Resubmissions

11-02-2023 10:59

230211-m3msashg63 10

25-08-2021 10:30

210825-65sp376nnx 10

26-07-2021 12:59

210726-91da1g9v7e 10

Analysis

  • max time kernel
    80s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    26-07-2021 12:59

General

  • Target

    23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2.sample.exe

  • Size

    384KB

  • MD5

    5ac0f050f93f86e69026faea1fbb4450

  • SHA1

    9709774fde9ec740ad6fed8ed79903296ca9d571

  • SHA256

    23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2

  • SHA512

    b554487c4e26a85ec5179cdcc1d25b5bc494e8821a8899fbbf868c3cf41f70cc72db107613b3f6655d3ab70f4db94cce2589066bb354b1ed955098d3911b844d

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted or deleted or backup disks were formatted. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation No decryption software is available in the public. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT RENAME OR MOVE the encrypted and readme files. DO NOT DELETE readme files. This may lead to the impossibility of recovery of the certain files. To get info (decrypt your files) contact us at WayneEvenson@protonmail.com or WayneEvenson@tutanota.com BTC wallet: 14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk Ryuk No system is safe
Emails

WayneEvenson@protonmail.com

WayneEvenson@tutanota.com

Wallets

14hVKm7Ft2rxDBFTNkkRC3kGstMGp2A4hk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Deletes shadow copies 2 TTPs

    Ransomware often targets backup files to inhibit system recovery.

  • Executes dropped EXE 1 IoCs
  • Modifies extensions of user files 2 IoCs

    Ransomware generally changes the extension on encrypted files.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 1 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Interacts with shadow copies 2 TTPs 6 IoCs

    Shadow copies are often targeted by ransomware to inhibit system recovery.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1128
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\users\Public\window.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:69860
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:69896
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
    • Modifies extensions of user files
    • Drops file in Program Files directory
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1188
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\users\Public\window.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:69448
      • C:\Windows\system32\vssadmin.exe
        vssadmin Delete Shadows /all /quiet
        3⤵
        • Interacts with shadow copies
        PID:69392
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB
        3⤵
        • Interacts with shadow copies
        PID:69348
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded
        3⤵
        • Interacts with shadow copies
        PID:69300
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB
        3⤵
        • Enumerates connected drives
        • Interacts with shadow copies
        PID:69220
      • C:\Windows\system32\vssadmin.exe
        vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded
        3⤵
        • Interacts with shadow copies
        PID:34196
  • C:\Users\Admin\AppData\Local\Temp\23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2.sample.exe
    "C:\Users\Admin\AppData\Local\Temp\23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2.sample.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\users\Public\LJnIS.exe
      "C:\users\Public\LJnIS.exe" C:\Users\Admin\AppData\Local\Temp\23f8aa94ffb3c08a62735fe7fee5799880a8f322ce1d55ec49a13a3f85312db2.sample.exe
      2⤵
      • Executes dropped EXE
      • Deletes itself
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\LJnIS.exe" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\users\Public\LJnIS.exe" /f
          4⤵
          • Adds Run key to start application
          PID:1636
  • C:\Windows\system32\vssvc.exe
    C:\Windows\system32\vssvc.exe
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:69924
  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:69324

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    File Deletion

    2
    T1107

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    2
    T1082

    Impact

    Inhibit System Recovery

    2
    T1490

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Documents and Settings\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\OWOW64WW.cab
      MD5

      12ba4adc75ae2e62f8445b2826613b08

      SHA1

      20f4fb5f9eb8feaee7bc77ffb9433b0929f22c73

      SHA256

      017bdf47af2ed604d97990c1c350d7a70b8230e4d6204448d38c41deaebb2155

      SHA512

      fb2a84e8dd42089aca7e88a6cd1fe45f23d1efd6605ffcd5b3f2ff5eb16ef6a3b6b405da79281b89c26cc9f40cee87cb91d645a1e1f2a31d0c8eb85574a16c7f

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.msi
      MD5

      5d1530366445de1e5d02d86033623d8a

      SHA1

      402888959e6d0b47660b59db2cf37d04b51ef404

      SHA256

      c85101938199d3c6d6e707dc816ee96e6737ecca58c07276640d4c96f0c0f421

      SHA512

      db4edad5cfc20a744bbf30ef69d47a02234131a974b722f67de922e1f9c8f4ea9d5f02dc3740d1fe8c34d0cd616bda3d4838144291bb5a7d0cb406973e275445

