Analysis

  • max time kernel
    204s
  • max time network
    235s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-02-2022 01:32

General

  • Target

    d439abbc0c204aa869991837e62e7a5ebf30f5214e6f648c78dc812d4ffd62dd.exe

  • Size

    124KB

  • MD5

    4bb18d5e27f9e75b211f8053a1e0fb4f

  • SHA1

    4eb0d5fab83c5a92e442beee4b31a6cd7d05cf4e

  • SHA256

    d439abbc0c204aa869991837e62e7a5ebf30f5214e6f648c78dc812d4ffd62dd

  • SHA512

    bdb107f07beb782a1d90857cd3e895c7013ceb8b4dc78285014434214e9c34925e0c6ce8278b48acdcddeb1b430804f5a0c9398f7012f45d68a869dfd51fcaed

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each host in the network have been encrypted with a strong algorithm. Backups were either encrypted Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. We exclusively have decryption software for your situation. More than a year ago, world experts recognized the impossibility of deciphering by any means except the original decoder. No decryption software is available in the public. Antiviruse companies, researchers, IT specialists, and no other persons cant help you encrypt the data. DO NOT RESET OR SHUTDOWN - files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions.Send 2 different random files and you will get it decrypted. It can be from different computers on your network to be sure that one key decrypts everything. 2 files we unlock for free To get info (decrypt your files) contact us at [email protected] or [email protected] You will receive btc address for payment in the reply letter Ryuk No system is safe

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Drops desktop.ini file(s) 3 IoCs
  • Program crash 2 IoCs
  • Modifies data under HKEY_USERS 19 IoCs
  • Modifies registry class 59 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:2988
    • C:\Windows\system32\backgroundTaskHost.exe
      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
      1⤵
        PID:872
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
        • Modifies registry class
        PID:2776
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3428
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:2660
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:3064
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2924
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2924 -s 3296
                2⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                PID:5200
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2744
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2744 -s 1000
                2⤵
                • Program crash
                • Suspicious behavior: EnumeratesProcesses
                PID:3712
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
              1⤵
                PID:2532
              • C:\Windows\Explorer.EXE
                C:\Windows\Explorer.EXE
                1⤵
                • Suspicious behavior: GetForegroundWindowSpam
                • Suspicious use of AdjustPrivilegeToken
                PID:2440
                • C:\Users\Admin\AppData\Local\Temp\d439abbc0c204aa869991837e62e7a5ebf30f5214e6f648c78dc812d4ffd62dd.exe
                  "C:\Users\Admin\AppData\Local\Temp\d439abbc0c204aa869991837e62e7a5ebf30f5214e6f648c78dc812d4ffd62dd.exe"
                  2⤵
                  • Drops desktop.ini file(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:652
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                1⤵
                  PID:2288
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                  1⤵
                    PID:2244
                  • C:\Windows\system32\sihost.exe
                    sihost.exe
                    1⤵
                    • Drops desktop.ini file(s)
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2228
                  • C:\Windows\system32\WerFault.exe
                    C:\Windows\system32\WerFault.exe -pss -s 428 -p 2924 -ip 2924
                    1⤵
                    • Suspicious use of NtCreateProcessExOtherParentProcess
                    • Suspicious use of WriteProcessMemory
                    PID:5036
                  • C:\Windows\System32\svchost.exe
                    C:\Windows\System32\svchost.exe -k NetworkService -p
                    1⤵
                    • Modifies data under HKEY_USERS
                    PID:496

                  Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Documents and Settings\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp.RYK
                    MD5

                    19792d0a17c3d21aecfc9137421f93a4

                    SHA1

                    2844c12936c1d6f0ab62c7516a87d27675a1bce1

                    SHA256

                    9db1ef52b8a69fda51042511aafd429de0bc91fcd32ecc102c7f988b428d18d7

                    SHA512

                    06c785e2e5b218e0236c76ee70228c218f3fdc8bd67508a246815e97d4d01bc73584d30198771d809f2ef065a351f9d616ac44e1b38a5f5f449abc2588a60317

