Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20/04/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe
Resource
win7-20240221-en
General
-
Target
2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe
-
Size
3.2MB
-
MD5
b2a09881d6cfbf55eedadd2b2b20e346
-
SHA1
ee0d5f341bf7fbc44add6aabc77a3ab9b5820009
-
SHA256
4ea22f5f3ae8ad52a940fb39be1b330a5ebca491a81e9c885077702115ada76d
-
SHA512
0836d59f61e836321c73a5a0ff95a544ddf2e84ff093dc83173c404391483eb56a42326cec893c6c1112bf55df55939429bde593c4ceb2a19ccde6da1c6d353e
-
SSDEEP
49152:75k1YCdptya507NUUWn043oHS3fTIYwVq1/xT3DDbw0TUqydf9Ckt7c20+9qNxUW:PNhSMYw8yFfEkKK90
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 468 Process not Found 2588 aspnet_state.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\alg.exe 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe File opened for modification C:\Windows\System32\alg.exe 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\6d8a70baae4ef42b.bin aspnet_state.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe Token: SeTakeOwnershipPrivilege 2300 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2652 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2300 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe 28 PID 2292 wrote to memory of 2300 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe 28 PID 2292 wrote to memory of 2300 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe 28 PID 2292 wrote to memory of 2652 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe 29 PID 2292 wrote to memory of 2652 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe 29 PID 2292 wrote to memory of 2652 2292 2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe 29 PID 2652 wrote to memory of 2908 2652 chrome.exe 30 PID 2652 wrote to memory of 2908 2652 chrome.exe 30 PID 2652 wrote to memory of 2908 2652 chrome.exe 30 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2384 2652 chrome.exe 33 PID 2652 wrote to memory of 2412 2652 chrome.exe 34 PID 2652 wrote to memory of 2412 2652 chrome.exe 34 PID 2652 wrote to memory of 2412 2652 chrome.exe 34 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35 PID 2652 wrote to memory of 2848 2652 chrome.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exeC:\Users\Admin\AppData\Local\Temp\2024-04-20_b2a09881d6cfbf55eedadd2b2b20e346_ryuk.exe --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=92.0.4515.131 --initial-client-data=0x178,0x17c,0x180,0x174,0x184,0x140221ee0,0x140221ef0,0x140221f002⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --force-first-run2⤵
- Enumerates system info in registry
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fef5fe9758,0x7fef5fe9768,0x7fef5fe97783⤵PID:2908
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:23⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1464 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2412
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1616 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2848
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2312 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:13⤵PID:1900
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2332 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:13⤵PID:2016