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Office64WW.xml
      MD5

      e6e49884b80141ef5d280cc73db48108

      SHA1

      a0d6ce21fee037fadceca36590c5352a8807f6ac

      SHA256

      959936deef39b8d8ae41f9340a0378215ac61f27702ba184dff9680928769ce8

      SHA512

      87504a08bf16b1e597b2f069bc879e617968320fbfafbd8731ccab3f5ae3fb7bc74a8d1665d112f30e8babc29d6c51641d541d431c6cd642c7a84f3d722037ee

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.msi
      MD5

      163a0a5b9d4ea305772d2117a4b03551

      SHA1

      cd7f8bd62f549c4654eb84132b4e87ad45ef0102

      SHA256

      c95471f2b6c3d2633c91acdddfe6a8fccfdf688d37fbe321321d9d07c54d20bb

      SHA512

      2b9b25bc454ad32cc4bd67f93671e952f89c28dd295d22bb89bd1ffe02e0a271c857eee1a9568fc15e5915bdc1dcac1df50c3cda4cf369ec9e14aa7a1ec2a4d5

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPlusWW.xml
      MD5

      84dc8520972aa4b2f8ac82f8ea6c5648

      SHA1

      bfa3e4849852067d3c3113e8cd10dcd0bd720f26

      SHA256

      e42fe2279d64036060585e4204ff5c04a5cb2815ca9a1bb73f93be45d5375622

      SHA512

      c3a5f60a9868253efe4adc2267a689730c7aa89e3e8c728bc67564525bb42599a91279cfa93e7842d317412f324dcd1dad7444d414e1bdac0eed0de836101d5b

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab
      MD5

      9ad89cd298693308f0c31b574480ce49

      SHA1

      851c8125398786997f807bdd0602bf27e12f8bfa

      SHA256

      70eeb317aeda124f8653c7604e4dbe1705f9653c5031c9273aed41e205d9b3ab

      SHA512

      feeb0c70231f33fec541d2e3bc76404d893adb2647fde9b1556db5f1b4ee9d03aba512239a7e7a5dd2067b11bab93e9adbcd1182391fc15cd8f22c74260746eb

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW2.cab
      MD5

      8a304f1c8e158490a0d2d4057d1d18f9

      SHA1

      dd9bdb994a67c93ca36b4ff4dfd09417774a9e8b

      SHA256

      d79cc18f051f8b77e8b5ef07dd2626128599423ff460524a51c9307e0033a6c9

      SHA512

      b25146e9353e4584702c4ce8e9ed2c7db91342e3a5aa590047f0ea9457eea5c08378e29ee6e75beb1691182a25e07869b98c081f57506b9c6217c6f060e0de20

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\Setup.xml
      MD5

      31d6ce602b85cbb1c14934800be67981

      SHA1

      c86a2d5943db2dc5b06faee7b1ec9c25388e4ce2

      SHA256

      3d40c19b760520342b42eb6eeb52ee476c304b602fce609434620a7073352be5

      SHA512

      8279d9d988b1c18a9e66358315d51de4fba3d269ede2a30b5f80c62dcd7cd707d7078b2b74ad4c9923423fc59264e9a78f422ff2ed5e6434205e436483e7074c

    • C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\pkeyconfig-office.xrm-ms
      MD5

      3b1ce7a089c40b8f32314655c0f50548

      SHA1

      b5e297c95ae81a9dfd79df947bc3be1bc10eaa86

      SHA256

      7bf03ffc4877a7923a3114cae76894f795701130bb9323772457df02e8f85b7c

      SHA512

      be2c3eb37e60050745646622a3950a4c52995d03e6597e2c59515f9cf15829fece4ece2f5808a81fce859ae810fec44d2b57aa016de4ab6e933185ab44fc1c4e

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelLR.cab
      MD5

      ef59e2291c2cfc2207409a78404303c8

      SHA1

      e2b168e33e887218f2c8e6d477f2c3096bdd9c12

      SHA256

      ede5c9e88acfda19f7c9cc3cc6ee4787bd15410da9134181030ad46696fe304f

      SHA512

      636a6c041e562ebb9efc92aa0f6f48ee911d037e481deacd71c529cee07f2695064e2f9fa8c54ba342bd5b551f8bdbc7c7699664c193d0a69ba0528433ee8f67

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.msi
      MD5

      6e8bd7baa736f199e685d8f5830cd08b

      SHA1

      6e1422988bc54746821f09fbf8bfd854cb9e37c0

      SHA256

      3ec6c9ce814822d57c3b70e31cfef46f20a226376071f798e9bf2b2128a781f1

      SHA512

      3c1072a07d9ae0329c42b8efa8a9e373a968ad40b6987e53cc41b8043a58777f8397695e5f200582e7027a9a397aead114fa43f0967380393e64880ff9699cd3

