Analysis

  • max time kernel
    177s
  • max time network
    185s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-02-2022 05:28

General

  • Target

    7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9.exe

  • Size

    203KB

  • MD5

    071ccc24faaf0a8577075b7466293e8c

  • SHA1

    8beed359f92bfc5e14384783526f77049eb2cb9a

  • SHA256

    7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9

  • SHA512

    454f5db75da3285cc28795078b598b8995d6a3fd586084b68c583029455a437905b5e58451992b3277ff61a1cd3b09a6107d4b94810128a738496137c4a62f90

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each network host have been encrypted with a strong algorithm. Backups were encrypted too. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. Only we have exclusive decryption software, suitable for your situation. More than a year ago, world experts recognized the impossibility of such encryption deciphering by any means except the original decoder. No decryption software is available in the public. Antivirus companies, researchers, IT specialists, and any other persons cannot help you to decipher the data. Decryption takes from ten minutes up to several hours. It is performed automatically and doesn't require from you any actions except decoder launching. DO NOT RESET OR SHUTDOWN SYSTEM � files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions. Send 2 different random files and you will get them back decrypted. It can be from different computers on your network to be sure that one key decrypts everything. We will unlock 2 files for free. To get info (decrypt your files) contact us a [email protected] or [email protected] You will receive btc address for payment in the reply letter Ryuk No system is safe

