Analysis

  • max time kernel
    168s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-02-2022 00:43

General

  • Target

    eb603b5c296bed3b649a2aea6b76c71fbee4b7882165570e3614b4df0e8659e7.exe

  • Size

    204KB

  • MD5

    9c4659495814126809f7fd4b9566b124

  • SHA1

    194877eb67fe9b160eaaa2d8a908a04d4e8c4d62

  • SHA256

    eb603b5c296bed3b649a2aea6b76c71fbee4b7882165570e3614b4df0e8659e7

  • SHA512

    4e439bc0e886347194ef339aea90db6769149121cd85f4f8ca6a1f66546df5afac6de447d6cb61f1c6f484548cb1a4ad57bcd318fafb7b779889012514f7fa5d

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> [email protected] </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] [email protected] balance of shadow universe Ryuk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Drops desktop.ini file(s) 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\taskhost.exe
    "taskhost.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Windows\System32\net.exe
      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1804
      • C:\Windows\system32\net1.exe
        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
        3⤵
          PID:2040
      • C:\Windows\System32\net.exe
        "C:\Windows\System32\net.exe" stop "samss" /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:456
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop "samss" /y
          3⤵
            PID:1960
        • C:\Windows\System32\net.exe
          "C:\Windows\System32\net.exe" stop "samss" /y
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:17768
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop "samss" /y
            3⤵
              PID:17808
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" stop "samss" /y
            2⤵
              PID:1100
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop "samss" /y
                3⤵
                  PID:1212
            • C:\Windows\system32\Dwm.exe
              "C:\Windows\system32\Dwm.exe"
              1⤵
                PID:1332
              • C:\Users\Admin\AppData\Local\Temp\eb603b5c296bed3b649a2aea6b76c71fbee4b7882165570e3614b4df0e8659e7.exe
                "C:\Users\Admin\AppData\Local\Temp\eb603b5c296bed3b649a2aea6b76c71fbee4b7882165570e3614b4df0e8659e7.exe"
                1⤵
                • Drops desktop.ini file(s)
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2036
                • C:\Windows\System32\net.exe
                  "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:696
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                    3⤵
                      PID:944
                  • C:\Windows\System32\net.exe
                    "C:\Windows\System32\net.exe" stop "samss" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1372
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop "samss" /y
                      3⤵
                        PID:1148
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1728
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                        3⤵
                          PID:1072
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "samss" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1624
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "samss" /y
                          3⤵
                            PID:1068
                        • C:\Windows\System32\net.exe
                          "C:\Windows\System32\net.exe" stop "samss" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:17716
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "samss" /y
                            3⤵
                              PID:17740
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "samss" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:17760
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "samss" /y
                              3⤵
                                PID:17816
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "samss" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:18268
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                3⤵
                                  PID:18292
                              • C:\Windows\System32\net.exe
                                "C:\Windows\System32\net.exe" stop "samss" /y
                                2⤵
                                  PID:1040
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop "samss" /y
                                    3⤵
                                      PID:18280

                                Network

                                MITRE ATT&CK Enterprise v6

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads

                                • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\AcroFnt09.lst
                                  MD5

                                  cdecfafdf7975c77985b03057bf3d1c2

                                  SHA1

                                  bcc3f0a374c1651d83e4ae28e21528fbdcb77aeb

                                  SHA256

                                  fab0f022dd6ea34d78282cdfea0d1d6ce58d89505d77c64616bfda5e47b82fb3

                                  SHA512

                                  4771018e0a55c2a073ba60a9e9464627677b01db201264808bb36b012606b7262173a42d211a1bfe8d9a3abaa40000193bec61e142f0fa03401483db8bf6b739

                                • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Adobe\Color\ACECache10.lst
                                  MD5

                                  95d7efd9ac519cd93d5f530ca5272583

                                  SHA1

                                  3b22b46d63ca758296e3b69c235b093f0e8d621d

                                  SHA256

                                  55f5fe4eae36393bd639c58d6b324359919b57eab20b62dae309b8999b377afa

                                  SHA512

                                  06989ed463d01fd2bfb2d825ddc6cdd0f82b596c8fd6d330c220c5dc480ff793fbdebafa770b547613f2242d3eb818af28d840c255d9410f31a084aa20bd0e4f

