Analysis

  • max time kernel
    151s
  • max time network
    102s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    29-03-2021 12:47

General

  • Target

    3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe

  • Size

    200KB

  • MD5

    ad3a5956dc4e8fd6a62671a6204d11b9

  • SHA1

    aac34bd5c2f8e63dca20034f24384c2ce1d641b5

  • SHA256

    3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

  • SHA512

    23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

Malware Config

Extracted

Path

C:\users\Public\RyukReadMe.html

Family

ryuk

Ransom Note
contact balance of shadow universe Ryuk $password = 'nO49CJnf9vO'; $torlink = 'http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion'; function info(){alert("INSTRUCTION:\r\n1. Download tor browser.\r\n2. Open link through tor browser: " + $torlink + "\r\n3. Fill the form, your password: "+ $password +"\r\nWe will contact you shortly.\r\nAlways send files for test decryption.");};
URLs

http://rk2zzyh63g5avvii4irkhymha3irblchdfj7prk6zwy23f6kahidkpqd.onion

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe
    "C:\Users\Admin\AppData\Local\Temp\3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2028
    • C:\Users\Admin\AppData\Local\Temp\yWYtpLDZgrep.exe
      "C:\Users\Admin\AppData\Local\Temp\yWYtpLDZgrep.exe" 9 REP
      2⤵
      • Executes dropped EXE
      PID:1656
    • C:\Users\Admin\AppData\Local\Temp\JSgvXAElzlan.exe
      "C:\Users\Admin\AppData\Local\Temp\JSgvXAElzlan.exe" 8 LAN
      2⤵
      • Executes dropped EXE
      PID:2024
    • C:\Users\Admin\AppData\Local\Temp\stEIUmceTlan.exe
      "C:\Users\Admin\AppData\Local\Temp\stEIUmceTlan.exe" 8 LAN
      2⤵
      • Executes dropped EXE
      PID:976
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\*" /grant Everyone:F /T /C /Q
      2⤵
      • Modifies file permissions
      PID:2716
    • C:\Windows\SysWOW64\icacls.exe
      icacls "D:\*" /grant Everyone:F /T /C /Q
      2⤵
      • Modifies file permissions
      PID:2728
    • C:\Windows\SysWOW64\net.exe
      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3392
      • C:\Windows\SysWOW64\net1.exe
        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
        3⤵
          PID:3672
      • C:\Windows\SysWOW64\net.exe
        "C:\Windows\System32\net.exe" stop "samss" /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3304
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop "samss" /y
          3⤵
            PID:2816
        • C:\Windows\SysWOW64\net.exe
          "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3008
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop "audioendpointbuilder" /y
            3⤵
              PID:3340
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\System32\net.exe" stop "samss" /y
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3596
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop "samss" /y
              3⤵
                PID:3608

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\$Recycle.Bin\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi

            MD5

            000f89565956be88f01072d8b1cd58c6

            SHA1

            827f8f6b16599bde5d155fab79ecbd3f54d701f8

            SHA256

            a9fc12264026af82bf19a4d451760fe098bbbbca8fa8d7aa96e36ebccfa3587f

            SHA512

            dfd5437eacca2e1a87831d5c18a3ab83249e2144fe9612b9afc34e080ebe1d129c8d865624f2f823ce96c8e297f99abcfc72551e605bc0aadd1e6a1c572d0b70

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml.RYK

            MD5

            5ad91c0e45c3886086f2541f51bde5b1

            SHA1

            99b1df5cf0846dbf6b7acb6d99a4b243c99c8758

            SHA256

            1af653c462986ea4203f09ee285649beb041b9d0681f76bc6c277bce75ae880e

            SHA512

            3bab37ec78ec2460ff96ce82505840496b4b8e9a65d4cc7318ca1589f4ea23ed1ed1c44c0ac17036cbeabbacae3cd2126a56b04fa7fb4208cdaaa35f7e208620

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi

            MD5

            371fd93d37587582482241a1cd86e43e

            SHA1

            8d56875b0efab094b4d682c6e75a69b3f82c1d7b

            SHA256

            c622110f5d088c8fdafc8ee8fba2d7dab1e0afda1fd7490ed505e4a5aa7f846d

            SHA512

            348211d68e84167b41cedd587afb246495b84570771395ea858de838fdd3df5a9ac88c67ab741fe3e733453ce7f0f48477660a8a50aafdce388771074f28f014

