Analysis
-
max time kernel
151s -
max time network
122s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 12:59
Static task
static1
Behavioral task
behavioral1
Sample
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe
Resource
win10v20210410
General
-
Target
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe
-
Size
122KB
-
MD5
268c8c879f67be89dbb020bf0844d9e0
-
SHA1
631ae3e5bb0b791c2926829a00e99154c94621c9
-
SHA256
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357
-
SHA512
047ddf54dc13b455528ec3370e02c0ca006bd86b207a6b7dabb86390f0dcf7d194196876fdf44a6e6556a6b32210e71edb2889ff1071fb899795e6373d75fb52
Malware Config
Extracted
C:\RyukReadMe.txt
ryuk
TonoErrando@protonmail.com
TonoErrando@tutanota.com
Signatures
-
Ryuk
Ransomware distributed via existing botnets, often Trickbot or Emotet.
-
Drops desktop.ini file(s) 15 IoCs
Processes:
sihost.exedescription ioc process File opened for modification C:\Documents and Settings\Admin\Documents\My Videos\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\Links\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Contacts\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Pictures\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Pictures\Saved Pictures\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Downloads\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Desktop\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Links\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Music\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Documents\My Pictures\Camera Roll\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Favorites\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini sihost.exe File opened for modification C:\Documents and Settings\Admin\Documents\desktop.ini sihost.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 192 3828 WerFault.exe DllHost.exe -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exeWerFault.exepid process 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe 192 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 2832 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 30 IoCs
Processes:
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exeExplorer.EXEWerFault.exesihost.exedescription pid process Token: SeDebugPrivilege 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeDebugPrivilege 192 WerFault.exe Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeBackupPrivilege 2312 sihost.exe Token: SeBackupPrivilege 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE Token: SeShutdownPrivilege 2832 Explorer.EXE Token: SeCreatePagefilePrivilege 2832 Explorer.EXE -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
Explorer.EXEpid process 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE -
Suspicious use of SendNotifyMessage 4 IoCs
Processes:
Explorer.EXEpid process 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE 2832 Explorer.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exedescription pid process target process PID 3256 wrote to memory of 2312 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe sihost.exe PID 3256 wrote to memory of 2328 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe svchost.exe PID 3256 wrote to memory of 2472 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe taskhostw.exe PID 3256 wrote to memory of 2832 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe Explorer.EXE PID 3256 wrote to memory of 3312 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe ShellExperienceHost.exe PID 3256 wrote to memory of 3324 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe SearchUI.exe PID 3256 wrote to memory of 3544 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe RuntimeBroker.exe PID 3256 wrote to memory of 3828 3256 2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe DllHost.exe
Processes
-
C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe"C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca1⤵
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3828 -s 8362⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵
-
C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe"C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\AppData\Local\Temp\2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe"C:\Users\Admin\AppData\Local\Temp\2a0044c9599a21c45ca22f9abd1e8a3093b3c4046b328968c949a651e6f70357.sample.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
c:\windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵
-
c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc1⤵
-
c:\windows\system32\sihost.exesihost.exe1⤵
- Drops desktop.ini file(s)
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\BOOTSECT.BAK.RYKMD5
356fea165b832924f732a34d39654c98
SHA10eccc7649fcbac73e5d3d98adfd9bd87dffad418
SHA2569f76438676a84d8325c7277d3ed855d10242a4daf8caa62b7457f649fee71d03
SHA512be1684eb97c33f66d34226fa490ddb0316b960455a3b45b06dcfbbdae50028fc80557f415b3e53ba4fd39a13ea6f3e6c2d75d4d241d424be6802dc7e260f6132
-
C:\Boot\BOOTSTAT.DAT.RYKMD5
cf452ad0eb7459aa65d63c3d21d08cc6
SHA1d2caac92ba9bddee3c1a337d683a3d3af44d7a21
SHA25671e2b66f6f95d6b5e40c96015ea2d59fa522a3c20a735ee0c16c0768b0b73a74
SHA512afe5ca21bfabc685c3bc70663264d54fcf3f5972020e1496b8e2aebbb06d33bae8bd2c2f2fbfea475e242308601f75298c59d757f1b7e86c2ac379aaf0741766
-