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Adobe\Color\Profiles\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\wscRGB.icc
                                  MD5

                                  b4a18291c161a72fc317829727aa72b3

                                  SHA1

                                  f7036aaf6fca409c7938f46f9ec2d702d6abb489

                                  SHA256

                                  44bc81aa88830236fcadcdc099fb74bdb4b4ccd38a94d95d0be472e16df27ff4

                                  SHA512

                                  56b95f014e549b472021dcf1d2d80a00255ece8fc0ab5bd0b85a59ca5fc78397d1fcadb26b7cd4ff38f7a40e0413314cbd671c1be62cb135961e137cbbc19af2

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\wsRGB.icc
                                  MD5

                                  9d79ca16be117ac7e0c5d6c408dd1dfb

                                  SHA1

                                  fb41b17bec3931a049553e11af9e1c0cc0742c1a

                                  SHA256

                                  c2a4c31a308e33095152df69c3c7526dbfaf74e8f49b9180e398ea57bb78a0c0

                                  SHA512

                                  0437dfa0af9e8cf0ab69fa351b920574097ef4fc60182804eb1f16337a222aab70c13704b2ffeda4d08003d20cb0f8b2e68e11497c5307dc4bc918320a307158

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini
                                  MD5

                                  11ec54c5a342a678d6c19c5bad89fefa

                                  SHA1

                                  dfd206518697eddccf238e79834a8cc3e0ee33af

                                  SHA256

                                  2777777506f3746dd503b479d303e3ba2bd64118acda0f390e7cdfa31f667248

                                  SHA512

                                  6a328a2a3013e86c9e36d74ca08bbfc56a1e8c61c8cafe6fd6d9171aea49752daaad2d93cb9164a718202442ec341814bd9a0d51ea926ca1d7db266200de509a

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00000.log
                                  MD5

                                  3a290d523c3037bc1eb39ca629366c2b

                                  SHA1

                                  f363cecf1548cf36b42f88b11ccda528d336d37c

                                  SHA256

                                  6df2e8adb08425495bff60936b05d816c452a846e4b914f5e508266a9e08d8f8

                                  SHA512

                                  ac3c033482f53b1e37b7b358badedef88477f3a6ee0fc2a5c98e6f12739a5f69c7d784b7a779a9fd9821ca91956b00f68cd2b346fe96be3e00df1e59eaebc534

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00001.log
                                  MD5

                                  6d2bc620fe8f9f9aaba9696def95f6ec

                                  SHA1

                                  c58adb9c88c13f559da0e012bacfb77b8e87c787

                                  SHA256

                                  a5fa8946e6fc872e43ccdcbdf060e05b849b8024836c65429ea9ec4f8f426b52

                                  SHA512

                                  6c66d6f40b4614448fd79aab21e51237e83c4f86fab60e489211b744b24d92cb47820b0a52fdd80d1227a5d405e5941c307047fcb62b572de973c95e404a388e

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Admin.bmp
                                  MD5

                                  d75082d8b9e427f2db0dc34f58d04a1c

                                  SHA1

                                  1e37fc576e8e6681d58e2b0c18f2c5ec976d0d6b

                                  SHA256

                                  f5444eb4c32e9d58b29622c2a5aa718c58f394818542abb21238ea2b72ed2841

                                  SHA512

                                  5a629d3a79ec6b341195c909aa202e639e2e0bd93435ac24a1a0932a91f195c80c56c68369161f9d07a5b302d397584b22fe478543097f44cee0c4a71b8a150e

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGID605.tmp-tmp
                                  MD5

                                  f08ab54676ee13dfb6acf62194b5173a

                                  SHA1

                                  18f8aa0be35f3c527fc1b45650ebe12330328174

                                  SHA256

                                  ba0a3e208ad05ce60d66b765b12106eb5640c95e8e86093b0dafd9af12710f96

                                  SHA512

                                  e03e20f96a2ac8ceb1876c813666189a636daa0733fbeb67e0e17ea6e99e996fe42c5e3147f19409f00d84318d6930a74d5e295d1bb9b344c864f2fc3d949a82