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=2844 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:23⤵PID:1500
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=2888 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:13⤵PID:2260
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3172 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:3048
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3168 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2180
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3400 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:928
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3892 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:860
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=4268 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2816
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=1436 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:13⤵PID:1756
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --configure-user-settings --verbose-logging --system-level --force-configure-user-settings3⤵PID:860
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fba7688,0x13fba7698,0x13fba76a84⤵PID:2676
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --system-level --verbose-logging --installerdata="C:\Program Files\Google\Chrome\Application\master_preferences" --create-shortcuts=1 --install-level=04⤵PID:1620
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\Installer\chrmstp.exe" --type=crashpad-handler /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler --database=C:\Windows\TEMP\Crashpad --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0x154,0x158,0x15c,0x128,0x160,0x13fba7688,0x13fba7698,0x13fba76a85⤵PID:1372
-
-
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3308 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:3056
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4184 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2196
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2888 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2384
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2068 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=2032 --field-trial-handle=1364,i,964506396416737565,3864776276406163656,131072 /prefetch:83⤵PID:1564
-
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_state.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2588
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorsvw.exe1⤵PID:568
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1996
-
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v2.0.50727\mscorsvw.exe1⤵PID:3060
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe1⤵PID:2664
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1e4 -InterruptEvent 1cc -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"2⤵PID:3924
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1cc -NGENProcess 1d4 -Pipe 1e0 -Comment "NGen Worker Process"2⤵PID:4932
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe1⤵PID:2736
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 1dc -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1d8 -Comment "NGen Worker Process"2⤵PID:3032
