Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24/02/2024, 09:44
Static task
static1
Behavioral task
behavioral1
Sample
2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe
Resource
win7-20240221-en
General
-
Target
2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe
-
Size
1.1MB
-
MD5
9cdfd69f4cc4da52f453e48e0955666a
-
SHA1
956adfa715497ba5673d50c96e50ef70b8d17b5f
-
SHA256
404dbe9d744cae49fd3f251e91bab5132b9761e185806869cf4be1aae3061daf
-
SHA512
e37bbf96def79dd06dd410ee79e1574411be004bb455231af183ab365c3a6f2fe84f2d709bd8fb345e766ffdb7666769bbd347614e402ddbd503a2573d044d80
-
SSDEEP
24576:GSi1SoCU5qJSr1eWPSCsP0MugC6eT+t/sBlDqgZQd6XKtiMJYiPU:WS7PLjeTU/snji6attJM
Malware Config
Signatures
-
Executes dropped EXE 44 IoCs
pid Process 472 Process not Found 3000 alg.exe 2860 aspnet_state.exe 2716 mscorsvw.exe 2588 mscorsvw.exe 1064 mscorsvw.exe 2508 mscorsvw.exe 1644 ehRecvr.exe 452 ehsched.exe 1628 elevation_service.exe 2084 GROOVE.EXE 1420 mscorsvw.exe 1488 maintenanceservice.exe 1072 mscorsvw.exe 2100 OSE.EXE 1740 OSPPSVC.EXE 2928 mscorsvw.exe 2096 mscorsvw.exe 1116 mscorsvw.exe 1276 mscorsvw.exe 2472 mscorsvw.exe 2836 mscorsvw.exe 2004 mscorsvw.exe 2420 mscorsvw.exe 1136 mscorsvw.exe 1012 mscorsvw.exe 2008 mscorsvw.exe 2988 mscorsvw.exe 2852 mscorsvw.exe 368 mscorsvw.exe 1276 mscorsvw.exe 2472 mscorsvw.exe 2596 mscorsvw.exe 2380 mscorsvw.exe 828 mscorsvw.exe 1508 mscorsvw.exe 2156 mscorsvw.exe 1556 mscorsvw.exe 3064 mscorsvw.exe 1964 dllhost.exe 3048 mscorsvw.exe 1176 mscorsvw.exe 3008 mscorsvw.exe 2856 mscorsvw.exe -
Loads dropped DLL 5 IoCs
pid Process 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found 472 Process not Found -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\a93dbaa75465f8f4.bin alg.exe File opened for modification C:\Windows\system32\dllhost.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File opened for modification C:\Windows\system32\dllhost.exe alg.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat GROOVE.EXE File opened for modification C:\Windows\system32\dllhost.exe mscorsvw.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\javacpl.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\updater.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\java-rmi.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\rmiregistry.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\jabswitch.exe mscorsvw.exe File opened for modification C:\Program Files\VideoLAN\VLC\uninstall.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\xjc.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe mscorsvw.exe File opened for modification C:\Program Files\VideoLAN\VLC\vlc.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe mscorsvw.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroBroker.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\ielowutil.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\java-rmi.exe mscorsvw.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javacpl.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\Install\{B262F552-36A4-4AFD-A8FD-D1AE5D349D55}\chrome_installer.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jar.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\minidump-analyzer.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jstack.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe alg.exe File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\GoogleUpdateComRegisterShell64.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe alg.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\setup.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe mscorsvw.exe File opened for modification C:\Program Files\Mozilla Firefox\maintenanceservice_installer.