C:\Boot\Fonts\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\Resources\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\Resources\en-US\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\bg-BG\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\cs-CZ\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\da-DK\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\de-DE\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\el-GR\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\en-GB\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\en-US\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\es-ES\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\es-MX\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\et-EE\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\fi-FI\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\fr-CA\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\fr-FR\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\hr-HR\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\hu-HU\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\it-IT\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\ja-JP\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\ko-KR\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\lt-LT\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\lv-LV\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\nb-NO\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\nl-NL\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\pl-PL\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\pt-BR\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\pt-PT\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\qps-ploc\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\ro-RO\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\ru-RU\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\sk-SK\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\sl-SI\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\sr-Latn-RS\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\sv-SE\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\tr-TR\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\uk-UA\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\zh-CN\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Boot\zh-TW\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp.RYKMD5
c3dfd52daac04f5328e1bc78d0e760b7
SHA111530053b3febdd303798f22a67f8048daad0ae5
SHA2569a93392bc65598183bc7a62e414a49b714fe238dde0736896b8de7e0d7f10365
SHA512d6996d72de656fda60d992e68a6e439d14435a135f5aefa327f58e135f9b757ba0582d961facdce34689abc5fffc704492036b5d340900da835df5c35c7c4f77
-
C:\Documents and Settings\Admin\.oracle_jre_usage\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\AdobeCMapFnt19.lst.RYKMD5
632199c2c1683ae17140d4eddce6b405
SHA14756639515198ffa5f5dc6043c3d21de02324796
SHA2569aa2c84b1bd54559c8de79f1133bc75c3ae62f7bb25412e6b1100d5f760557a7
SHA512be62744469d5217b23e76736fbe6730a07b0423f026306a0c894f7f8f653054ac71021e241e2c3b38dfde22fe94d3b2a39d5217d98ec0e2a7648816d04e19b17
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\AdobeSysFnt19.lst.RYKMD5
1822cc44368f2570c08b24b3806b123e
SHA17c171f2624f517f053c2ceb0e22176f0adeabba4
SHA256d26ca04e7df56642216e7f995a1c6c9db3b17484c48046904fa171cf17d7a56c
SHA512a07c0bfd64282b9678a9ce8dbb640d81ca0fa986ef0537002d42c9f7768d78d7e1fa200bfb0e0d673a45d344421e06a3dcc4684a96e0fce7c9a76f1cdfc9dff3
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\Cache\AcroFnt19.lst.RYKMD5
a69105f6e95e7fa24a71f1bd94ba8a52
SHA12d96b68a2aa480a49fbabf8fa916d0d7d324630c
SHA256377ac8f8cd4a6fe8e8f7264ad2a35cb5ae7886a255322cd30b864e6e4ec0e0bc
SHA5121a04d6d3898581ef9d3af3ae3e743c7f6bbe904fb074a97cd16e680fb792f0007b621c153535ef71285400c38a70ae5c14617ed79f0764db3b6d4c4f9c09c900
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\Cache\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\IconCacheRdr65536.dat.RYKMD5
1e9498acb40c4b81faa4d8124d3957fb
SHA1371366f921a4e3339e5f59e28b162f8d15cd5054
SHA256d68389bbe86e27400472fde31868380a80f98fa2276235a3137a5afc703b4c8b
SHA5123b2a965bfc41ff81c30e54fd967a13662f4a0bb550c3a8ec0da38dbb79c07932f039aca7bcf46246bd5460788610b2d114f7d9bd4e1b1fee08bd8f3ca7043d88
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.RYKMD5
d5da292de55ecd294e8fd44cb07d35f4
SHA16d4f593403dccfef5e53538d4f8dfd8d7c0a6986
SHA2565cb79aa450c13dd4ecb8b79612b8497d9194975412f679c123e6ec676cc3ac76
SHA51212c3dee52f16da6d5354fb518162a9ab42af0705d94d4e6a9a76e750aab21f55b4ffa9d2f38d5d93ba055f49ad0f7868415fb84cfc7527c26e5f37b3fcb75ece
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\ToolsSearchCacheRdr\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\UserCache.bin.RYKMD5
3780f6746ee7e592f8ed936a8ee34355
SHA1ccd0d1e45eba0613988b74261e879d2551fa121d
SHA2567d8d041ec1b6f7ec2f859370e4a27eff2d8c0156b09cb5b5fcf437ff43e80d56
SHA5122959dbe65598f66268502d169e486aba6e2640f736d0e1f9f0c7049f9897b44fd77f8623bdf483aa7b85c2e39e289900b2f1101a21c8fa97646111193005f1ce
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PenWorkspace\DiscoverCacheData.datMD5
debcbac019f6ee8d468c71f6d5de32fd
SHA15ce03a9aa3306ffab47bc7515b514f0b572ad901
SHA256d459bc768364408b02938bdd792e41d4386d421fdf331aa4bc8e8cf9a887fda5
SHA5121fd55262326995a4a4fa70bb916af67081d0696280cf798cc30ff81fb5e709044fcfe6d6bfcf07f7404c22640816f15fe8a97bfa942a040b553692a134147492
-
C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\AppData\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\Admin\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\Documents and Settings\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_89bbad60-16d5-41c2-ad8d-716f4ac5f4c2MD5
93a5aadeec082ffc1bca5aa27af70f52
SHA147a92aee3ea4d1c1954ed4da9f86dd79d9277d31
SHA256a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294
SHA512df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45
-
C:\RyukReadMe.txtMD5
1c0c5c986e8049f76288ccb16a436f8e
SHA1bac174e2747c9acb5591b4af750df98f3ec3a3ea
SHA256a11c79ba5eefda5b8a215c930a7f3213884bf67bdb80c384d244b5b5e2bd5a20
SHA512631d25940754491c44220f0ea29b9b4109f7e693e1ffa6e295cf77c0a2eca6fb12ab054b641da92e89e9c30c79d53c254be97e132a31c6f1115aab620b7d4e16
-
memory/2312-114-0x00007FF687930000-0x00007FF687CB1000-memory.dmpFilesize
3.5MB