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exeC:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe -StartupEvent 24c -InterruptEvent 1c8 -NGENProcess 1cc -Pipe 1dc -Comment "NGen Worker Process"2⤵PID:5052
-
-
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{02D4B3F1-FD88-11D1-960D-00805FC79235}1⤵PID:2680
-
C:\Windows\ehome\ehRecvr.exeC:\Windows\ehome\ehRecvr.exe1⤵PID:1020
-
C:\Windows\ehome\ehsched.exeC:\Windows\ehome\ehsched.exe1⤵PID:2708
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:2964
-
C:\Windows\eHome\EhTray.exe"C:\Windows\eHome\EhTray.exe" /nav:-21⤵PID:2968
-
C:\Windows\system32\IEEtwCollector.exeC:\Windows\system32\IEEtwCollector.exe /V1⤵PID:3308
-
C:\Windows\ehome\ehRec.exeC:\Windows\ehome\ehRec.exe -Embedding1⤵PID:3448
-
C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE"C:\Program Files (x86)\Microsoft Office\Office14\GROOVE.EXE" /auditservice1⤵PID:3516
-
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe"1⤵PID:4516
-
C:\Windows\System32\msdtc.exeC:\Windows\System32\msdtc.exe1⤵PID:4624
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵PID:4788
-
C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\Source Engine\OSE.EXE"1⤵PID:4912
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"1⤵PID:5076
-
C:\Windows\SysWow64\perfhost.exeC:\Windows\SysWow64\perfhost.exe1⤵PID:3824
-
C:\Windows\system32\locator.exeC:\Windows\system32\locator.exe1⤵PID:4000
-
C:\Windows\System32\snmptrap.exeC:\Windows\System32\snmptrap.exe1⤵PID:3068
-
C:\Windows\System32\vds.exeC:\Windows\System32\vds.exe1⤵PID:3100
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵PID:3212
-
C:\Windows\system32\wbengine.exe"C:\Windows\system32\wbengine.exe"1⤵PID:4104
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:4308
-
C:\Program Files\Windows Media Player\wmpnetwk.exe"C:\Program Files\Windows Media Player\wmpnetwk.exe"1⤵PID:3684
-
C:\Windows\system32\SearchIndexer.exeC:\Windows\system32\SearchIndexer.exe /Embedding1⤵PID:936
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD5c218a4a8137036179ebb5d551d72807a
SHA1edeb7423507c193455f647bce0fc969e15496fb3
SHA256f969b49d148e513dcaa6bbef81d2eb6f567b977b1444e4bf2d2d2d721653bc5f
SHA512fa52ee0e7f307590eb2e5a216a5d13e44166f2bdc270a8e451922f5f505289fa37c7781d2833dd6f0b7b52c0ee8220a0e4680cec9bb3e4eb659546e86a2dad79
-
Filesize
30.1MB
MD50093c5ebf9a17b074f0dedc42e60845a
SHA1be0061ed0bbd8dfe0481215c82f57e0dcf91c595
SHA25694a67260c4bb6e7a9e057464a8cb573fc3b7c939d2db4bbfe361ca2fd034e166
SHA5124f19fa8cd6b677d57d8fc85981eff6dd98fd77f0f418fcc70816e0793cd199acc3d91642c3b1971fc47558a7a1e2125c1c318d92033dac0997f182b45048b6d5
-
Filesize
1.6MB
MD5e214cc03513177b495a7f86b623c266e
SHA1c7ed2e869df4085b8ff82bb83fbe00d1c0a56d1e
SHA2564124217feac2d161ef3dd9035763401f22beaed5bbd989accaa037a3cf5e4feb
SHA512413e7bf7c42c8d3ebd61bf85dc6ca5bbdcf11bb67320b0029dfa5237bf4c8cf3f76679c9579db31a3529fa3b34e251b29505040e008afad99c0c34fbfe57b320
-
Filesize
5.2MB
MD57986f6491774753490fcc3d6551d2f18
SHA1d2bd1180eff987e9a98fd476e21ed1fa7759ba6f
SHA2564b8bba1d638a06b0f8f91737d179a6757d527dcec1571aef89fd3af7aaf9ba14