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\pipanel.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\ink\TabTip32.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\unpack200.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\java.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\javaw.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jre7\bin\unpack200.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DW\DWTRIG20.EXE mscorsvw.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSOXMLED.EXE mscorsvw.exe File opened for modification C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\106.0.5249.119\chrome_installer.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\keytool.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\orbd.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\orbd.exe alg.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Setup Files\{AC76BA86-7AD7-1033-7B44-A90000000001}\Setup.exe alg.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe alg.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\ktab.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\jp2launcher.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsimport.exe alg.exe File opened for modification C:\Program Files\Mozilla Firefox\pingsender.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\wsgen.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\java.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\javaw.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ssvagent.exe alg.exe File opened for modification C:\Program Files\Internet Explorer\iediagcmd.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jarsigner.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jconsole.exe mscorsvw.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\lib\nbexec64.exe mscorsvw.exe File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\klist.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\ktab.exe alg.exe File opened for modification C:\Program Files\Java\jre7\bin\tnameserv.exe alg.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe mscorsvw.exe -
Drops file in Windows directory 35 IoCs
description ioc Process File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.log mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngen_service.log mscorsvw.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe mscorsvw.exe File created C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{4BFB185D-74B4-4D5E-9790-D9902695636A}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File opened for modification C:\Windows\ehome\ehRecvr.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File created C:\Windows\Microsoft.NET\ngenservice_pri1_lock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenofflinequeuelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehRecvr.exe mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File created C:\Windows\Microsoft.NET\Framework\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe alg.exe File created C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngenrootstorelock.dat mscorsvw.exe File opened for modification C:\Windows\ehome\ehsched.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File opened for modification C:\Windows\ehome\ehsched.exe mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngen_service.lock mscorsvw.exe File created C:\Windows\Microsoft.NET\ngennicupdatelock.dat mscorsvw.exe File created C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File created C:\Windows\Microsoft.NET\ngenservice_pri3_lock.dat mscorsvw.exe File opened for modification C:\Windows\Registration\{02D4B3F1-FD88-11D1-960D-00805FC79235}.{4BFB185D-74B4-4D5E-9790-D9902695636A}.crmlog dllhost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe File created C:\Windows\Microsoft.NET\Framework\v2.0.50727\ngenservicelock.dat mscorsvw.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v2.0.50727\ngen_service.log mscorsvw.exe -