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\ExcelMUI.xml
      MD5

      dbd965000a9a683be81ad13e6b2e6e70

      SHA1

      60cb07503f34f9e4a5b9f1e89d9f8ed536acb9f6

      SHA256

      5c26025b1d724109eff5c6354c83a9d47f9706ceaf0007090a712e8c35afe572

      SHA512

      5200cf87b6737a51b58a84c4ce40e35dc2ec94b76a0bee684a61a898c3e7eeff881ee026845f6162f5e029c414127daac43d0a0b1c024e82afe27f7118227190

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0016-0409-0000-0000000FF1CE}-C\Setup.xml
      MD5

      9cb06649d3abd1978c04f3c6d80bf32a

      SHA1

      c9a1fbab7b201f86b78a90fa376868f5ddd8fa9a

      SHA256

      51ce369bf87933159def0d19591bf4c89d4a3d80cfafdd418f5b6921ddd8e5d1

      SHA512

      f197edaf0ea10501fe3140458b99ac29f2dcaa9ab9b98bd190d140ecc665f64da484a7f4168007707389d583c16eff6c49cf80420d8fc72a04b7528971918628

    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.msi
      MD5

      6937dc76feaac068f2106df3de65aa45

      SHA1

      37c24f46d4a7692a1f67e4772b07203b8dfb8e7f

      SHA256

      294687abdea56993afba952e4dd1184183e2cf94921bbb5513e4c753b28ad21d

      SHA512

      857133a46be289d944cf1615b1b3a51c0d517153a93473b172406749255c7469ba4d3c3e9fe63728c22e21bfa97a08aac70ac78ff7cea5b1a5abac0de016248f

    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PowerPointMUI.xml
      MD5

      7228b1079ea651cba6a80555c26dc3e9

      SHA1

      462b2d17ebd5b52bef6b68f5f304bdde6dc2e935

      SHA256

      3ad260c3b87e88d4224e5e5acd584ce4837f389691d0391654abc0c085aade62

      SHA512

      50af1ccf0dd8dde2a54e68fe522f90943b2fba89a6cb31e8b9d748bf28c78eb97932ebfcd7e58c316df124764f8ed724d024fd521258ee5c72e84ffb0b23d4d3

    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\PptLR.cab
      MD5

      d7c4b37ecba77914c4faf63f358ac8bd

      SHA1

      080deec74ff472a980326b28c7839e9bff381dc6

      SHA256

      4647086bba069a9bcbf28103e62f3a839fae034884195c26702fd5bfa163a46c

      SHA512

      fb6fea87a29501f83a563e0bb47fb0abd771069a03a3e7976c7316020c9185a2d0cc68fb4d4c20bffb73be7c752d37ad7e1bb901e0c9e7a02fc7838677ecdde2

    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\Setup.xml
      MD5

      5d7fd3fb29ffb3db6f6deebb1e1ee48b

      SHA1

      dc76300fe86bbfeb5f878c4b3ecb8b6112b548d1

      SHA256

      8d23cd49f773431d73d5d552dd0c06b7958c2917452bd1a9491a2f376c343f22

      SHA512

      4cd9acc8a2538723f05546819144aa5e7bcf2bb7e0d2bba49967e079254ace2a384ebf8228e1ca405915708793c64ebd973c1bef54e1fb415e43f4786d2de9e1

    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PubLR.cab
      MD5

      7f40d49513aef5964fdd68c3785191c8

      SHA1

      654c958be26c58c382fa62889c526f9250755fcf

      SHA256

      4d2c8e97e6334b2de63b1aa94d1401bc5263e5f1b625281199ebd084a8f996ce

      SHA512

      c5aeea233df651a2305e3c8bfba23bccfebf64eafb3e293be531a1fdede949a44c940c661f72d42671a6506ca69ed585215e8a5cab567bb432015b31090d2eee

    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.msi
      MD5

      c3664a908d31a52f92a2dd4f6f3cd349

      SHA1

      bde44e33d76fb4db0398ec7a2a0affbfe5f40d18

      SHA256

      7b4e0f16ff452caa15b60ef220109b2b1c43a75dcec628afa750df45462258c7

      SHA512

      7b9cab2bad2e76daa65fe63e51b720ad3ea0a07ab185a6e0f97350d702ba3214dc31aa85d8d767cc788c01c32b1dadc3c2c8f97a76736d78771135e1f34c95aa