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.log
                                  MD5

                                  78bb27eb5a65c424f6b9b7531f8733e7

                                  SHA1

                                  0ba18de284bd2766cd13e7c932b36d77c2a4ba84

                                  SHA256

                                  231d69f8d350db2b61260819a0e9857a0b1e071dcb3b2b0b1f1f9a586ba0b1ed

                                  SHA512

                                  a46cf66f2af5de03d1cdb438f802327604d3c3d6767495b14bd9629941118ae9565f2241980b2e096488028b84efd006befd6d4fa2610c3e6bb09405eca61cf3

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_SetupUtility.txt
                                  MD5

                                  001e4b52425034c24ec75cfeda0fcdd7

                                  SHA1

                                  787f3f55734ed8b245c9e3fc9329fb2f8b76b31e

                                  SHA256

                                  18a542639237cdc00483d1eb8ad0bf909e861bbe42fa9f19fc1882c5689ae375

                                  SHA512

                                  bca0dd95d1d8575fa4a0e9d349a39932a7916aa050b13dc380c1aaf2d9d75f4de61f014c19437aee9d1cdfa8c685321269ba79e8b10ac936113280bb11aad330

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI37AD.txt
                                  MD5

                                  75b4308ccfa79da7d0574b72d100eee2

                                  SHA1

                                  c8c5315dc963140712001aea20a218cb900dba1d

                                  SHA256

                                  e17d435466bf11c60f2e7269a8886726f10a06a56a3c508b725830cf8e18a8e9

                                  SHA512

                                  dcdf0075c50bdc9a4d1c705bb006f94c5049eb315fc95f41662d8951b5d33be368f692672fe306308456225e5a46950ff5c22fa53533878eadf6bfd978e73258

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini
                                  MD5

                                  50d4ad61e4f711af26ef95c9286078e1

                                  SHA1

                                  971b0b9c47b3f62470e2de0deac2a0790c82ef25

                                  SHA256

                                  55814c9cc9e0e3b4d57ccd9b27a832d055fa5d27db466f3cd7972d9d428bf5bc

                                  SHA512

                                  db95ad49f18239cf333e416558a0c5162401546c79d0258cd427698778859841fe1e502d21627c766fcdadcdb318d953861c43047f139840a3bfc771155096d8

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\K819CMRP\desktop.ini
                                  MD5

                                  50d9d6ebb6dcfd8cec7763000eb64a0e

                                  SHA1

                                  047901a39cfc2d96d226978529b76271e437b79c

                                  SHA256

                                  a38bcdb87a6675e8c6c851ff885632b6d034f212be7627bb4c4d30f24cd653d7

                                  SHA512

                                  4b5736046197e44a1f76b3f7ca94b2bfcf25e414c7ffc9e1da8836057c833e239601c2971c20b915b55bdc11d91eda9772b997a5b27725cab2575d8892e85583

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\NK9YD4KU\desktop.ini
                                  MD5

                                  5b7bb1786b8936587643cd50d4d82260

                                  SHA1

                                  f3729802cff995c14c836a8a3e5b84141e983be3

                                  SHA256

                                  7da7d7529cad60e7d4f6dd5df09c22a3d5f277e2ee05a288e60aea9941335e5e

                                  SHA512

                                  5609b52fdb23de57cc2f8957dabed9ec4988740195cde063a73b3654cd31a91d40ce6e4116796a1b9d6a4b0b0682a235274a2920cd9d2448d85bc1e77b477350

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\QDAZQ7UR\desktop.ini
                                  MD5

                                  95823df2b7e0c7d4993aa93dc8496661

                                  SHA1

                                  a1710e900068153cb71f1855ddbd928a99b52622

                                  SHA256

                                  452e8124f58ba50e7389aecdef514878622bdc5ad56bc3e35fbea3eb75ba6c07

                                  SHA512

                                  d23dc070dd27948c989bd0bda32d5033cd3e1f2f1c590f79892d130a8683325fcbc5f4153852093e0e9aa141ccbf7a00dc914c920e53ae07a657b05f249de097

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\S3IV548V\desktop.ini
                                  MD5