Modifies data under HKEY_USERS 30 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileDiscontinuitiesPerSecond = "20" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthBudgetMs = "45000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecWaitForCounts = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPointPageCount = "7" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CommitMaxCheckPoitnRateMs = "10000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpRecCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform OSPPSVC.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileInlineGrowthQuantumSeconds = "30" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft ehRecvr.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\OfficeSoftwareProtectionPlatform\VLRenewalSchedule = 816acb9f0100000000000000040000001890320100000000e2e045280100000000000000040000000100000000000000e0967d7f02000000000000004a000000350039006100350032003800380031002d0061003900380039002d0034003700390064002d0061006600340036002d00660032003700350063003600330037003000360036003300000000000000000077da4c9402000000000000004a000000360066003300320037003700360030002d0038006300350063002d0034003100370063002d0039006200360031002d003800330036006100390038003200380037006500300063000000000000000000ada4eeeb0400000000000000080000000000000000000000ada4eeeb040000000000000008000000000000000000000058192cc10100000000000000040000007800000000000000847bccf10100000000000000040000006027000000000000 OSPPSVC.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\ShadowFileMaxClients = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheShortPageCount = "64" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogInitialPageCount = "16" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMaxJobDemoteTimeMs = "5000" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheWaitForSize = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\NvpClientsCount = "32" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\LogMinJobWaitTimeMs = "3000" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit ehRecvr.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\FileGrowthQuantumSeconds = "180" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheHashTableSize = "67" ehRec.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings GROOVE.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\SwagBitsPerSecond = "19922944" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CacheLongPageCount = "32" ehRec.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SBE\SAL\CriticalLowDiskSpace = "1073741824" ehRec.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2228 ehRec.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1964 2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: 33 2456 EhTray.exe Token: SeIncBasePriorityPrivilege 2456 EhTray.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeDebugPrivilege 2228 ehRec.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: 33 2456 EhTray.exe Token: SeIncBasePriorityPrivilege 2456 EhTray.exe Token: SeDebugPrivilege 3000 alg.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeDebugPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe Token: SeShutdownPrivilege 2508 mscorsvw.exe Token: SeShutdownPrivilege 1064 mscorsvw.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2456 EhTray.exe 2456 EhTray.exe -
Suspicious use of SendNotifyMessage 2 IoCs