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.xml.RYK

            MD5

            b26feb7a5721123711d36e02c1b8c273

            SHA1

            c529623eaf1a252922394b28f7aa37f223643476

            SHA256

            3e5531736283d1dc73660d6f4aadff0ab71ff3714728099990aad985c906bb07

            SHA512

            97fb20dcb7323db6d58ce200ca5eca4150c44c9afd4c71a0ae4bfb6e8e8c0b79a5e4a35323a604e6f33af35682ca01d09116c4b7ab5e410872a2ed52afda515e

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab

            MD5

            663d3658c4fa7e9b174063693a9e1ebb

            SHA1

            e3afa7dbe20198ab2a294bc8c28fb75d625a1552

            SHA256

            5d5edc02cb57a730ddec5efabb0a5e19541716d3887e62830179e3c0a6117616

            SHA512

            5bf45c4210a4dada5787be1fd156909e547479c55a0e0aaf4620390428d518e07cb91338da3a01cd94d26d49446b3ae94b7afbfd71a902a0c9005003de816fec

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab

            MD5

            2612f039491b783cbc5763befe2e9a01

            SHA1

            dfc5432f40109e9ef2f612e6c20ad662cdca18cb

            SHA256

            67e30f7a3e91c33d32d3094f9c0e41b4ec98087859c2f39e164baa706fac8f7d

            SHA512

            439927b778b7f8c0f894f5e6775f1a97c7b5d5ab621302bca435ca881c5fdcafe1b4970bd2a1f35bad9c5a55b53194d05f07dd100189bc44a29af5a864ecc481

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\pkeyconfig-office.xrm-ms.RYK

            MD5

            551e794633725086602d783926515d2d

            SHA1

            58d9c192fb22f2308849fc0e4b1212aee68f7c8b

            SHA256

            1d5c945093a79df9b667de7c9b86ae909b5fa144bc56727e3800a1ded75fb995

            SHA512

            ac55305af7f55375e8eac9968225ee76898a85758090e13012df46c602f1afd7768c7015a56a3cefa2e11e65be2333b0ce1ec4f64ededef8abeaf4d57e725c14

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelLR.cab.RYK

            MD5

            26a75dc101054bec792b16f7f03a7fad

            SHA1

            65cacaa95550fbd256cb1b36d75ad83ee8207b75

            SHA256

            3a961976d1f6546e742d46f1cbed2f44ca5d21e228617fc4e1a138bdcedd1898

            SHA512

            4f20db05067c67182413d0cf455c94ca2206efd90686bac959e28d9599b0982d38654dd112a0ff91726743bb0454bf53065ecdc7b4f44eed723600c34c400378

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.msi.RYK

            MD5

            2118ad58e0597fbe1497fea0fd6a90d5

            SHA1

            73bb98ed483d10e8e9a328f24c87da4cff87bfe7

            SHA256

            34cbe8c5756db4581b9b5682b0003ee804e634c1ecf35084631181e2c27d8a46

            SHA512

            3c1a1267a0088305b2b844c39654706fd3a675243ebf9a13bc6aab5091822233bdf86d59807c0f5b0a0a327e0769aa969a2684683b68bed8c833948d6ff57ae8

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.xml.RYK

            MD5

            d7b43b0f4521368e4e2a659e3fe9161d

            SHA1

            0342c27e3504d8758dcaf7b36cc6481dd749572f

            SHA256

            dc9d7cbb8cb1e94e73d4c805394627ece540b4f8aa006fb3408cc94a0e39f9f8

            SHA512

            adab1411eb1e67e93a10e412579e86c3058d4dd991ee4b8aed050b7775b594986b133790ae11f1c87b582827988405e3d4255333af42694da86d1960417be037