    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\PublisherMUI.xml
      MD5

      bc4dc09ae1e31424a18e0de0167b24ac

      SHA1

      ad56d37afb912bdbc0e51a6cb5526c46f9b2982f

      SHA256

      0dd0c04970d23d434a70ab1d90bee9dab0d80620e0a447d55ff5c7992f7bd1ad

      SHA512

      873fb0df4ecefae2251fb428fe670e54f2ca8a358ba6c2a7700f73256e0cf72fc0b4330017cf136bfb73f2e5754a58f52fdad3beb581dc776717a1c5c2b894df

    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\Setup.xml
      MD5

      d944d0c9645e6dbae27f5ad1672ea6c0

      SHA1

      280d559c68f4dfe36f9f798736c9b87dfe664f17

      SHA256

      ba765cc3a5852236e436c6ee212874b9b4b884b0326906d2109ce26d8c0c0527

      SHA512

      519d0dc966f271096b21b63f7534fe5a5e3e07b453e23de4c23750501a648cf257ead24c42be2f7f2c17b7a2cb76afcfea909a928681e8feb414ae76b532598f

    • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlkLR.cab
      MD5

      3b1f111fb8221bdd3abffb4e22012fb3

      SHA1

      8546131cf91bc23a3884b6a85d0ab6cd15bae22a

      SHA256

      2952634f6ee1637c7edb21871b62875a1930e6b4270e89f38b4a30437ff1a429

      SHA512

      f5d1ecfcc86a9b2f9d14912cd3f92639aa0a8372f4a05574b7b72d2b563cac0282d5e53e684388b2569644c18821e33c2069250f6bae7c7cc0283455d4ea3665

    • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.msi
      MD5

      0bbc671de12cb58f45f1dc4d8d10a969

      SHA1

      341544cc1359afa6e0784ac2958fb1e954907477

      SHA256

      9a93bdaad560491dfb8a5cc0cccc538b014e3f6ff536a0f4a3732f6a86e24864

      SHA512

      0cceab196a1e529fb25ed9908677c1cb09dba59e3a8e3afa93c7b3665ebf7304cf8d3a814497ad7ea64cdd3283f92371fc6d4012fe12aa18e1a96bd2600ae04f

    • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\OutlookMUI.xml
      MD5

      a2b563a5e9f48e586a8ca26b0a26db15

      SHA1

      221c38a9ea3c11ab11a2d95fe9834b4357545316

      SHA256

      54b837e0b8915e165c732fa68190c7fd52b288b5f45d5af7bffe93012e3a070f

      SHA512

      58efb776d5a380ec99a74445fef0788ffd0aab2e7406a2ac691231ac884660f22267acd0aa1f43d2d84a2dd3448cf974404d8d6841b429b468214b8469cac9f0

    • C:\MSOCache\All Users\{90140000-001A-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\Setup.xml
      MD5

      e35caad2d9928b2b323d4f69206466b2

      SHA1

      0d2767a8f551393c479ff6a36cc99b2ae9212a48

      SHA256

      93b74f6cbcc16af0641e6b484912ce6114415cf074995505c1810973876297c5

      SHA512

      7df666fbe466fd132f4354b5b4c02b8711785fcebea492059984526f7ae4e2c81eaeb770988fb9bec6a62ce244938aa30effae12392336d5a0ade6367a91211b

    • C:\MSOCache\All Users\{90140000-001B-0409-0000-0000000FF1CE}-C\WordMUI.msi
      MD5

      a6d7c824ad2eba7a7e38e1630222756a

      SHA1

      45c6e3a82c1ec118f400b5b3890a436c483dc069

      SHA256

      f23a35690a0a3c7f37cb821c922e222c16c682a810bd6307c6060dec0d31c929

      SHA512

      fb4bad3e0faa88895f9af4bbdcf648e73312b749c67b86117d68fd982ee2526f83986a31b340a1a3220911cbda8a4d1d782299e5e0b91b25449d9f8b3e250675

    • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.cab
      MD5

      ab50c38ff0bdd8b71d1b5937bbcab045

      SHA1

      7231922d95a0d88f9bc826f504c44f7ebff3b69b

      SHA256

      952b7716ffcfb650d9fc7c1187c4eca5fb76d3a7d1a31690c07e285568cdb12a

      SHA512

      5c8c42304608fa215abd5cbd4132dd3b9a2848536a2c5f0eb844857676426b2fa380314b62e1286464a27bea86679d09d6535942e2f30d2277401525e6817fce

    • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\Proof.xml
      MD5

      67861d9be5ad1b19ee22b08930d5eae0

      SHA1

      94f54555145a7b86f6748006878fbbf5b07acd14

      SHA256

      9aa42463269a81f8a6cf530d359b383b8d40ce6f798a4f76212a6fa53d57096e

      SHA512

      558c2127b6db409b5eba67aecf964c2abb9b27ddbac6cfd279fb2edb279bf838d6131039a4392f18e28a1f0028bdc0e654a31396510e7157086d6c070c444dc6

    • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.en\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.es\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\Proof.fr\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-002C-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0044-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-00A1-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-00BA-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\1033\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0115-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0116-0409-1000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\Access.en-us\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\All Users\{90140000-0117-0409-0000-0000000FF1CE}-C\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\MSOCache\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\PerfLogs\Admin\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\PerfLogs\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\7-Zip\Lang\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\7-Zip\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\Common Files\Microsoft Shared\Filters\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\Common Files\Microsoft Shared\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\Common Files\Microsoft Shared\ink\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\Common Files\Microsoft Shared\ink\ar-SA\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\Common Files\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Program Files\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_17ebba21-ade9-4848-b865-5b9359ee593d
      MD5

      a8129b3c629685076cfd6cf1ae740cdc

      SHA1

      576ebddf46e6bf0009cb36e59702422422a872a6

      SHA256

      d390f05415bdefc1da857dfcd52b076b688fb24b369eb2011fa87b8b7688c391

      SHA512

      4004a8d309d2a2a6c3a965de0598e6121b22b019d3ac0349f62b75f4c2777624fbd4f5deeae0bc7ce90212c682b3a28f19f88f457a7f5e13d827ae8122dbab95

    • C:\RyukReadMe.txt
      MD5

      cd99cba6153cbc0b14b7a849e4d0180f

      SHA1

      375961866404a705916cbc6cd4915de7d9778923

      SHA256

      74c43a177917b1d57ea2eaf6212ccf3b9012b4d68bc45284349443eed0bf5ee2

      SHA512

      0c9f250c0e2ec9736b072a9807b6c3bec4b670ab2f511e65cf5d79e9a8c9a209eb91736ce2765b52b6d94a57c6aa1c16bb08e16727660699b70608439c8b7cda

    • C:\Users\Public\LJnIS.exe
      MD5

      31bd0f224e7e74eee2847f43aae23974

      SHA1

      92e331e1e8ad30538f38dd7ba31386afafa14a58

      SHA256

      8b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d

      SHA512

      a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249

    • C:\users\Public\window.bat
      MD5

      d2aba3e1af80edd77e206cd43cfd3129

      SHA1

      3116da65d097708fad63a3b73d1c39bffa94cb01

      SHA256

      8940135a58d28338ce4ea9b9933e6780507c56ab37a2f2e3a1a98c6564548a12

      SHA512

      0059bd4cc02c52a219a0a2e1836bf04c11e2693446648dd4d92a2f38ed060ecd6c0f835e542ff8cfef8903873c01b8de2b38ed6ed2131a131bdd17887c11d0ec

    • \Users\Public\LJnIS.exe
      MD5

      31bd0f224e7e74eee2847f43aae23974

      SHA1

      92e331e1e8ad30538f38dd7ba31386afafa14a58

      SHA256

      8b0a5fb13309623c3518473551cb1f55d38d8450129d4a3c16b476f7b2867d7d

      SHA512

      a13f05a12b084ef425f542ff4be824bbccb5dbdfe085af8b7e19d81a6bcba4b8c1debcc38f6b57bc9265a4db21eed70852ece8cc62b3ef14c47fca3035a55249

    • memory/1108-60-0x0000000076E11000-0x0000000076E13000-memory.dmp
      Filesize

      8KB

    • memory/1128-67-0x000000013FD30000-0x00000001400BE000-memory.dmp
      Filesize

      3.6MB

    • memory/1208-64-0x000007FEFC4D1000-0x000007FEFC4D3000-memory.dmp
      Filesize

      8KB

    • memory/1208-62-0x0000000000000000-mapping.dmp
    • memory/1616-65-0x0000000000000000-mapping.dmp
    • memory/1636-66-0x0000000000000000-mapping.dmp
    • memory/34196-139-0x0000000000000000-mapping.dmp
    • memory/69220-138-0x0000000000000000-mapping.dmp
    • memory/69300-137-0x0000000000000000-mapping.dmp
    • memory/69348-136-0x0000000000000000-mapping.dmp
    • memory/69392-135-0x0000000000000000-mapping.dmp
    • memory/69448-134-0x0000000000000000-mapping.dmp
    • memory/69860-69-0x0000000000000000-mapping.dmp
    • memory/69896-71-0x0000000000000000-mapping.dmp