pid Process 2456 EhTray.exe 2456 EhTray.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2508 wrote to memory of 1420 2508 mscorsvw.exe 40 PID 2508 wrote to memory of 1420 2508 mscorsvw.exe 40 PID 2508 wrote to memory of 1420 2508 mscorsvw.exe 40 PID 2508 wrote to memory of 1072 2508 mscorsvw.exe 42 PID 2508 wrote to memory of 1072 2508 mscorsvw.exe 42 PID 2508 wrote to memory of 1072 2508 mscorsvw.exe 42 PID 1064 wrote to memory of 2928 1064 mscorsvw.exe 45 PID 1064 wrote to memory of 2928 1064 mscorsvw.exe 45 PID 1064 wrote to memory of 2928 1064 mscorsvw.exe 45 PID 1064 wrote to memory of 2928 1064 mscorsvw.exe 45 PID 1064 wrote to memory of 2096 1064 mscorsvw.exe 46 PID 1064 wrote to memory of 2096 1064 mscorsvw.exe 46 PID 1064 wrote to memory of 2096 1064 mscorsvw.exe 46 PID 1064 wrote to memory of 2096 1064 mscorsvw.exe 46 PID 1064 wrote to memory of 1116 1064 mscorsvw.exe 47 PID 1064 wrote to memory of 1116 1064 mscorsvw.exe 47 PID 1064 wrote to memory of 1116 1064 mscorsvw.exe 47 PID 1064 wrote to memory of 1116 1064 mscorsvw.exe 47 PID 1064 wrote to memory of 1276 1064 mscorsvw.exe 48 PID 1064 wrote to memory of 1276 1064 mscorsvw.exe 48 PID 1064 wrote to memory of 1276 1064 mscorsvw.exe 48 PID 1064 wrote to memory of 1276 1064 mscorsvw.exe 48 PID 1064 wrote to memory of 2472 1064 mscorsvw.exe 49 PID 1064 wrote to memory of 2472 1064 mscorsvw.exe 49 PID 1064 wrote to memory of 2472 1064 mscorsvw.exe 49 PID 1064 wrote to memory of 2472 1064 mscorsvw.exe 49 PID 1064 wrote to memory of 2836 1064 mscorsvw.exe 50 PID 1064 wrote to memory of 2836 1064 mscorsvw.exe 50 PID 1064 wrote to memory of 2836 1064 mscorsvw.exe 50 PID 1064 wrote to memory of 2836 1064 mscorsvw.exe 50 PID 1064 wrote to memory of 2004 1064 mscorsvw.exe 51 PID 1064 wrote to memory of 2004 1064 mscorsvw.exe 51 PID 1064 wrote to memory of 2004 1064 mscorsvw.exe 51 PID 1064 wrote to memory of 2004 1064 mscorsvw.exe 51 PID 1064 wrote to memory of 2420 1064 mscorsvw.exe 54 PID 1064 wrote to memory of 2420 1064 mscorsvw.exe 54 PID 1064 wrote to memory of 2420 1064 mscorsvw.exe 54 PID 1064 wrote to memory of 2420 1064 mscorsvw.exe 54 PID 1064 wrote to memory of 1136 1064 mscorsvw.exe 55 PID 1064 wrote to memory of 1136 1064 mscorsvw.exe 55 PID 1064 wrote to memory of 1136 1064 mscorsvw.exe 55 PID 1064 wrote to memory of 1136 1064 mscorsvw.exe 55 PID 1064 wrote to memory of 1012 1064 mscorsvw.exe 56 PID 1064 wrote to memory of 1012 1064 mscorsvw.exe 56 PID 1064 wrote to memory of 1012 1064 mscorsvw.exe 56 PID 1064 wrote to memory of 1012 1064 mscorsvw.exe 56 PID 1064 wrote to memory of 2008 1064 mscorsvw.exe 57 PID 1064 wrote to memory of 2008 1064 mscorsvw.exe 57 PID 1064 wrote to memory of 2008 1064 mscorsvw.exe 57 PID 1064 wrote to memory of 2008 1064 mscorsvw.exe 57 PID 1064 wrote to memory of 2988 1064 mscorsvw.exe 58 PID 1064 wrote to memory of 2988 1064 mscorsvw.exe 58 PID 1064 wrote to memory of 2988 1064 mscorsvw.exe 58 PID 1064 wrote to memory of 2988 1064 mscorsvw.exe 58 PID 1064 wrote to memory of 2852 1064 mscorsvw.exe 59 PID 1064 wrote to memory of 2852 1064 mscorsvw.exe 59 PID 1064 wrote to memory of 2852 1064 mscorsvw.exe 59 PID 1064 wrote to memory of 2852 1064 mscorsvw.exe 59 PID 1064 wrote to memory of 368 1064 mscorsvw.exe 60 PID 1064 wrote to memory of 368 1064 mscorsvw.exe 60 PID 1064 wrote to memory of 368 1064 mscorsvw.exe 60 PID 1064 wrote to memory of 368 1064 mscorsvw.exe 60 PID 1064 wrote to memory of 1276 1064 mscorsvw.exe 61 PID 1064 wrote to memory of 1276 1064 mscorsvw.exe 61 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-24_9cdfd69f4cc4da52f453e48e0955666a_ryuk.exe"1⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1964
-
C:\Windows\System32\alg.exeC:\Windows\System32\alg.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:3000