SHA512851877a5c6604f7d9215c9ad1fc577c05eaa08535075b41108d9bb8424ed338d42e78a92c52b3fd8a49fe6bce14039b55861f6c4100c6eebb9d70ee4c362c218
-
Filesize
2.1MB
MD58249923ae52cc423bfae1f168dbd66eb
SHA1f064a3aa228299a1379ac02aa92a97ceac2494d8
SHA2564840eb5c00e2c3a4ee8f14d544fedc2d500e09813d672ecfc3c800c8b258ce18
SHA512f937b32e800e6c2f93d40ddace4debce40ce33aed9fce3b96a857c98ce9e493480392f837d2d6a1be541bd597097529a84af560cb5cbd39bd9b04a2c12002e8a
-
Filesize
40B
MD5ecd8ebd0d441c0b49b641fbcd5444d17
SHA175760164655f0e440880cfb868a10a01b67b6c90
SHA256f46d8cdf1812d342e3b49ee242fdba78935d597ccdf86989d165e28696cf62b7
SHA51299913f343bc9df93bcd6d789c4ddb2378e7f49778836e844bee55de79a98c39a9793331a22c2e6b6f171fd3289c77586a4e32b9d9bbcefd68a0029f6d11d2256
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
987B
MD599247876f6999b118a6aff3cf7811088
SHA19b59750ac40eacb88f6ded01d620a8c9117ef458
SHA256f9d0d49c44134ca4bc54fe0f1d13edf517da24473589f8e44e68aac4044df91c
SHA512b6ebe6aa62a7243bf0f856569a0f3283885866609781cfe6994cecb109b47240421b862461bdc7340b278251fb332190c5a471f287715251ec5cf48a5175e271
-
Filesize
4KB
MD50ce25b8f56845f18798be57d8228bf3f
SHA125eb382acd6ab91027a046572f5bcc8a7c15d9ee
SHA256d7f1ebd1719ab4002df353b5f7de4cc2de27f7a47333e89e2d2960b69ac984cb
SHA512904543cb5a3e8e8302114e8566601763b5ae77392f83929420298ffba420d1c63a31eb89c29ae92f16823cf946ba64a0fe92693b0051fb6d700015a9b5c9ce99
-
Filesize
3KB
MD5f24e84800e2264543aec1175d5badefa
SHA17152b4a38a6e732afb6fc038065e03650b4042e4
SHA25682c94edb87eca0c12d5c38fc0c211a0ca24b9326b661b22c8dcb2301bdf0e265
SHA512aba343f470ce42728fed26ef88ce26a6a1048ad48b49e520c7d8be6b0b8f502e9fbb2e0f9a96ad635a9cabe9d68b3362323b2511faa5be93822d2cfed6cf4dad
-
Filesize
5KB
MD5dc30671ac18720730ca5f2c4ff730015
SHA16f7ca2a98360995a6ee09a085db68bd1375fabcc
SHA256294b77b62bcb531cac6512a70141b3f3e49ebb366ba6ef69e6b55e598079f94f
SHA51280e23cd4006f83ccce6c0ff1c1cdb9d5944812f05d6a9dc66ac7eae93caf2293b8770327fa20718288ca1dac45a840856b5ffbacd20144a1a7e619b405fb610b
-
Filesize
6KB
MD55fc6ce2854ffb5ed20ae3ea193ebc53a
SHA1ed9e0341e8a3e90d2143b30cdead53d50e161c68
SHA256f870459b810bf74e5e7b41d0e9cf1053d1874924355d018b40c8ec8370c733f2
SHA512bd8b4571d23647a5bf99e128fb3008fc139d0e46605a2feb96977770fcb8a4e43ef9c2337496817d3319823ee717d4c448322cde180d04a2184bf7be8f8109ae
-
Filesize
851B
MD507ffbe5f24ca348723ff8c6c488abfb8
SHA16dc2851e39b2ee38f88cf5c35a90171dbea5b690
SHA2566895648577286002f1dc9c3366f558484eb7020d52bbf64a296406e61d09599c
SHA5127ed2c8db851a84f614d5daf1d5fe633bd70301fd7ff8a6723430f05f642ceb3b1ad0a40de65b224661c782ffcec69d996ebe3e5bb6b2f478181e9a07d8cd41f6
-
Filesize
711B
MD5558659936250e03cc14b60ebf648aa09
SHA132f1ce0361bbfdff11e2ffd53d3ae88a8b81a825
SHA2562445cad863be47bb1c15b57a4960b7b0d01864e63cdfde6395f3b2689dc1444b
SHA5121632f5a3cd71887774bf3cb8a4d8b787ea6278271657b0f1d113dbe1a7fd42c4daa717cc449f157ce8972037572b882dc946a7dc2c0e549d71982dcdee89f727
-
Filesize
88KB
MD52cc86b681f2cd1d9f095584fd3153a61
SHA12a0ac7262fb88908a453bc125c5c3fc72b8d490e
SHA256d412fbbeb84e2a6882b2f0267b058f2ceb97f501e440fe3f9f70fac5c2277b9c
SHA51214ba32c3cd5b1faf100d06f78981deebbbb673299a355b6eaec88e6cb5543725242c850235a541afa8abba4a609bb2ec26e4a0526c6b198016b08d8af868b986
-