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Modifies registry class 64 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2988
  • C:\Windows\system32\backgroundTaskHost.exe
    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
    1⤵
      PID:1652
    • C:\Windows\system32\backgroundTaskHost.exe
      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
      1⤵
        PID:1716
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
        • Modifies registry class
        PID:3456
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3400
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:2772
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:3060
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:2924
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2924 -s 3012
                2⤵
                • Program crash
                PID:5864
            • C:\Windows\system32\DllHost.exe
              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
              1⤵
              • Suspicious use of WriteProcessMemory
              PID:2740
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 2740 -s 948
                2⤵
                • Program crash
                PID:5112
            • C:\Windows\system32\svchost.exe
              C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
              1⤵
                PID:2520
              • C:\Windows\system32\taskhostw.exe
                taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                1⤵
                  PID:2280
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                  1⤵
                    PID:2236
                  • C:\Windows\system32\sihost.exe
                    sihost.exe
                    1⤵
                    • Drops desktop.ini file(s)
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2220
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "spooler" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1384
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "spooler" /y
                        3⤵
                          PID:5372
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:5108
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                          3⤵
                            PID:5364
                        • C:\Windows\System32\net.exe
                          "C:\Windows\System32\net.exe" stop "samss" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:3772
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "samss" /y
                            3⤵
                              PID:5580
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "spooler" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:5880
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "spooler" /y
                              3⤵
                                PID:6044
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:5928
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                3⤵
                                  PID:6060
                              • C:\Windows\System32\net.exe
                                "C:\Windows\System32\net.exe" stop "samss" /y
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:5976
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 stop "samss" /y
                                  3⤵
                                    PID:6052
                              • C:\Users\Admin\AppData\Local\Temp\7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9.exe
                                "C:\Users\Admin\AppData\Local\Temp\7ac8689ab907526b77e6294a8e91280b562046dc674a1a21e7f8e953821bccd9.exe"
                                1⤵
                                • Checks computer location settings
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:2092
                                • C:\Windows\System32\net.exe
                                  "C:\Windows\System32\net.exe" stop "spooler" /y
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1728
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop "spooler" /y
                                    3⤵
                                      PID:5340
                                  • C:\Windows\System32\net.exe
                                    "C:\Windows\System32\net.exe" stop "spooler" /y
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:3368
                                    • C:\Windows\system32\net1.exe
                                      C:\Windows\system32\net1 stop "spooler" /y
                                      3⤵
                                        PID:5344
                                    • C:\Windows\System32\net.exe
                                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                      2⤵
                                      • Suspicious use of WriteProcessMemory
                                      PID:4224
                                      • C:\Windows\system32\net1.exe
                                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                        3⤵
                                          PID:5592
                                      • C:\Windows\System32\net.exe
                                        "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                        2⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:5172
                                        • C:\Windows\system32\net1.exe
                                          C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                          3⤵
                                            PID:5600
                                        • C:\Windows\System32\net.exe
                                          "C:\Windows\System32\net.exe" stop "samss" /y
                                          2⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:5404
                                          • C:\Windows\system32\net1.exe
                                            C:\Windows\system32\net1 stop "samss" /y
                                            3⤵
                                              PID:5564
                                          • C:\Windows\System32\net.exe
                                            "C:\Windows\System32\net.exe" stop "samss" /y
                                            2⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:5424
                                            • C:\Windows\system32\net1.exe
                                              C:\Windows\system32\net1 stop "samss" /y
                                              3⤵
                                                PID:5568
                                            • C:\Windows\System32\net.exe
                                              "C:\Windows\System32\net.exe" stop "spooler" /y
                                              2⤵
                                                PID:6100
                                                • C:\Windows\system32\net1.exe
                                                  C:\Windows\system32\net1 stop "spooler" /y
                                                  3⤵
                                                    PID:5224
                                                • C:\Windows\System32\net.exe
                                                  "C:\Windows\System32\net.exe" stop "spooler" /y
                                                  2⤵
                                                    PID:6092
                                                    • C:\Windows\system32\net1.exe
                                                      C:\Windows\system32\net1 stop "spooler" /y
                                                      3⤵
                                                        PID:4332
                                                    • C:\Windows\System32\net.exe
                                                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                      2⤵
                                                        PID:6124
                                                        • C:\Windows\system32\net1.exe
                                                          C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                          3⤵
                                                            PID:1856
                                                        • C:\Windows\System32\net.exe
                                                          "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                          2⤵
                                                            PID:6116
                                                            • C:\Windows\system32\net1.exe
                                                              C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                              3⤵
                                                                PID:216
                                                            • C:\Windows\System32\net.exe
                                                              "C:\Windows\System32\net.exe" stop "samss" /y
                                                              2⤵
                                                                PID:4220
                                                                • C:\Windows\system32\net1.exe
                                                                  C:\Windows\system32\net1 stop "samss" /y
                                                                  3⤵
                                                                    PID:2860
                                                                • C:\Windows\System32\net.exe
                                                                  "C:\Windows\System32\net.exe" stop "samss" /y
                                                                  2⤵
                                                                    PID:6140
                                                                    • C:\Windows\system32\net1.exe
                                                                      C:\Windows\system32\net1 stop "samss" /y
                                                                      3⤵
                                                                        PID:4204
                                                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                                    1⤵
                                                                      PID:2980
                                                                    • C:\Windows\system32\WerFault.exe
                                                                      C:\Windows\system32\WerFault.exe -pss -s 460 -p 2924 -ip 2924
                                                                      1⤵
                                                                      • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                      PID:4940

                                                                    Network

                                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                                    Discovery

                                                                    Query Registry

                                                                    1
                                                                    T1012

                                                                    System Information Discovery

                                                                    2
                                                                    T1082

                                                                    Replay Monitor

                                                                    Loading Replay Monitor...

                                                                    Downloads

                                                                    • C:\Documents and Settings\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp.RYK
                                                                      MD5

                                                                      8650b370f7d087b1fec03e0677ea0d58

                                                                      SHA1

                                                                      141de4b73c855b4a757ea77a2c049dd6ea69e598

                                                                      SHA256

                                                                      23257fd81621c01aca4c19a7ed51daecb18e8b1f4f95578f2b7a372d3a914e81

                                                                      SHA512

                                                                      af24b42c52dcc5b908e97eab474436d77b18134ca5557e09a75f4342a6283cd06e6e5a33d3554ea43558438e12609ba7ee727cacd327f9e27890aac22fab0112

                                                                    • C:\Documents and Settings\Admin\.oracle_jre_usage\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\3D Objects\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\3D Objects\desktop.ini.RYK
                                                                      MD5