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
PID:2860
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2716
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2588
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 1d4 -NGENProcess 1d8 -Pipe 1e4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 258 -NGENProcess 240 -Pipe 254 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 25c -NGENProcess 1e0 -Pipe 248 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1116
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 1d4 -NGENProcess 1e8 -Pipe 23c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1d4 -InterruptEvent 1d8 -NGENProcess 25c -Pipe 240 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 244 -InterruptEvent 258 -NGENProcess 268 -Pipe 1d4 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2836
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 260 -NGENProcess 26c -Pipe 244 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2004
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 260 -InterruptEvent 250 -NGENProcess 268 -Pipe 24c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2420
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 250 -InterruptEvent 268 -NGENProcess 25c -Pipe 274 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1136
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 258 -NGENProcess 270 -Pipe 278 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1012
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 264 -InterruptEvent 258 -NGENProcess 268 -Pipe 1e8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2008
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 258 -InterruptEvent 280 -NGENProcess 270 -Pipe 1d8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2988
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 280 -InterruptEvent 284 -NGENProcess 25c -Pipe 26c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2852
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 288 -InterruptEvent 258 -NGENProcess 28c -Pipe 280 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:368
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 268 -NGENProcess 250 -Pipe 288 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1276
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 268 -InterruptEvent 260 -NGENProcess 28c -Pipe 270 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2472
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 290 -InterruptEvent 1e0 -NGENProcess 294 -Pipe 268 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e0 -InterruptEvent 298 -NGENProcess 28c -Pipe 264 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 298 -NGENProcess 1e0 -Pipe 250 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 27c -InterruptEvent 298 -NGENProcess 29c -Pipe 28c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1508
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 298 -InterruptEvent 29c -NGENProcess 2a4 -Pipe 2a8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2156
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 29c -InterruptEvent 2ac -NGENProcess 260 -Pipe 284 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1556
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 2b0 -InterruptEvent 298 -NGENProcess 2b4 -Pipe 29c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3064
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 170 -InterruptEvent 15c -NGENProcess 160 -Pipe 16c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1420
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1e8 -InterruptEvent 15c -NGENProcess 160 -Pipe 170 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1072