                  • C:\Documents and Settings\Admin\.oracle_jre_usage\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\3D Objects\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\3D Objects\desktop.ini.RYK
                    MD5

                    bd828bcca5d657c4d57b2330535f9ba2

                    SHA1

                    fa88f5608cc9c7eabc075d04841696bddf89075d

                    SHA256

                    7043144b80231a13d18d7e51e8eaaa9352e7abacb5d4ed93b9158b757cb29cde

                    SHA512

                    caa6e7ea7447566b2aa70a27b20f898bd6b79e24ee311c98962e857f8e5387ef859093298151257f2ee64b2f6bfc59f06bb01189d38ff2b28f21dac478358bb0

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.RYK
                    MD5

                    6b70d1ef2a1277ef179de564d99fbf0e

                    SHA1

                    89367e52d3f29b2e645f0e89a638784d74abac2e

                    SHA256

                    79c0807ca06b486fe2a52146ddc92bd4c31590114b57ea51249ece6125d560aa

                    SHA512

                    e7f65147b5faf33b195222d5f4005881774143aaa8b04b48d5620ba26c770c02c8249c969021655f8608ebb25b91baf97b22aa1e01dc8e9ddabce5454067627b

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\UserCache.binRYK.RYK
                    MD5

                    b67d7cae265ae26d8ce58263f81d6e06

                    SHA1

                    f3072dbed0cee19a5d357607d75e69d1a422008c

                    SHA256

                    16dc1e7fa7fb782b990bbf280f47728704bcfc427edb3f3c13d8570591508dc3

                    SHA512

                    24789e0c913b2c29ff454351e4f3d2433a01d5fa36602b35a6ce2787398da5b4595bb60bad387fa5cb84031f9c4ce9e7c798a1cc32dfce2b86f4ecd26d79a758

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\ACECache11.lst.RYK
                    MD5

                    a64390b71364b2a15d1a58d911bbed37

                    SHA1

                    ed67caf4b55a124d1a24021707be01bbf71d83a4

                    SHA256

                    26bd46efb229a00b1587323c45c5d93ad3e43396498d397b9efa445a7188b02b

                    SHA512

                    2f9cdf5b4068b0f3fdf8dc3972cae70c00287228d8bda0175a63b5f789bd9a3259d950a7957c2c489f6bdb136eaf4bfc3c2bcb3511f58cb51712ab0529da648e

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wsRGB.icc.RYK
                    MD5

                    254b74a01262cb2e4d2b3c0c3cdf047e

                    SHA1

                    c55c6a14e915c87530b660de373df0521d474d1c

                    SHA256

                    4d88c1b7bbafc3926ea1ade9289e13acab2c9a34d46635712ab9c6214655fc3c

                    SHA512

                    8631d608413b984ca7bbbf4fb19d55ff2d0af8d38ebf1d7fd51338ef19972492b369a9d8eb9cf138a7c37bd7bc8d2cba79df0b874737dfe6c5950504f114c83e

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Adobe\Color\Profiles\wscRGB.icc.RYK
                    MD5

                    d7ce518446ebbf87ec54b526fb66f34c

                    SHA1

                    cbe178363b1e76bae6e74e92664c1ae1feabab7a

                    SHA256

                    1620c843c267f42bcb94911c43d9aafd74361f176f33b7de3c8291a2fd48a39f

                    SHA512

                    20a834519f20d6f14533f385fa7f5d2d78d7c7fa27fdec36392b640ebc5c5132367223271ac75041642327aab4d467dd6c2da9a8669f1e97d68defb1fca0c6cc

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini
                    MD5

                    fa53d94c7cc4a6a769086ed116255b3a

                    SHA1

                    e3978fa23025b83fc5f9e29eedca2a8667e5935f

                    SHA256

                    7f028f48f13fd13f71575e2a87a27b13f69d796f6107bcb78fe087f6c45ed961

                    SHA512

                    7f1c279762a1d9e017165deb07a376a18ec534678abddbda78c52c1ba73cb61b29e0942d16cd9d09ce095486be5ddfb43e64fd3057d6297ab2f308c3a4426765

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\DO775D.tmp
                    MD5

                    652714980ba6485a9b9de98eee6139b1

                    SHA1

                    a744e22c5a7d0667e5189f604feb376e76f5a5da

                    SHA256

                    5a40224520dc098940d5879aab710e2c0dd188bd5e5266f601eeae651ec0a29a

                    SHA512

                    e5bc36f5a16455b7802884bea7594393b2aaa19551094a15ec26704d7adfb867857749ead9313b0d4c436286d19955129d7c6bc2b9f612bd37c43e2372f8a583

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\JavaDeployReg.log
                    MD5