                                  647747471a32860084c53f62891bcd0b

                                  SHA1

                                  7f017a2bcb237673ef5dc6b40eea0e0e47386289

                                  SHA256

                                  b39a5a191b5372f49b2106d9c408adda8d310dde7bfa4511707b3e7ae4211ddb

                                  SHA512

                                  a1f8785446b67f58586759d55c0587766486e4757b6d062907a60caef29055b83a339b18c44eeaef4185efd9573769a5d8e7de6df7d9322f5e01d6d95656267b

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\desktop.ini
                                  MD5

                                  36578e60120bd1f30491b1030987916a

                                  SHA1

                                  e8f210c5123b24eee1ff80eafb77a065a3222c63

                                  SHA256

                                  3702b05d224796c2c66846a6bd67d3a625377f3727502035aa88b31af8cbccb2

                                  SHA512

                                  4c7c288ace045cf9215ca0df9974886b1518b9e4bc0b64ec54501b38d15678846844f77cf25d765dca13a7776f12fccb9b6599b3efe6e5859642e5678361aaf6

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\FeedsStore.feedsdb-ms
                                  MD5

                                  a29b584c6ea0fb4762e6f1c559c90acb

                                  SHA1

                                  eb609c15dc7dbcd133cd7728c111407eb72cc2e5

                                  SHA256

                                  7ef8c408f44a17f0cfe6bb2b4f19c70c63dad4b49089322231866f8d8956a0c9

                                  SHA512

                                  f0b0fce40bd96b96f5f57ae01926f2418149503c8cee5a6989fbb3832d9791c0d0b5c639f6d01e5e0cad5fecb2d892988d85eb5ff88f608918b231005399b7c7

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.txt
                                  MD5

                                  02deb511d949bdcef62844a5fdef0e86

                                  SHA1

                                  2f0f9dd3e3ffc225de7470952ef3c7b8a52cecb7

                                  SHA256

                                  2e1b4fdcf2a952a67dbcb859f75f492773ba6655695bfa8697173f400d167629

                                  SHA512

                                  0ce460a8c3f8fa6a9a7307bf6dccc196787630bc11419d9b8ca50f6c45fad77b8d83fe952cf70704908c410f3f059824cfdc88b5a7864ff7cd665fc102d52ae8

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\LocalMLS_3.wmdb
                                  MD5

                                  9d7cedcb7aea8691e5b503e5ad42f932

                                  SHA1

                                  f8274c703402ee2372f03614542d3e81ba3aa920

                                  SHA256

                                  69ee793b7f678f82f4b9feea7febaf1c2807cdaf44001d4aceefd8a4ae8b52dc

                                  SHA512

                                  112e89b94ede6cb6b9d51f43ae6e63d0b03d54c600c890778b152386590f79130fc18a8df0820ce0f47296fd5859fb417cc6eef1421986cee200370911942efc

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PlayReady\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.htm
                                  MD5

                                  722a18fed355cd3dc31736c4bf03bae7

                                  SHA1

                                  1313c2664e5ec53a59cc138825b626668c8db891

                                  SHA256

                                  7316b16f50fed8d0d94227ace082d0f03e99f81cd63945764e37572feefe83d6

                                  SHA512

                                  c66e30ec808b96975b07d5c26e7642bf9c6278e9c3ebc64d40d32a62811880e1b6f7d5618982703ba925ee58a51a3499734f00d79f5df489752e13b213f2de3d

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.jpg
                                  MD5

                                  f709bbb676ba2c9224c944f270d944e2

                                  SHA1

                                  c43945b56f50749b31da1700784fc288c90d7a4a

                                  SHA256

                                  2b716341c0a99514e2cd2f3eaa013a935c59909b01f85a7c6da9048606cf656e

                                  SHA512

                                  d5602b763d9e3fcc68e67cdc6064bd0bb2eea788588eed96768fcfd6b8f25133ee1281361b6e48b90d59d2999ab662aa49046606f8021cea5444ab0bf4974f34

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Graph.emf
                                  MD5

