a3b14af9336b07177f60b6c1f6dc8413
-
Filesize
674KB
MD5e40503c8541bceb7c3da24c9812f2c95
SHA1641e5bf4a3d42ed9eb2da43327c082398e53fc56
SHA25640f1eca8c8761d173629a8102689d332e53e497025dcfbeb9f8151983ae0190b
SHA512c94161976f0ae454764174eb18ee22c9c4926bf36be654e4ac81dbd1b0e88cfa5ffde005a7a9e2e04619463209331e91e72faba5b605cb251298b14f70dda2e8
-
Filesize
705KB
MD54b0b50afb4ba7f5cbcde9c53d61b1b7e
SHA176c7c4ad70adb1847d1e3633cc1e60db26f9f4b4
SHA256571c975f9598fad830e628a69c7d4f8d3e9eee424c8c07b17ac18827d3f8ef17
SHA5125141e0f4010504af7f0027776716bfc3a31d644dca9ef9ac20dd0b138d3ca29f205860fc7dd4509413c6b5c61dba1fbf916e61520c70d8741e14b68c1ec4978c
-
Filesize
691KB
MD57b8c00a3ceb6d0e148ff639cbe23123b
SHA1568855c95a2ae51d9baf4a264d149eb485bf332b
SHA256451b33cd874afb6b8316de23fd25214b58e960d0eb46bbd2df26597fcd9163b0
SHA512b084597bdda3ae739503ff8a9cef2fc6925077c2096365b0185a50e5b21736ed7ece6b699602db5557652cf8ebd4a7ab5fec957ebc008b118d4f39f0d1f80c1c
-
Filesize
581KB
MD53107d16512e375fbdd8d0cf0a79891a5
SHA108c3a0e91e2fee378521deac7f0186b7ec3acf71
SHA256112844fcbe6f55d3c9fc8ac524bb187949d66082c5491fcedf5a5db7bbc94690
SHA5120d3f85d3fe4d9b1e6d9d0751868a1561776af5cb23fa27f2099c075b83224b93b11eb192cbf7d09b8f0c0420e2e2dc448f8de6df8fb00847d465fda43d997f2c
-
Filesize
765KB
MD5de5862cca71068c0fd146581f94f82ed
SHA1de3b40cf0eaad1c9120e09ef230d67923f2b22aa
SHA25654bdaefc5e2ae40139cb5039da62f16f161c93142e671f30356e0e0db5ba0be0
SHA512adacfae376bd5fa42deb5b5b5dacfedcf472be32a4afe2359c358d2bc309c339671a230d348487f7317b609e5df9a11a3e29a50e6a7d3a76b509dedd1dd9f92c
-
Filesize
2.0MB
MD5aa12d767ebfc744e08d5a1143e4faedd
SHA1233a80fe4f43163e19685b9cbacee8e5213e3b6d
SHA2562f2da0d6e55025c117d6b4dcdaa5f350e0b838ce65e8a5a60ff7a547a8725974
SHA512b20da89a92d4bc1ad83c2bbd78fead305bcacd7f65cc4efb2281907603d7741b29126d62d3aabdbbf50b47a02a1e7936ea3890b630e0da92ebc9bd355a071482
-
Filesize
691KB
MD57f6486e68b6ee285fc564ff1b41019a6
SHA1d71f24c7fe907d784d394a129489bd194b83ef9d
SHA256741730b1e33bcb59b2e6607f438e26c03b170fce5269664da2f9767991b95d0c
SHA512c45276181c5d0abf2ae937fe464b47fe2df6b205e39c91f9d72b344a918c8ae1df027a8c9838e50e26b18e39e6720cf1c35951ac2999d985085882ed40142398