Filesize
12KB
MD584651f32fb734321109f342749938fac
SHA121875251c088ed1528eab5e1f93356dcc9212990
SHA256c3d6292cfa977b72a2f14ff86c31572beef2b5243a6c08ff07a097370b64c142
SHA5127a026744a81349bcf214d28fc37d62e32cea70d34aa3f7b2b1dc847b278c5beb93d4c21cacd66a8552cf165b55e2b9aa93da5c0beb60b9e30b73cd6bd40ceb81
-
Filesize
872KB
MD5bb77f2f02938693b2d817a5e3c830551
SHA1a1aa283117f0eabdea13dcb9d882c4768f6e912e
SHA25622ecd555cd5c7e21c718d04933ca39611eb3e7f7fac416efd436dc9bb6cdfbc9
SHA512e78047fea309666a3df734d48ab7058644d37581d9a2184e8cf28b99005ecff0e360342b416efcb1ae8abbc0cb1d3d91ac9ceafa2197ea2f70689c191d3ae8eb
-
Filesize
1.5MB
MD5a0a8e5cb89e479c3a2c176d21af2c11b
SHA1108198aaddeb9ad30323acb50f1065199339ab35
SHA2564d7d46205c6da1178102af52b0fb12ac4ee53f22281da24c7673bf9b6da8254f
SHA51241c1e51b07329432075e2415da8a4e0a038288dfcf7aa979064165665847b7d87d89ad18903f433c73f8eeead0fb4c40eebf82b65d186b9f3d0e8abfff60e70f
-
Filesize
1.5MB
MD5128ce3422324745ee55842eaa1a891f7
SHA1d199072f67b89c4c961f27a77db69b9b1689cd14
SHA25647037f7cce5dec628ca4b1ce1e3ea90983da090aa92c87b5371c055f9e43b5c1
SHA5129c096adcbf1eaf66c735602af8261676c0d393df9d4779e59a8f8577c0c945965278797366f805e5fa6765990463ba751a3c27ece4949881e335268543b5006e
-
Filesize
1.5MB
MD5a5277dcae1de81bc58c21b8d50d10f24
SHA1b2df2ba8e870d6078478f29aaee1d921e0c0d522
SHA2564108a60b094c96289984a816615e8ba947919a75ef66a400fb1d6dda6354dd7d
SHA5122ab4c4a21ade2cee4721da32708b9097ea46829cbad3dd00faa86aa70df79991ae878be6465442006ce8f8f8e4c79b4fd6942e1f8709c93e221bcf743554904d
-
Filesize
1.5MB
MD5889234f2aecbed795671355870ae6e05
SHA176dab9d3dbc98107bd984e13de928edd4c115586
SHA2567e7d7b10cfa89bbe2ccede7a3f2f421fb03c76799d4865395cf749641a800931
SHA512d7df3e6039ed340bf27ee1fcfe4ed3fef4cf7a77b74524cebbfbc71d3810e37d5737bdab5a7befb5f506b4ee8a52a13140afa7b864ebb0f6219c6b6756e5029a
-
Filesize
1.4MB
MD51bd7dee6e34f70a873d97434fe187c2f
SHA1429250c63574d6c67be0516a6d5d7e6c506215f0
SHA256a3e28a4aba1cfc99f5e5ee0afad19658f3cce9b762aa0b8bb956889f62ffd544
SHA512bd694240296e0458f3f751ba0977ae9b91cebc8298809b55c92032914ac700369012da51947bfc8d2f5c9f0c6b958d755fc5ff3ff03ef5f014b01b01c4c45b8f
-
Filesize
2.1MB
MD5bf1bd1c0f9cb0e26e8443dbecc468a04
SHA1e1ce8839681f49ae5b97cd1096285a6db480b81e
SHA256e99853fbfa2039f6435109d404a4e2f82e7712ff58fc7e33d29f84d1d1b6c906
SHA512549ac6b4c50198dfb23f017e1ada0067e159c78163153ee34d660579ef4b007b29e6e492e2333e2663d339c84d6ba8914a6c49c7cfd6d4f5bf475a1822eba08c
-
Filesize
1.5MB
MD5cceee998816a067c6b400176eca73ea3
SHA110b1c31de1e55014acf719f483bfb6f72c32ab3d
SHA25682024e3d891ae83b6509084e9830ed9adf5136648ff8c3be34a33a5ecf283794
SHA512541610c9c6334aaca2677e083c2327d34895a7bd4479336b42f26a74c650cf213dcc85f6b6d02c5e564453a8ac15405373780cd8c9240acf249c192b35ad4355
-
Filesize
1.9MB
MD55aab6dd9b7c3b356bb471b38a45efde5
SHA1d66c4b046b7920734d73ba028afab82b6c1276c6
SHA25690ced2accdae479c54f31228162b16765c812367c10854b8bd5b8cddbabe1f25
SHA512b541b51f3d505431044d173fe7430cda4b743d5b113b91bf00d0ebf5d4bcba185883abf6bf01f6ff14c7b5ce1187dd0bac00c1eaf47c4ddb318110e4a66b8f50
-
Filesize
40B
MD5bc60db18d5846706aaf5eafaa4b44219
SHA1d8b47fa28262e888e2b30869a8c965054b0955b4
SHA256d52729945d95df7359794646745525f4e9ec805b44e4d1b534694e3f7095def6