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Setup.xml.RYK

            MD5

            e8128c04fa295f302261765bfea05a0b

            SHA1

            6692b0cf0c6e42fd35dd07bf8f3616030bff8c34

            SHA256

            e789c7b4e9da6efa1d50dbf2ef74f658c25446bb8a12908d35100aff2b370f46

            SHA512

            3fc9a882d410368282d53a3d3734200b71c3dde8ce55e0742bc0b3aef44a4baae69ce9a12708deed2e9331ae71bb83564246e6f10783dc2d218573d4a58119e5

          • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.msi.RYK

            MD5

            ef10ede446cb62da3d11895088415341

            SHA1

            2131d5cc1dad70c66a661c801dd385765810d65e

            SHA256

            ff76f2e95be2f7508dc44519f5221f99977184a20bde040c3fa58c27828707b5

            SHA512

            dccfc6d7353b5a2f30965ba55dc7b4b3d5753ed1fb2759dfbf65578d7966736314d713fa441d4af305db046b00f5b1648eeda08b29242f8deb802c896f8bceaa

          • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.xml.RYK

            MD5

            74376fe29e8c093e78354a1bda56e489

            SHA1

            325754f1d2b44cbb0147b10b73645254484d5159

            SHA256

            4d7fa076e7bcb1e36544bb9af02231efec8e4b26b1c61a7977f85aebb2168eef

            SHA512

            a6213ff3a07386581394f5aae021649d7d6b0ce620ee0614fa00e6f72bfb7e935c28439d1bd8d5bc775da4bf186f95e15435e6d8fa9c6e2cbc3c1b7e92b4e267

          • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PptLR.cab.RYK

            MD5

            4c973702a4e0916e7818aa1d497b8abf

            SHA1

            47d2e520860b5af258b4ca518b50cea62f72fc51

            SHA256

            4fd0dc52913cf1b3e06b18f067795ae6a6f089bf6b7ad9b5484e3be830eace25

            SHA512

            7af04fd39332f76c1afa6c4e60e28d45faee6bcee3d8a16ae1784258a3e89e8e5b83d89da32b26102a44d59b00e505b66dc135175b722480f1a77c7388bc55ac

          • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Setup.xml.RYK

            MD5

            ebf80b9c1c59bec6c6bfe0106fb31e01

            SHA1

            04e7e5e9eb385678196856d32d0e400cae262673

            SHA256

            6f14b761545dff6f218d7842c118b57ff9ad729e1793b889e0a692b896a5a3d0

            SHA512

            267babd6cc3275664509a1a2675506512a0d6414e79c7c20e19d0c5ccb17f5e54be892c296053fcfa0907e5a8012e8922bed22a2311053be25948ed1b3e291f1

          • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PubLR.cab.RYK

            MD5

            49758a6d19c25a544300ff98a0a0539f

            SHA1

            1c68de0f2e499ce28c0b2fd45c1476a943e3b6c1

            SHA256

            9e46a91b5f67a4d4720c95b3eba0d4dcfaa840c0f7535a09fcfb94ac7e81a0db

            SHA512

            ccc0edb0120230a6b3bf4464e8ab16666dc2d057641a75feedee60ba34a94dc948181956fdd9b8fc3e624263adfff26d276b93ed5658f101e80316ccb8ac858e

          • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.msi.RYK

            MD5

            ebed656037eae082e145709f5f3bb61b

            SHA1

            f8c07a949f6c1c09fd8a2298589aa1dc3de7f23f

            SHA256

            66e217f3b47014279b3f3907c48f7061ee116cddda52a657dde5d93da45c5267

            SHA512

            f1dbf7fa68b5f8e175c3094abed1d4a983e475be44503332cf3ab497eda0b625799ec66a35aade4907952da8cd685defee4a2f60b9d4fb93eea3bf7384ced683

          • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.xml.RYK

            MD5

            7b83f5c0a63942b0a83de82f088c518d

            SHA1

            9c0ce9ab747cbac192e3c4438b688aa81914c61d

            SHA256

            ca89a0474cc93c5030cb52ac9da75af1a652d353554aaa663f3591aaa930623e

            SHA512

            a680ef806d8f462222f7e875db6e262bb14bd167a4054c207bbe0fd280cc3d8966cfe022e4b5527f24a9c6e7c2f90d4ea3184f1f1303937263aef54529d705ba

          • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\Setup.xml.RYK

            MD5

            a971cb17e69ef247c073537e4223736d

            SHA1

            cb4fbb78dc03222b8fb072771fe6c485f89e2513

            SHA256

            9e3a0d9ff58bb4a0797f5aefe2d86cfe3b02ff520c2b2359caa7bd184c8288c5

            SHA512

            d7093634d6cfcfdaf500251af7492024a98da709979c58ab0df677c089836853d3c9935b80c4ecb401da2aa66718bb3f1949e720132a82cb68c64472e6e2eeca

          • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlkLR.cab.RYK

            MD5

            ba1ddcbb6c6010cefb652b1c0c1834c9

            SHA1

            207b99de6e0736cd3b36a8f779b3c0c54e0b36a7

            SHA256

            adf89b01394419f586ad532087f2202726f5b57d08a7156fc6ea3c6a4746eb8d

            SHA512

            dee0407254aa21a6887c07d61f8f26973cfbd5157251035d91051687a6c69ef48536ff6a151bd95c94c16d36435a2c708075c133216c4f2681e9f4ead476aace

          • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.msi.RYK

            MD5

            a0b23f34f7969097f69019e9375f460f

            SHA1

            e4979e341d874c1a030bb4c3c77258ca75e591d4

            SHA256

            abd8d9ca31fb3ebf8349f1fc8ddb88a5f50c0b1b650b3f98450ab696e4dc10fb

            SHA512

            522fb6f60ef489fce95005ac34cc87c144bbf42dd852447a3b9b59cd74f9a802b2f30ea268a26fd76deb25144be7925d9ba7df0d2ca0091622196058595b25af

          • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.xml.RYK

            MD5

            3555250d444eb922701fa1d556ab7726

            SHA1

            2a2c040577c08cb576d9fa3bf250cc2b0eb59f54

            SHA256

            1529c02913619b2008f0dbfbf4b705330fea823bdc291e7448c5b36c101461cb

            SHA512

            3eb603d2bcfccc1388653e6e3882ab2bee8610b1c25e17fc149721d331ee2fb4f65cdccce76cd9623e9b22fef5f0b6ed5fcaddeb44c889ad9ecc9fd0fdc55124

          • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\Setup.xml.RYK

            MD5

            593e9c2fa8c112287521645bb1cae494

            SHA1

            d76b36832002c3a10e08576b054c3c11c1ae53c9

            SHA256

            a49a40af86913065038d4936b7136db485ccef37025907db744068107e0f4969

            SHA512

            e933d74c6752b4e37ce07ad7fc0302ab6e3de35b0722b1983eb2154c954f5a746e60e6acc1f0fbd88ee349e0559f14f80d1d7ef7f80feaaa534988a331362080

          • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\Setup.xml.RYK

            MD5

            60de2b2db77930ab3d76cb160a64cb9d

            SHA1

            2c78a4bfb60bfdc9f859f6bc75ef90faf2386da3

            SHA256

            836cd4b609b3be4b078d9dee78ccde162cb39b9cb107b1c34ef5e6b3bcd5873d

            SHA512

            a5a8c192de415da5d978ad4f4215cf32a3180917a493c9a26d655cfea7859972c61c66e28aa89d521d09bd781803afaeec8d56542a9e607fd385e0f2ab4e43a4

          • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordLR.cab

            MD5

            d12c5fafd8dcba75f9e2a2ec9783450e

            SHA1

            a32fa5cb2648879f30c35a2260b04881ed433b92

            SHA256

            a743e45c51563a2f5d0b99a68285b52b403090ad96823f10b8943c26a48dfb58

            SHA512

            22f1c16e249dd9c2daa5ce70e85f49b793a3cd6c6a99775d3aa234abb70efeb22826934482a4400955a7252259221925beb249165e3a4d8da34e196f0cfdef81

          • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordMUI.msi.RYK

            MD5

            5faf849474f9e36ca458a82d4cfe5b18

            SHA1

            a7dea72ed4ec376806a726cc80d8b75fc132d524

            SHA256

            f6a3dc7fd39758f3ad88700c11431fcaf5bf53ceaee5c37fdf916489e1e086fd

            SHA512

            4229e6e61b0c4e44be460337762340bc07feb231a3eb183d3f59d55070f4990825cdcb8a2825db19fa717b2283875d8b36383f06012943e96ec700f75f50430a

          • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordMUI.xml.RYK

            MD5

            a223d0433849a83eb0f092c6d53267cf

            SHA1

            8ce0fe63876a5a1e6bbe95b0d3517d9dacf2f467

            SHA256

            23265c7f1c279aa942add28863dd64c3a1bf0ca2e6cb43c20221763938e55d6b

            SHA512

            9fa46831fec5938717627160e42b65686ceec0edcf60a883712634388f68bc5fe07942a425673dec6711bf5bf76e86381c92c67272011066d23864dc3506d452

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.cab.RYK

            MD5

            49b94913efee61d6560fb727835f4c9d

            SHA1

            a6d3afffbbeacdce432629ecfd586b2e8a73333c

            SHA256

            3aeff27236623c224dd65efa6199770e12b1491695757dc4c61794f063c0acf5

            SHA512

            08644890a3344d70b8bac5d8851b310b6975ab20219f49729850a718f90a38d95743eeae6103bfa3e64dee161242c883cc12894ccc7a0cb0119766b88f08de0a

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.msi.RYK

            MD5

            4dca3711bbb694c963f87cc25b26c19d

            SHA1

            fc05cc93fad50c49e358e14e06ad26750d886b98

            SHA256

            68c49e969b964180c97cbebb18a36948605cd398d30039995a656fbb5400307a

            SHA512

            0735a8b2d1b957e5c175ceae6616cb788b2dd43b706d0d203856ac53a4bbd76616df2daca077e9e6fe04212594218ae233a95eaafd54848bdec05f94494eb5a8

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.xml.RYK

            MD5

            1ad9fb3a28c453f702cc7fba82cba775

            SHA1

            7a491096547ec3ae3e38a9ae6b1ea0725324335f

            SHA256

            6cdb5a0f7e613c0d45b901be4d872976889875b7c26158ae0f192b80bca9e2cb

            SHA512

            7ea384c822a9df226c757bc7e0736a2375a569a466f741f486d5baba76188afce74d7156b001366a3f9de40f78e8b62a443f1723de976de0ed5be69abd062d86

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.cab.RYK

            MD5

            7609223985ae3d763318cc663b3b65a2

            SHA1

            3a446b7d2feb3e23abbeec60bcaaf78c2c860ab1

            SHA256

            e0652652bfb9e78a4a114fe6270a8bc24a659534a8d7706a7f2ee4dec25ee0ca

            SHA512

            e8a9e9673096a90ec5b79afb941c0f4fd1e3776dbf0b0cc2b16c43d477d648b2994446c3654ea66b68ac44ac3c7ffc8d3e44520ffe844b82148958ae974c9ffb

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.msi.RYK

            MD5

            542eb0570a0aabf9114acbc702427611

            SHA1

            c9ce51b0b09b6369c3fe64152b726d992d4c743b

            SHA256

            ba64bca6df51a369fed757e13ede4ef4d22b200e7201729a8063d503a124b3b8

            SHA512

            03c757a340adcc8a9b57160139691b06f6fa1fe9539c90cc58e94e155333683152844f035d1f60581b618997c85237a4bc290197e062ce47f4c01b874490fa75

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\Proof.xml.RYK

            MD5

            f90e2617c328da3fbd0a7dd0b5daeaf5

            SHA1

            26dc9fee1bb268e8cb9d6cca4c0690936f2e1b49

            SHA256

            9e7cc07101b1181b5b7fb9ec02f6c8c8c11e3f49b3a931fb5b84d5854c2463ed

            SHA512

            91e3a604c5f3b58e5509ba5457f24af50e137ecbde1ec52079ca74c7117ea6b83ef664e43878dfc347bc27f710a2b7dec5f7fe8c63d319f89d5a8ff18c61ea29