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 158 -InterruptEvent 1a0 -NGENProcess 180 -Pipe 14c -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3048
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1a0 -InterruptEvent 1fc -NGENProcess 1ec -Pipe 1f8 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:1176
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1fc -InterruptEvent 204 -NGENProcess 1d4 -Pipe 200 -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:3008
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 208 -InterruptEvent 1a0 -NGENProcess 20c -Pipe 1fc -Comment "NGen Worker Process"2⤵
- Executes dropped EXE
PID:2856
-
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1644
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵
- Executes dropped EXE
PID:452
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵
- Executes dropped EXE
PID:1628
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2456
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2228
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:2084
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵
- Executes dropped EXE
PID:1488
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵
- Executes dropped EXE
PID:2100
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
PID:1740
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD5764f71e628beb44f32b335812d15ab27
SHA1ee83877425e91f037b06087ab96b183329d618fa
SHA2568480aa3454ff568c474702bdb10ad352019e216ed58b2910f03c58792582ccf2
SHA5126cc818e9e268cc61d0af69e871844cf9112f6b4f5b4303e4a29a8d9b2a5a58aa4e5a04cb17f4039f780f87808f53c65c7ff42e292a220ad77b814c8e2a49942f
-
Filesize
1.6MB
MD5f51f5293e3f24b4901496287d1f51145
SHA113dacda3aaa9fa962c095fb34e4867c8bd8bfa6c
SHA2568e8ac603a81c68b2e1b71c0045d2be53a56fb9919ad277cb6935ad7d1b3fbfa1
SHA51226f08efdefa7abadf6e0e149212e5125de6b3232e573c547465af1feb0145b5c5bbe3a9fc44d267dc65ce72c256e657a60072de30c07eb620061a4ea9b3a8427
-
Filesize
1.3MB
MD509a273c3d0e867c016737e769b1827b0
SHA16b6d4a8cd9d4fc74c616e0a2200c4c7e75d7ad67
SHA2569c025a2a9057e45fb269e78e981aaefe919bac088a337b336e6d90e0b2d4fcd6
SHA51274e4a73cc539d6fc82e56a781b9290f3030d3a321d431fa201e4bd7df82d87a9a0239b2120d42439b74b5e48a2b285b0c507562a1e908033c424b8135bed8483
-
Filesize
1.0MB
MD5172672b9abe8cf1e8573828377b82c21
SHA1723c2ef1d7926715e0cdda58fd00e8fd65800122
SHA25645c4acffb2ff3589a27eb5aa0363ba1855ed71dec1e0817d4abe76df598ab3f5
SHA512b691690982cf68bdcb8fe947dbb373389eddd361ef6b711412203cbaa24f1161502dddc9e0515d760cec8516606bc002836d6323689af66e81b547f748646b48
-
Filesize
706KB
MD597b606567c1f7c43fddd371e966230d0
SHA19aaac35f3e37a5394236da1f380219201437d71e
SHA2560bc8565a47b66d711df983326fc284bd8d40102e1762686c19e82e1216a0f68d
SHA5122fb0c36ffa45a0a8814976e651093294e9f503eb3cd00a283e88ce119ad7353d17554059e2c921c370b77d94ccec46b39858b31e039d04a974e8da95bf30daaa
-
Filesize
2.7MB
MD54bc2ee2600d329c3faa285be6a2b8287
SHA1dacf21a8d3f5307f8c44b4cddc6619ed9d57c5aa
SHA25637d98b05e0f3636444a0dcd055a1a6fbfffdfd61d9a774594630c63cc5029622
SHA512fdb7deaafe58d5bcf9d874f946e23a468aed837ca57454b398c80a10b82e100e682f3f2c1a2732dd737d76721a584a6e8cb0d84caa68a901e27e81b17f1461d2
-
Filesize
781KB
MD570bb8f30b2bc6a0ee00c0ff8222362fc
SHA1ce64a31cc80d08f7ea4c456394be25f3f58ec08c
SHA256b5c2442d566efdf3605c0f066432bddde8086bcc9e561724cb5aa6e47087bd96
SHA5123055f06ff52b696d1f491255503d53cf110d0d71a9bfac9e9624ea05cdeb2afbf6c1fdedbde881a03cae78c3fd0086b74ef3bc6a4d3e5f67da3f832eb6b8a370
-
Filesize
1.1MB
MD5f0229ca48cacfef2f696467b885dcd1b
SHA19bf8caeac13446f5d5ff860e090db129909c637b
SHA256aa4ce0dd3ab9fb27bb81393ffd1d3c82f164c4e2dff936ad03657aa38d53eb8b
SHA512840c15e10f084d6e0d21af7e14c3dc07202828b682352a77b3664f2c1f6e7d08ad6637a2787ea9d41270b82366c948658976f2e19870aadf1ce4042b4ead6302