SHA5125af2e051a19cb8dbc10612f6e43bba90b3089b70520f5522d85cf2e40cebbb18deee55ab0ed062ef926a6079c71b9504f0cbe48459271d6d7dc0c728c204fbdf
-
Filesize
1.2MB
MD51208c61e9d42596e03d2203eaca2d623
SHA1e4d1026392a15c0296e3bc8111e8a512df83add0
SHA256b37590117f18ccd43c5f340003911b9193d7d521c73d58044e3a3ef48dca93aa
SHA5123ea6148ed612589ac45b48aa8853391ea65ad84aff9cdae0965d8e5f620bc39e7e50efdea6120ac2710ff6556be311168951a3c523b62fb57793cf6c26dfd1fe
-
Filesize
1.5MB
MD532249e74b9b71ef6b507a2dd0ecda862
SHA1b74d08489ce5f85bff399b00c595ba05ee772d3c
SHA25658391a4c414384e8658a65417819ed5d48ff4a686b096eeb09655919d48a954a
SHA512f156aa4206d2b056260a682fa4ec6cadfae85624adc40e8d94c0c5820bbf16cbad765154750158b8a79428d0fbf314b0ccbe18746ed29686c6534de8d7cdc3f2
-
Filesize
1.4MB
MD53c32d1225c92b1d0a9dad128938e7f2f
SHA14d1f416fc0521bafab47c211dd18f44e77b0dcfd
SHA25659f28b045e171a6411337d292738823d7eefad470b80dbd9b353a662b479a9bf
SHA5125c14797473c0706c0ed2f0fcd2da375b7547c1aaaca3372dcd228eaa5e7c33de5974aa8f9db4a6bf4ca1cb05dd32dfa91e3ed7a9150aa04f3a388c780d6f6c58
-
Filesize
1.4MB
MD5efdfd8d7f5b192c2fc92397ac6d55850
SHA122c40a35b403e00569d6b2d0324da85e9ddd8d81
SHA2561fa554a6903af3bd72fbc51778c07ee1c667b375434d6294787a696cfe475e0d
SHA5122dd1d9cfad77e7436245ea93bc58f198b0c999f7df8af1de66df444afd8383beafd9d4a180b6a391175be746f032a80ce266f04354fb9ce64f1bcddb6bd81ed5
-
Filesize
1.5MB
MD516f4e8bdc29a0d86a69d7a927cf46905
SHA1296cd0029bbac12d197a57776b842950d99c20ea
SHA2568b85b19652d7d8d4bd89a5e7e5fe48bcd2fa347b06debfbae7645eca85ae4b9a
SHA512d3fe3cfc9185b3dc519f2df874a569cdf12553fc5bb08f60451ca37274e51db7b6592f928cd7639e174dc33aa3a1e662084ad51cec5d35ba81466e26fbbd0a3d
-
Filesize
1.6MB
MD5bb7df04e4f7ec9c3e563d8e50bf38cbd
SHA18402ac0f37cf42ea66427426d439b31c82aee2b9
SHA256a8aacce11283f60e4068ce52ebff8e93fba31fc0fd2fa098df57f8ddab1d755c
SHA5124d834e4bc6c903d9a1ca3e37db661e7b9843bfdf1cbc8992592696132b4665958cd4979eb8a38711fa13b6d11c94b64cfbc1db2786a808324cc44199046d575e
-
Filesize
1.4MB
MD5013ad6be8def53d97bf45dd27287987a
SHA119badbd72662be778157c55b6e3753cec048c78a
SHA25607e28ddadda5e16b2302ba21f75f589e4bf15a8e4c6f1d50ed743b8e434ef5bd
SHA5129831fa9ef848a0b682f447c8310c82bb6f3b9ec0ca57cf4ff5d9c32242ef9539a2ab28c4f243b1677b635c60b1a68bc7f76c272086a0a407ef6ddd155f5fc232
-
Filesize
1.6MB
MD59aa726881b9141a59e6f8a365affb50e
SHA1f48c73509ccadb13d71b3702f003acde62ea0c61
SHA25655d708c6de3b54940f9e2b49b6cde5468693621457373b7ca2ce11b47174668e
SHA5126188f19d3ef0ef0dd8e79e7945a3598bacd01a333f57ce3758099eeafa2fce03797abea6dd5ad29a4988b57c4863dc20f2fec5364020d9b52d38e4fa24bfafc1
-
Filesize
2.0MB
MD5005726ef76e612ca0452d0348a0f5c66
SHA19aa77da7440fadf778327a1e02959fd174cfc7ef
SHA256a9202750e6318a262acf1185d502e5d3fd550f77bc18572e4ad88f51ef27c1d5
SHA512243c9179e0028f38b889365965862c95dfe3de5e7746fddc79b317e291654f000dae91f3db67b14c6b35b72e723535d9731e50f3d9c9fd210b861d064a7ee10b
-
Filesize
1.6MB
MD544564dc9a93a062ee405470f21d7fb2d
SHA1b89e3ec2f51ed3c7f7cfb16f6799278aca36875b
SHA2567ddb1fc9e5cac271361bb055cd83ce77402698a96d5e56a092bbffcd0e5c2749
SHA5122156158502c0cd298d352e487d1040e885a404c4ba7287768f9f2d1ac59210557b671607d021fc8e70fc0cf109bab8d326053c2acb695258f7e07fc8dcdfb349