                    371f977d019232767f42b0f6f3d26545

                    SHA1

                    012860ab213c8a04370ac3588a6a8bb6b3eb943e

                    SHA256

                    2ac592db94caa7d29ed65452e4a4bbc7c5f5e58461a0918d3bd542814cd6c1b3

                    SHA512

                    d6d13971148b1c2afb11825a29daae91f1a85316f7fdce5540b00abc418e6615c38751aff25c7e0cbf31a5d806f37333fe4fc359647cbe59cf52d08afce79c65

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\aria-debug-2324.log
                    MD5

                    6ebc559e0ec23ca3bd7bf52501ad7165

                    SHA1

                    4994267bf29bf593168039d39cffd456f16f13ca

                    SHA256

                    b32750e1d2c33b4b8ed3789803ff6f267eeba5b1add6a6d598de8b6eeb6ad0c4

                    SHA512

                    d62d79d2fae6b0467712b9467980864633e44bef1442fd80033c0e29f62225e6e1cdb4bef8a325f1f633e579ccfafd609be315d9bc9913894ace4a30d0e4b9fb

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.log
                    MD5

                    1e9230aa84b2622447c55b3136e8d5cf

                    SHA1

                    ba7e3e40055124ea9620245ca854b6d7d4acac55

                    SHA256

                    fb70486ddf0568a61708d816477aa32bd738aeb629b4c148048515c7062acbc6

                    SHA512

                    5396d1facb305be1185f0ac2283983cac2d22917f787456df7a8ea9c62f278be2a8e9aa2beeb09b0bc8e90074ac95a5ad85c37a41eb25d07e5d9b04c263935bd

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46A8.txt
                    MD5

                    50bd72f675f6bf02d67840bfa26c302a

                    SHA1

                    d64d68062eb5897170c87d750c1e1d214050527b

                    SHA256

                    c840325348caf4d0c697bf95b8a29d691b6141042177b6107f705d0d7c9e15d3

                    SHA512

                    bde1eaef00ab16972d9e6c57110b873bfd111c1af9f6ee8b04aedb423bb00edf27dbf479d09317a759acd511860fcac8c2c503b5e2e34663c8bb5aabe3e3df6f

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46E0.txt
                    MD5

                    991b5f38dab05d6bec6b15159b3704d6

                    SHA1

                    5ce93ee160ea652af41009b56d035379831ea518

                    SHA256

                    39a2354a66d6597d7671f5206eb9a3ccaed4e03b10ddc726347143970617da37

                    SHA512

                    6a08232c6f908f5a5baefc2825cbb4d2827bac58210ca1f61cce3227453461243040cba81115c6c736b76e73b77b8b8ddcc511befd4c4ddbcf52468e09b38b24

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\jusched.log
                    MD5

                    029f823e875077a94a2a64b730996eeb

                    SHA1

                    f5d61abe85323a1443bfa3f8964b2b2bb987e224

                    SHA256

                    f09dec29f0c26645bb4c1d2d94d523d7244e555fd9d990ebe279661d3b62dd96

                    SHA512

                    0c35821f2ed8f66dce55ac5f3d6c526367693490bf893c4131d17ab04e7fd5bda06865d227d8ade30233b66081b9746c69de8bef98db38cdc37d5f11369b2f87

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_installer.log
                    MD5

                    42ee4843f0ee696ab0e6e1567c406797

                    SHA1

                    fd37f5ed8a33d29febb528ae1b739974137f9ded

                    SHA256

                    6cac27fe7b1f2753adccc9820b5042a2034115dcbf02bce8ca3980296aacb777

                    SHA512

                    79caf8ee5b429d1480c745a30a83959298b6d74f02d9ef8df214318596c696bb35cee50e0eab908b6dc732ed3ce557c37ce7e5afc8e45f328cda7364c0db2ab0

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\offline
                    MD5

                    6344140ecd4fe105cffb62b877cb671e

                    SHA1

                    5deecd4a3b7ab9ee6eeca1f611182ed3d39f3cae

                    SHA256

                    d06b1f60f18e2f12d506b95703ba9803fb94d1b4109f38a2f2519596d25cf151

                    SHA512

                    e20733a1043ccadb0f46080db80ca9c256ee617a9048f66fde1f1b9855220918b93bc1272e73e1f97960140ffdefb12c45e74ef179ccd7efa00e0cdc30bdcef8