                                  d872ad807b62792937bcaec55947f390

                                  SHA1

                                  64bf50681b293182d49e32ac3082d2ae30dbb229

                                  SHA256

                                  b81cf2bc91f4de9977a7f88241454593581553e407f339d65fcd23df1315a7d0

                                  SHA512

                                  95116a6c0f6aa78496c854e8b1031945f202b62a1bcf7d2d9a16fe1f3b56f2a052f85c1b4b1fb6d10302be7d1289a9162dc01b53e62d68d26c192fe6cebc7d90

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Music.emf
                                  MD5

                                  1a38e71477e123108ef5f2938284542b

                                  SHA1

                                  746d0abcb09ea90034b22193bc7edab70dbc66b6

                                  SHA256

                                  a304aa4369837080485365b2ba227e1b1d2e995399b7c440afcc789610ba11b0

                                  SHA512

                                  944fcbe4277e02ed41d74c7697620c6e9cdcab0905df33be1ff62263e4595b828761ea3a097747fb7aea7a294e07451eea95353d770e1fe91f440b8d27bb5184

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.htm
                                  MD5

                                  1a7e9ed717519905566a71e325d58de8

                                  SHA1

                                  b2920b6b5beaf9f92b9251aba3bd2b4babb3845c

                                  SHA256

                                  23bd99945601e660b58029f30d1eaca9773a89b3a463106795edfdbddd53ea18

                                  SHA512

                                  c3f77dd6630da36eb696edb1c2574c7c71d88bd21a85075610c6cfd4dc092c08393a11ff3046c0ff98a291b2d48c688a56dd4212b7046ce9db143fd1261e657e

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.htm
                                  MD5

                                  797fa8a3d0ac88cc4f0db54653b840a5

                                  SHA1

                                  a6f95cf0c75d30249faf607460cba1e31238403b

                                  SHA256

                                  20f1b3cb5e51b320734efd2688c57982746453b47eba9b3a2a3886a42a82a2e1

                                  SHA512

                                  092d8994b3591a1899876a1d25d8da509220835b2e69a47437f96244b03db7a00272c55770752008292f3419bf8c0c6aefdb558385fe207744997bf97a323ca2

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb00001.log
                                  MD5

                                  39df9fcc5a79045cdc07d8d4d9bd6b11

                                  SHA1

                                  f8d5cf02005b677081e726ccdbdad3349db6918b

                                  SHA256

                                  2bc9cd035a30497ce66545414bf9d4d8bdf5929e7cda0e5bb514809e0160315f

                                  SHA512

                                  bd578fea1c47e8b8461e828c9465f5c9dfba3869abc2494bf204d4f177551e4efa842e9e23c046d59a0b4f6df0904f7b3d045eb8f4aa5174c2294a51a4a3619a

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Media\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\Burn\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Caches\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Explorer\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Ringtones\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\WebCache\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\AppData\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\Admin\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\Documents and Settings\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_bc8e1036-7fb3-448e-8ad9-a824b1a03b8e
                                  MD5

                                  93a5aadeec082ffc1bca5aa27af70f52

                                  SHA1

                                  47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                  SHA256

                                  a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                  SHA512

                                  df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                • C:\RyukReadMe.html
                                  MD5

                                  e41bf45d702dd38780735a84111ff36a

                                  SHA1

                                  df74e8620445acbd98de86e2fdb832cef8a5a293

                                  SHA256

                                  a39929d27ea460eed2ebeeccf03095f79ed7022b1facf6f04b5d03334b2ccff1

                                  SHA512

                                  47545edb16cbebc4d28b0482c7a337f36081fe6f1221def9e2d4a53a79f30a38bdb1df49401b2b462153d27a81f026a69b20ceadbf450b9dcf77ee9207cedcfe

                                • memory/1256-56-0x000000013F370000-0x000000013F649000-memory.dmp
                                  Filesize

                                  2.8MB

                                • memory/1256-55-0x000000013F370000-0x000000013F649000-memory.dmp
                                  Filesize

                                  2.8MB

                                • memory/1332-58-0x000000013F370000-0x000000013F649000-memory.dmp
                                  Filesize

                                  2.8MB

                                • memory/2036-54-0x000007FEFC521000-0x000007FEFC523000-memory.dmp
                                  Filesize

                                  8KB