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.cab.RYK

            MD5

            22adbe64e066ac59ab7ccc0d4b71ce26

            SHA1

            9a317041efb2570600b0e1c664fb03f6dafe1fd2

            SHA256

            0b63e60929a50ffd53dc23b43046e085f753e8868abfb44c10bba0c84af9b903

            SHA512

            f9f6ec56607c4ef53eeab516479e2f321f0bddba002bbcaad7d104baa324136daea301e50ef8ebb08e35fb0203627a2c2fca21c022bead2e31416d3b1b1a8771

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.msi.RYK

            MD5

            33aba52be37fd0aab200aea6b09f183b

            SHA1

            ad6ff7119d456afa7b10dc4fbe9f188d589fcd6f

            SHA256

            e87076b82de0e9da5c7ca260c6ed7780ed1cb9fe8223b70424f36d3b3edd1447

            SHA512

            a28bd103dd56c99baeb2163c7c5611e8d9832aa8228f22f9f08d7307a27d3253bacf5c52a33cba2c09d1484855ad92899e22932165d0e25bbd97d8c61df0fb36

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\Proof.xml.RYK

            MD5

            3779ccfb5db1b95b48c2b15e9fd04370

            SHA1

            94783055340b6b7347ed1673197c43fc4c4c6fda

            SHA256

            9714ed4f8d4c63658a9874b6d18b6d2fb6159f1f254d8a10ce0645d736511506

            SHA512

            b9e896fc5e833970d77ada83ef98ead5ddf0c0d85fe40bc7e29cd14e344693ecd95a0efeb84f50f85d135b51b13c1caac4d203405096954e61f9f0840774dc36

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proofing.msi.RYK

            MD5

            a3df05a1cde62f7ea2e48ec071594d37

            SHA1

            1be7d195d81c86b95426d129e5fe94ed7524f9a5

            SHA256

            7c5509e2401403c19f392c977b0dcc354deaebd8b7400a5892dcf8cdd6e63c00

            SHA512

            19d1f4fe1e6da2bdb768b3e097c232d10fd4b6589e46c9e3ad28529414efed3ca8d32cae72278a550c3991bd1edba19857d8f5705d9a70e202b8b6bbe92d25de

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proofing.xml.RYK

            MD5

            d4fc4e4cfac48b4c62cf12fee6bd64ed

            SHA1

            23b348960ea51ee182c7e7872b5c9b0e01082612

            SHA256

            982b3e0f488063082aa89ff783ed4b8f1067b45706c751330f24200c5d1c2bca

            SHA512

            01c417ec6624d629c34bf7719fc138ab69faf708c3bfda2af24a4ace29e744eaff91cd5f18d4356439b709b2257a97f58aabd9afc8ff83c4beda5e5bb5abe59a

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Setup.xml.RYK

            MD5

            f45f6cbc1fc140bb8aec23cf860f8d63

            SHA1

            72fa68992a5048c05b0cd212ee507d64db89d4f3

            SHA256

            b9611b73fc29b90460a56a74b8d6854cf2cf40719f7e07c8dea288fe8e7c69f9

            SHA512

            69f8ddcead7eae1d2347bfcc9deaf162e9cf8894267e021ea3edf728685416599e63216e71ff4cf46efedb882c5ee92998651b45b8160e68a1edc766414ea2ba

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\InfLR.cab.RYK

            MD5

            43bb8865ab6110d3a7acc40b1bb223fa

            SHA1

            301bf001a958d565b45e63c1c9a58f95405db5fc

            SHA256

            671156249f9aa046eafcc3e9a96b33b623450e7abd1f8b707bbcefa61048c9d9

            SHA512

            602a377e00635b9751682d2b3394a0e26354f7daa602d7ea83290d64319c2f71ffa40e1aa326af2934ab67c0b39163c683d7f1150870b78b7e1ad4d3b77be221

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\InfoPathMUI.msi.RYK

            MD5

            5e8c22d1f63a4fd15aee145726789a90

            SHA1

            7610270eb115e692360c84a26a23ff88509e36ff

            SHA256

            06b7264ef63862d113fe8a3eeb6b41a2b65c3a8484e798ca8461d15df9a797d0

            SHA512

            f37828265ecfb22c67bdd337a181572175c89590732479b319604eade919bf7bdd105d756febf14ef281fddf2b8fb9248654234764acd0d3589b8e3102a90c88

          • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\InfoPathMUI.xml.RYK

            MD5

            8b022b10762a1fc0694ecc5d8627592d

            SHA1

            6698c9da5b42db0d1e619c9b878afd9e213f9916

            SHA256

            307b87d3a51708886b1a6e4e7f879301a42384a49fcdc3588bec47b986c5b3e2

            SHA512

            25a03baefd81d16ae56d731d2049e85251483585f0a2b08af36c67751065e383651b4667c46768458e75729b13f8d528e66c7633e68c8b6d7e7055af67c5e398

          • C:\Users\Admin\AppData\Local\Temp\JSgvXAElzlan.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • C:\Users\Admin\AppData\Local\Temp\stEIUmceTlan.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • C:\Users\Admin\AppData\Local\Temp\yWYtpLDZgrep.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • C:\users\Public\RyukReadMe.html

            MD5

            eef31ac0043fbaca9ba45316c36c37a3

            SHA1

            6370497bbf37c99d1f17ddd31467a427df926cba

            SHA256

            6b29df519d30df469d9df438403cd59e5783618eeefdbe4c0299049fce7a7693

            SHA512

            2c367bba06e99175b75df3b9eb7245fcf012b1e0ad401516033c158922cffd2a7f6b1e5efac8adb5af10b98c9ceb79bb146bab17f48cb21db02c443f930c0304

          • \Users\Admin\AppData\Local\Temp\JSgvXAElzlan.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • \Users\Admin\AppData\Local\Temp\JSgvXAElzlan.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • \Users\Admin\AppData\Local\Temp\stEIUmceTlan.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • \Users\Admin\AppData\Local\Temp\stEIUmceTlan.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • \Users\Admin\AppData\Local\Temp\yWYtpLDZgrep.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • \Users\Admin\AppData\Local\Temp\yWYtpLDZgrep.exe

            MD5

            ad3a5956dc4e8fd6a62671a6204d11b9

            SHA1

            aac34bd5c2f8e63dca20034f24384c2ce1d641b5

            SHA256

            3a6ebac4f83f8b9088c9e00a25d88a56fb7e46b7b8a03158682a5d7d28f0f6ca

            SHA512

            23edec2ddc72277efca922dc7c66fef2220d0ad3709b277c236bd883214e423143a947ff48ec2a8b57b1835b715a06b39b7d1c2a423e62dc4166ad5097742f13

          • memory/976-24-0x0000000000000000-mapping.dmp

          • memory/976-27-0x0000000001C40000-0x0000000001C51000-memory.dmp

            Filesize

            68KB

          • memory/1656-10-0x0000000001F00000-0x0000000001F11000-memory.dmp

            Filesize

            68KB

          • memory/1656-8-0x0000000000000000-mapping.dmp

          • memory/2024-15-0x0000000000000000-mapping.dmp

          • memory/2024-18-0x0000000001E30000-0x0000000001E41000-memory.dmp

            Filesize

            68KB

          • memory/2028-3-0x0000000000220000-0x000000000023F000-memory.dmp

            Filesize

            124KB

          • memory/2028-2-0x0000000001CF0000-0x0000000001D01000-memory.dmp

            Filesize

            68KB

          • memory/2028-5-0x0000000075C31000-0x0000000075C33000-memory.dmp

            Filesize

            8KB

          • memory/2028-4-0x0000000035000000-0x0000000035028000-memory.dmp

            Filesize

            160KB

          • memory/2716-32-0x0000000000000000-mapping.dmp

          • memory/2728-33-0x0000000000000000-mapping.dmp

          • memory/2816-92-0x0000000000000000-mapping.dmp

          • memory/3008-93-0x0000000000000000-mapping.dmp

          • memory/3304-90-0x0000000000000000-mapping.dmp

          • memory/3340-94-0x0000000000000000-mapping.dmp

          • memory/3392-89-0x0000000000000000-mapping.dmp

          • memory/3596-95-0x0000000000000000-mapping.dmp

          • memory/3608-96-0x0000000000000000-mapping.dmp

          • memory/3672-91-0x0000000000000000-mapping.dmp