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\offline.session64
                    MD5

                    60fc63455db6d4dd6182ecee536f18bc

                    SHA1

                    ea6b23fe3a3dd34319b5e509d5491fa803344114

                    SHA256

                    0be9412e9e05a3f7959b19d5309bec281a4b07d687e0417ee39cb5eba91551d5

                    SHA512

                    576c546a52fb59c3e3a1c30015a14770b1326ddf3f0097ddd08aea3ea39373d9c4351c0608b173e2f0e4c8298fefaef4a75bbcc660de24b878157e2f7aca31b7

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\tmp3097.tmp
                    MD5

                    1853dec212cb0752a771a4850805c570

                    SHA1

                    3a782aac718a3f0daef313a55b0e234ed14c29de

                    SHA256

                    d20e6863ab816720092ba538ad738774bbe9ebf5c9d61042d48d67e74949205c

                    SHA512

                    d1a953c0255e39426f43f23ad22a14981b6c73a032a60d6b7ea801f83a4dd911e6fac72ae53a21937a644e22e850dfdd52ce7766eb9e0df5792fefd3cf51389b

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\tmp3384.tmp
                    MD5

                    23fe6ae16786e856657037a3f0bd271b

                    SHA1

                    576a3489c03d27bc246275bc4a4f6cc754943763

                    SHA256

                    6b726e9cc86117c2e477353541aaf425d81bade6c7b097595dd8ae0e70b67fd4

                    SHA512

                    95783df38ea30c1f9a9896322573f41aadf581c567ec7638323377c6e8436c66fad943b2d6c00b0b7d2aeecb35350c1b57e4afe8718ad98af5e0e9240e23bd91

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct2BC9.tmp
                    MD5

                    110a02386786ad7a6d453fd7e414f59b

                    SHA1

                    50f57ad20f47e17efc4dca4fa90ccd92258ff7a3

                    SHA256

                    fdc2946ee598c4e7ba59893ddd60fd7ac7547eacde60125b2c99c221f682e1ce

                    SHA512

                    f73649ec4921928ca4a3d1fa1ed4f961e202b089b15562f36e19c7599a802dd7b5fad958617ba4d03807370da58d80dabfe402d2f3d0185261ae0246a8913eba

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct2D5A.tmp
                    MD5

                    d655a3078ac63077ba77c68d1557f56a

                    SHA1

                    586130c668af786fe88e4cc73d6a194663c1f603

                    SHA256

                    4452bf30741258f46d461ac45082c7c78be51b92a995580cfd9fff0776f0f5ca

                    SHA512

                    49894c6a3a23b04e4eb62367e4ab12f55f56381299111aedb9f13b20ee249beb49dc91dd07f0c7b0432ad4fac88500384c1619599463c7db3afffdc8a87ee272

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wctEFCE.tmp
                    MD5

                    bbe15286c4c2d09594fba563cb50b80d

                    SHA1

                    6cfcd1676e846073d878e47c657338aaad6c0588

                    SHA256

                    1220035180f8da256a593219cfed1caee53861a1f52143154a2d90ecc77f00a3

                    SHA512

                    d42fd2f5da7f9701899a631aff9bb4f028a145ec5f2b02c59fb888eb40f5ef78692e7c1bdcd12cd0004d4c4a6fd7de7d51c7e1a766d41cb5a677b3c39531904b

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wmsetup.log
                    MD5

                    06063184833898b62c43957d0627e662

                    SHA1

                    5e3b8efa176cfc8996bb5610d298a4c4b1eb78f8

                    SHA256

                    9c0af2e5de43a51a21c4a86443b08971ee2e8097fc45681218427be1f98868da

                    SHA512

                    e2988a8ae619983f9998cfcee529314ba34ebbf25e48b70c81e46fedbe544657b88ce1e463fdeaa5627a4e6ff1d799ec160af691c742e9de7869797dbffeaf89

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jcp
                    MD5

                    fad1dcf1d45fef3dd93c8d0fdc163c65

                    SHA1

                    83fc44cfa49c938be4ebe09dc420a373078f3076

                    SHA256

                    724b7ca7d1ec7393d1dceeb648a20e4e16b7229f3bea93d3bf74ec40778bdbd2

                    SHA512

                    0401484b4a111d5c9c96d9a73dff8a398f35403d447bb3a60d0aaebc8d15d4c629232833d75e22fb1b7edff72b5e8b58c81a5303d4443a4cf8dc669f08887758