                                                                      2ceb69988849994a7a9007a5657a3984

                                                                      SHA1

                                                                      1f74d86c6c2b1ba6cbc038d94270d221890635c9

                                                                      SHA256

                                                                      ba8ec9c2f8b9daeaa37d84a5fffd3cb2e0b02a0e5c69b5d671fc37f28fb81ee0

                                                                      SHA512

                                                                      829de004720e097b0834da4e43ec2a5a1e4a16775ecd4cd8fe4743fde133f350ff2a21534c11e0cfa5913c5e9f7215c7dfbe7e42c7ce54160540bab7cbab1fd1

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.RYK
                                                                      MD5

                                                                      a45738dd14bb1c5251934c24c36285f6

                                                                      SHA1

                                                                      52e64f25c9f0bbad108740311c194a891fd40c5f

                                                                      SHA256

                                                                      0a92f16e4d91d8828848621cd52d107d358a6474a5ed8efc59abffeb77043d7a

                                                                      SHA512

                                                                      1cf3b62fdd8413fe606983598668638bcfaf02f6f411d28689ecdaa8a53acd1dfe2955fbb1cdddf539289d1f4703da379b81c1bee397d7d4a0244e08eed66138

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\UserCache.bin.RYK
                                                                      MD5

                                                                      2652337d5f2a03ccbf0ddf3a4275f464

                                                                      SHA1

                                                                      f4d50b521c78267eb8388f5bbfa533b609cd1d5f

                                                                      SHA256

                                                                      1ffca5aad0fd60adf72da61dd80fe83b187cbde78145144af45dedd6d88b02e0

                                                                      SHA512

                                                                      11e72ab6985e0991210271bcc42ee6929c91c79ec0a5f8b943c0ab309fe586661231cc005d25d42299cec62935e00e727058bcdf1f3fde0f4b8859e1ea2586fb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\ACECache11.lst.RYK
                                                                      MD5

                                                                      de764ec51a0f58c2eea45e57525e1e39

                                                                      SHA1

                                                                      92db0975f0a6900447dffa40659a0a2b85d0f37a

                                                                      SHA256

                                                                      0246424cf48469fbb005c76dd13f93c81a9b472dc01c4f85f84d0c0db84c8f04

                                                                      SHA512

                                                                      54059ddf8dfaf0cb0603668808aacc721fb762544e7023f32eda7cb3f21dd940891de6f5475da47065019e96684dc7935c2de3d201d3fea4dbb09e4a53064ca1

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wsRGB.icc.RYK
                                                                      MD5

                                                                      5a8638986c15545767f341de2d0d0c78

                                                                      SHA1

                                                                      e95dd64a88681f949d2c5549947d488631f2d9b2

                                                                      SHA256

                                                                      2698c17edbaa1528f5c87978d520f537e6438418da2dae41365cbb1696de88a8

                                                                      SHA512

                                                                      96cb95c4b04e4fa69b3fc09bf79fa549294891b99b9dd8c814ab6859dd0bd5146a024751fcb74049ea2697b6a0166a2a92723af226af7dbc9c3db57ed4289ce4

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.icc.RYK
                                                                      MD5

                                                                      fcac432da4ceebfc816865539dbdae97

                                                                      SHA1

                                                                      296183280041ee3f6fca7594503b63b74bd7c2d9

                                                                      SHA256

                                                                      145fa7d06c74a9e15151168a5aa2b1b20863156e59a748de034adbc29b947414

                                                                      SHA512

                                                                      814aa0de194ae80451a41da496b432ef321c7863e0b1351b7e41991383a5ae105bcc14e9ff6314066943894144a5c71dd2d436f79a41520ea2abfe05d829ede2

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jcp
                                                                      MD5