-
Filesize
1.5MB
MD547732dd74037aab2f685d5574772d39e
SHA100c7871c5e91c10f1185cbde49efa415494cf9e8
SHA25645741060f80c77cd2715c3e4c3d06cb6f3fb8363b30e996c68c243f053048d28
SHA512bc9cbaa5bff006513aafce2427cd8af45a8cda19fa4d675fde56295b481c860b93c1c1083a5d3a027af4b7152616e0326b08dcba0e9c2112ae6129c268eb0a5e
-
Filesize
1.2MB
MD5c266803255de5364bd7424621b698f33
SHA15b335b3d7e2ad9dc98bd407772bbafc0ba54fff1
SHA256236ed933aa659961954ee6413fc08bb65dbf12aacdabf5dd86ccf4184b938d3d
SHA51229ba26beacd6cce538c8643d0933f8ac8c5cad3b35f806a0802c344dbde59cc8ae5e0f65615d904ffcf220e1ac797abbbef84e83e7cf0e95f2482238f746f355
-
Filesize
582KB
MD5bd326900d4d050e033b209d38ebaa465
SHA1cd9ac9bbbe650844b743b30f27e791ddf768c8d0
SHA25661cc82a1f7cc8fc0ef0c69c75722520a88b0f6f5d18005c98edf5c39eebfad42
SHA512d622c651e1e37dab3648d36eae86511c19bf68ed83dab6fde4e1dff3f267cf662b596250f30d7a2ae5ef2856d5ce35b501b550d422d1febb32929091e491cd67
-
Filesize
2.9MB
MD5a7029130284cf7c7e7ddc5bd42d2c3bf
SHA15f87ea7f3bdc49fe53764666ed513d87901c224e
SHA256b5c9c2ad7cbeb114427393bbc3a1b008266dae9ce74e6de8bb35804f05149f38
SHA512ba7b5c64ad69130559b506d9f65cc1c972b18e070d64308ce0e8d6d17bf7ec508d36919156494d135444d929b216907aeccb8d10521931bea66ef8fb800e00ef
-
Filesize
4.8MB
MD558a7669130042ae731913915a955f861
SHA13004b2d681fe8debce39d97ffeaf12be19db66f1
SHA25677f197ec3f9d744882703506debab07e3addc746bd5aabd5f066ff6afd7cbd1d
SHA512b7470dfd512407856fd362a4583f48c11585b6d40edaebdbbd014ab1c707ee59816ab0aeb92433c27475a39f93f1900e2286cbf6941eb8b2b02cc5040708cf54
-
Filesize
4.6MB
MD560280f8c27b712b403aa2964a399a31d
SHA1545acc585f073eca78bd6299739cafff935de76f
SHA2563415a709533b711b74eba1f99c1fec789ff4cc31fc876f87625bc1ecb812ac3c
SHA51246ce2d8176a72cbee194b07e94c9606436b43cc7956f91ca4f9e1f25f711d71640255981680ddde5df3a211e30baeacbb9a82a9bee6b3474969fc343c9b4b686
-
Filesize
2.2MB
MD50199721b7da183748084dcb8556a7fb0
SHA1f6f137ad9fcfa9c804179ed0d3d8306da2ccd4f4
SHA256bf3fc562cdb6b23e781ede1c21be8b455970f7bbe3a7227ca8e9acfafbb23663
SHA512220113dfcfe219fe19719e74f1724135d08da6182ed9a46db87f0fa667cf83c3be987814c7dcb26aaf0d3199839a33b194d0ff4b0f810a9d147f753b82a966ce
-
Filesize
2.1MB
MD54ca4b94679db37a41a981800019233de
SHA138743dbea722d2a18d15c350aa70cc42c16529f8
SHA25602900a6f656ec483184c68aa641ca147afc573b6b81b36c2e023abebe5b74bf1
SHA5124508bd706328f5e535d76ba7c9f6b853c5b579cef15c61416b7db98a738b282f86177a7671fa4460d0f23cf48333e6ff0c5048129faa5d959a7693894da3bcfe
-
Filesize
1.8MB
MD50a75c12203978b65228733c4fa31c2ba
SHA1692f6f3876597b0c50b2e0c09f56daec97670b48
SHA25640a5a201e08df6453f46841e427dafd5de1ee5f5b6393478598c976d3f8355ee
SHA51248b153205de74df7acae1dab4c26fd2280538016efa15e1805a4e7929ae27ded87cf1cf943e9ed1700cdc8ce0e04017373bb68263a757177e787056bee1e035f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b91050d8b077a4e8.customDestinations-ms
Filesize24B
MD5b9bd716de6739e51c620f2086f9c31e4
SHA19733d94607a3cba277e567af584510edd9febf62
SHA2567116ff028244a01f3d17f1d3bc2e1506bc9999c2e40e388458f0cccc4e117312
SHA512cef609e54c7a81a646ad38dba7ac0b82401b220773b9c792cefac80c6564753229f0c011b34ffb56381dd3154a19aee2bf5f602c4d1af01f2cf0fbc1574e4478
-
Filesize
872KB
MD5e00d0f89a6964cead448f5c2634a4e91
SHA1ce5d0aa75fa366510e4a5ef5249db0a7c00ceff9
SHA256d62c4f85c5c6d86476102397d4c7430ab5ee01e7a8e4c754946bd1060aac840f
SHA512de2b200a097893e3654887a22f2cd26fd4bc859c8031bf43f4f9eff9d8c0e619ec6f0f844c140bf6ef2d7d9e033b31b98fa78955e6be3264356d091a55bef5e6
-
Filesize
678KB
MD5503ae7d04c30204931bf8f39b0a3077d
SHA18c6d37ed8137836739f26758bfff1bd7039d388c
SHA2569cff2e52728a5a731ad40dcf65bfd9b8f77f886389ae73e8653e228660a04aba