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jtx
                    MD5

                    6ce57600da7b4296a8de0b1badabb4a0

                    SHA1

                    cf1c191862a37938f6856caee39f965899432097

                    SHA256

                    2e90967de43c688f34a03570938a4b88ad8becd84cef1ca6e30857525b086ef9

                    SHA512

                    d16c052a526323cdb65a3edc0f4c7fa0298659c9f3f04ab765c8a3aad3378b34a7345ccf4213e550404a9f590efe173cb7ebac3d6ea27811758ac836bafd19cf

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USStmp.jtx
                    MD5

                    26d43e33cd8e704498bdf7a0a4be3588

                    SHA1

                    f623e624dd818b6d6d4e6b148c4f78f0709447af

                    SHA256

                    fed8af071602bf82434921382cee08b8b541ddea6a320406d5a6f6838ef05cb5

                    SHA512

                    2175f66c61e4e564ff578eb7838bc3b49deed646410b2dc77cdcebfa758482371322b2e0c027c07bb51f2e68e1357106f28621ebd8ef0c7b6acf36ad5dd63198

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.jfm
                    MD5

                    d13ff1f3aa46cadb010f2bc8bb03c421

                    SHA1

                    fd3dc397b75bdfcd887313d6cd5b1a03ba9abfc0

                    SHA256

                    b4c8a5ea09d3ebc4048b33f0bb86f75c47a269f821584a819cffea106aa9ce2f

                    SHA512

                    dea4d5f3568834f38de0f348c326a50394ee21f2d8a4ef4848ab847fbffdb4740b4cb1cd96572dbe04feda1c9fa1be604897fa80522162e7d6f6f797c420aed1

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.vol
                    MD5

                    0d69de48dff6e82dd395697388e91698

                    SHA1

                    35f702ed1add10b792abf538d9c3dc31a3c4dc7d

                    SHA256

                    c21076ea8b24b245d958a5afff62591d27d20ac852367bc6d1effa9a736df333

                    SHA512

                    5e25a56aae153c612018f0e2e56384bb330b8dd63dd1ca29f33579996aca7a7bb3b713c59246e12368f997d87a58d03136d8e1912de2c772722ea65102962407

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\temp\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\UsageLogs\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0_32\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\GameDVR\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\input\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\AppData\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\Admin\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\Documents and Settings\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_0d751396-3164-4736-b931-4f59d47ff1f2
                    MD5

                    93a5aadeec082ffc1bca5aa27af70f52

                    SHA1

                    47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                    SHA256

                    a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                    SHA512

                    df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                  • C:\RyukReadMe.txt
                    MD5

                    42ac10b17dec8f69e4407d67f609d31e

                    SHA1

                    1b34d8da6ae28878631afa6e9061c03bfbe4272c

                    SHA256

                    0dbe2464ba83217256bfb9831a18d04111439f1330a5a53812e7c9e89a2443dc

                    SHA512

                    930462579bb90693c0eb0a8d63dac01f23f2d02eb2ae7d87ea3a368857926a8b9a60fb7e501e0995309fe115e79668a19c56a7bb1e6ea500e6ab407b6c56ec0e

                  • memory/872-132-0x00007FF686140000-0x00007FF6864C1000-memory.dmp
                    Filesize

                    3.5MB

                  • memory/2228-130-0x00007FF686140000-0x00007FF6864C1000-memory.dmp
                    Filesize

                    3.5MB

                  • memory/2660-131-0x00007FF686140000-0x00007FF6864C1000-memory.dmp
                    Filesize

                    3.5MB

                  • memory/2744-134-0x000001D9915C0000-0x000001D9915C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2744-133-0x000001D9915F0000-0x000001D9915F8000-memory.dmp
                    Filesize

                    32KB

                  • memory/2744-160-0x000001D991430000-0x000001D991438000-memory.dmp
                    Filesize

                    32KB

                  • memory/2744-161-0x000001D9913C0000-0x000001D9913C1000-memory.dmp
                    Filesize

                    4KB

                  • memory/2744-201-0x000001D991430000-0x000001D991438000-memory.dmp
                    Filesize

                    32KB

                  • memory/2744-202-0x000001D9913C0000-0x000001D9913C1000-memory.dmp
                    Filesize

                    4KB