                                                                      6727bb6da7d91251bbcfdc6e9a02c98a

                                                                      SHA1

                                                                      42b19d6250dfbca26a84270d7787b0d951f57b2e

                                                                      SHA256

                                                                      38626d338353fca6f0f438fbd4cd5c3c56d52d4b5701e724a68738d115fa2f37

                                                                      SHA512

                                                                      eb908e11f47df7f09901a41fa1e772725bf3f53d516acad970b2fb5281b2e2c2c3ab98ac11b61e40870f4a1e2c55423ba209550af1f430f78551eefecad4afd1

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jtx
                                                                      MD5

                                                                      27c56429929e8f95ce80f08947658189

                                                                      SHA1

                                                                      b9d3d06b29960784e102f0d1cf787abf019eef7c

                                                                      SHA256

                                                                      89ce1a1986cd8d7284b55374c084b75e2c27e01dc08bac625484ff00a942f263

                                                                      SHA512

                                                                      e7f4c7331f281680b57bce42db9051da7c1e6b5f8ac012ce75a32d9da819f191e4a58a2da71e378ad03b709204b6c96569de5502d5f735ad86ad12a39c0fe4b3

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jtx
                                                                      MD5

                                                                      9b61657106725992be2de0deb4afca4c

                                                                      SHA1

                                                                      e8f3d8c7a7ce68cecb7126c7b274213e16f480d8

                                                                      SHA256

                                                                      cfb644a0eded832343b36bf3b7d98a5cdcc8c3881b52d1845848e9ab50edc4bf

                                                                      SHA512

                                                                      5318b4e51ef01c22798194a7941bd5b1554641754be97d66378ceea8f35c5df791880ad38737f64c16ab415a4d6e0252b34558100253746059c673f08538b094

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.jfm
                                                                      MD5

                                                                      c41f0714dd5ddc7ffa07f8fdde147ba1

                                                                      SHA1

                                                                      7feaae7b97f2c8ce795ec66e66003069ee6895df

                                                                      SHA256

                                                                      9675667a5b459027a1e56994fd8a328ffa50344bdfc1903be506af34da3ee4d9

                                                                      SHA512

                                                                      028b3560f227aea94e448b0de81acb5c9faab77dcafb4960d4bd2b21872b3fbe8767988484c8f04464c9a022fc3692bab9e5ccaaef25f30b013c448196d7a219

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.vol
                                                                      MD5

                                                                      1505ac49d874b394cd9edf4deda36bcf

                                                                      SHA1

                                                                      a88774eb399ad3c07f95985b2fb7948ee8baa81d

                                                                      SHA256

                                                                      2e44ffad7931f587bfa8d4ee252e9195b6bfe733c4676465bfa50b9d27ca1034

                                                                      SHA512

                                                                      068c4f35643f51c692720c33ec9f3ef28e8169daf4cde66b39d3d7e0fe3be8277406f515209ede671c127943787c20b43872bae6dd8caa00e7e99e65e989227e

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini.RYK
                                                                      MD5

                                                                      91566ac63abd394d34acd71dce207c86

                                                                      SHA1

                                                                      5d9bae9ac30e936a53f12bfaab7c68d219008368

                                                                      SHA256

                                                                      9c7f86c1f81590c49fdf30492960b22c2dc82fd4e46867c6dd4ebc62ccad3d41

                                                                      SHA512

                                                                      1c905d4b4e5cb06b559b484f943af54c1f4894d2a0dabae589f090be82dbe80f2ceeef44bcde54c53c636238b192ccfd238ac187cbd90611d712def201c85d7f

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.db.RYK
                                                                      MD5

                                                                      db2ca64f536fa825f3297119871aebb5

                                                                      SHA1

                                                                      d6b3fb62fdcbcfbc109a39809f027eb1ba87c7f6

                                                                      SHA256

                                                                      6d1da09c75d658a99838510b6ee28f5f2b31b4bbdc60930222eda79a651ecf8f

                                                                      SHA512

                                                                      8a8f7e60e87cd55d537aceb624443b944332f1c9a07db782c7e76463aeb9883574ad495858d89ccca8d8e507fedf2cd91a3cbf2b893670a5ac63a9b42f4c3b0e