SHA512a1223807b0430d42c293b336f9890824e0fd6e3aed1d06205bd811099488c8e70c8482d997a13a53f25322643aa91b3d0e6700297425ea22ab303c2fb2a1315a
-
Filesize
625KB
MD52d7c8104a93b86cf606a93e97dfc678c
SHA1adb2f95ce440468f17884505f597b5bce0f935fa
SHA2568e5ca4270525ba557538b2afd5019479d806903f4a5e6aaf8da884d8ef1e3194
SHA512d138f093dc8f506da4abbb9cd70563170b668ab47d52c3567f9f5658b4ba3189efd9e7db692da8ac22f1546ec23d65c036c0899f656bf2b20a3962f2632b1570
-
Filesize
1003KB
MD5136e080541d06da93df797993f513165
SHA1fbe25001cd2da3024d86a8b7a9e8aec0305dbbf7
SHA256244c80f429f2a9ed4b1b828edbe3d168b7afe462da9d4a5710770434aa847884
SHA512d3b6d6ac35b86c3ce3d4f4ffeabc36069c7d2cc11f04c7a1c8de9a26a19b96b2f3c76458920f74cb85b3775d8296744558e6eb1ddbc38fb448dc1313e984f1a1
-
Filesize
656KB
MD537184541a319ec13ea0d780fab77d56f
SHA1003ebbfc7d87f46c32717d11d90d3a7f50e74ca2
SHA2566aed2ce374d83222901aff47f615f39d38283df5defb162698ca23a46abe330a
SHA5123c9afbc335733337ca400cedd21388e4ccc26a9a660ef7fc75d81a95f3286ce10edfb5d3d001cacca109b948136ddae2e57f19ff1d9672cc7ae3ca495cde1e89
-
Filesize
128KB
MD5bc15708f22b3526007fa91db3b998d81
SHA141bfaa5cf40dd787486bf8a278fe9edd8164117a
SHA2564f47c0c3e0f7e77ec07b69306a03c64f81a7193d71f4e151d750fe7113d1ba2b
SHA51259265464f975e48ca31bab16d90cfd727d16ab53619087ea2ce25ab64c04683eb0ef762a6f1364f31767a8a2d0bedb5be38b0b375984435d243d42dda690c2cc
-
Filesize
577KB
MD5b4a265af4e22d71657ac1cac964450ad
SHA1783d230dd972acd28f37c0586e5f38bc6600a5b7
SHA2568acbb81400c6f047b41013f78bc56141190478544af4e3c459deef476e5d651d
SHA51276373fb2ccdcd79d7043872f87eed41b39655eaa41ea43e34e7f769c53fece7f5cf95fd4f0bbc4fd2757d31efcfd64d959da4ac57f49f108df1689753889bce3
-
Filesize
1.2MB
MD593efb8562a70c353a554d10f3e41d47b
SHA1bd219ed7e9db12f53f8e6c0483d721c9828e03ea
SHA25636c203f48bb350a0300252b5c2eba883ed4ceceb3cfb1037b3113bbd1f900e2b
SHA51258ca4b9ff05c6d01e95b8af9bbc1625d78c508df4590619bdfafc61098290e79a33ab49d89019af92bb82f0e3f9d426371f75376e206e5a6de3292c1815dd7af
-
Filesize
799KB
MD50d3b12acf05fab7298523c5a9e03d4c0
SHA10249423de1e91bcf05fc50769e4209914f939b53
SHA256daf41bcbba5027cc0d22b004de5f39bf0524ad011d77f25b730641a6fc0aed0d
SHA512cce27687e641948d7953e86560e63c7c52da9bab22a07afd5b191433de246e9f9b7d55f1f026a371e925f5e0159df4289a6d8c4998be0e9d137912b8cf7075e9
-
Filesize
648KB
MD5f5ea8b0cffbcbebb03396d9e56c4154c
SHA11a20d185340f35406821d51138db6e57d6650032
SHA256b8e1dff8d335f9d793f75c5e60b4921c24df63ee3ff9d157dc47e8ec407f3f12
SHA512ebec7addf40623a3d538f2bf3155d394f4f1a47310f3888a71ef87e1ce19caf06059c4ceb7ccd5b15ef40d0f71cb6507016a67000d93e4fb873c05f1d1a64029
-
Filesize
603KB
MD5192953ab51a44d311f32b6b711ca1d54
SHA10aed9bec8c0e935c94996f9bdb1f1e1ad1038b2c
SHA25623ca219cf43605043b88988bd0c7497df9bd88413d2068f894e03b53032311d7
SHA512b1b4f9fd7f9f588402680502c0688f252cd77c3b70aa30a81b089108c51f5abd2e5e3d9202652baf3b76f09e2d3012960f05e64d1ebd10799828a0d22187b572
-
Filesize
644KB
MD5526ca70ed6a1735dee27a32fab522200
SHA10d8d67e6cad9ff1bbb25f124ad89baee497dca65
SHA256d746f378391f5d2116b6269371a106ee44f479bab21d8dac0c2f77202b23020c
SHA5122111a34e225168e754202d78a9528ae79245b33edf8616fdb82c31bf5b3113024a75d8957fea4103c9f131aa9e64b27e6dfb436fa1d5f0518097fc586dd9bf2c
-
Filesize
256KB
MD531906e7e1fa7b064a7998fdbeb611808
SHA17b14afd791b8ed70bc15ebf20d7d419ae6150eb0
SHA2568fafad108de0c5093d3a304afa8f87103235bad6cc61a4a5bb7ae7a1c57b8185
SHA512f8e5996da9e13436661a93b1c02f1cb7c4ee724a9d5624e1a8be9e725c0881a9bdd08a46a7390251626c63dc5dc06f8b327c87e7472404b523b23ec105d1c8d6
-
Filesize
691KB
MD518f210ddc5c4366f8d1529e830bd2569
SHA1bdc5be9959e4dfc2dce0cd56b1f399509f049af1
SHA2560dff617788416cc2bbe8db65c2df6908a4648e7e8555068704c7e6d372bcdf76
SHA512a16420631c35c798190d2521ad7fc6952fb59138d0eb65d0a404bfe4f7d6e001047da0aa31a028548bb9c398a39762bd90472dc64b1167a825d7c219529e3b18