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\AdobeSFX.log
                                                                      MD5

                                                                      47caa158658ac80bf6c83995814e139b

                                                                      SHA1

                                                                      a81962d6c98568c2f9ac7aa1bec496ce6daec4c2

                                                                      SHA256

                                                                      a7c442e703d674a17d0c8e20e4682c385b57e48a0e92a7a9d275850cba08d7cb

                                                                      SHA512

                                                                      868fa89e2beeff7d1a9e6e3357ee7112aa5d88bb863e5cc571d2e8b7a194f5cf22fdb1b81d271936323b5d2a89f354ce76d45b75297c1b05b32d7931652c1d99

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\JavaDeployReg.log
                                                                      MD5

                                                                      f62e8377ce799b8ec21e1363889fc7a9

                                                                      SHA1

                                                                      bb87186d48f743543183e9ab36312e4e550dd6bb

                                                                      SHA256

                                                                      53c8136915e572b144246ae42142486d7c12f1aa553f575bfe94855370999884

                                                                      SHA512

                                                                      1cb6e2a250378e24e1406574c2dae939f638164e830641b615754d1dfce595bacc5de4cc2a6657bf1a152d1aa18126ca23da7f3d1e45df784601fbffca3a78cb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\aria-debug-2324.log
                                                                      MD5

                                                                      01c162ddaa842c665d45b97b90b4acbb

                                                                      SHA1

                                                                      61ca296984a0bfe13b11f8b676c9472b8ae4d375

                                                                      SHA256

                                                                      1359cfd551886a17232bf3d85468e34ed429d3e53f0aad2ba602e4ca4ec4651f

                                                                      SHA512

                                                                      918af691f9e7a1af3dc6055b284fbf59d77cbcdb957cd7be20fef0e70b0e0e8e5ff31f669c16499e24545dcc7b24924e598764f916ad13d8beacce87563be044

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.log
                                                                      MD5

                                                                      d5f73bfc61bdca56ab83f036a25e8384

                                                                      SHA1

                                                                      d81a37d39009d665b3dad64e90fb02db099f6e5e

                                                                      SHA256

                                                                      1556c109ab18bbdd4ccd9576a04379f068961b553610c0ccf1033c097a38b10e

                                                                      SHA512

                                                                      d91d78989c7052791baf7445d0fd0d20cbfa5fb915a7592fc0eb86a7d3f74c598236285becd558b64f0d59adf09bd3a9d7dece44d9196c74b1ba792c38378503

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46A8.txt
                                                                      MD5

                                                                      e641215ad6ac2086e017c0e64838c0aa

                                                                      SHA1

                                                                      92fc66cebf948294c0173e03b7cdc299395e8db8

                                                                      SHA256

                                                                      3d70b8020e290744e1bff1c734be52d01d17f7bed4b1d76c123163d37b526cea

                                                                      SHA512

                                                                      554b27086523dfeb7ecf2e556d2e1851a1c046b5c1a2cdf8aceae7a2773e909f12fa09d63d0c8045128b3dc7fffb4505e519e49698e3ae1a727d568fbac4c105

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46E0.txt
                                                                      MD5

                                                                      1f964df42755cad300939768810d9742

                                                                      SHA1

                                                                      9c90f2c9ea2cb56cb4ce304fcc52958981aeff0b

                                                                      SHA256

                                                                      8c05c9a1b77234cc9bd1cb527585dca0c3c7666431146e77ac2cc38c6e993f02

                                                                      SHA512

                                                                      b45fb451ca4c665c1dc9c468d7f5d15f32b42c197faa2da5af48f1119b0aabd6cd3b50767857d236c01d48db3f3d9a1552a69ed5bcb9a9cbf75638ad7a81a3d4

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wmsetup.log
                                                                      MD5

                                                                      f048e5fff270591c7bd9840e92eb6639

                                                                      SHA1

                                                                      500a077f5cadc3829f839787d21b2fd83af9f6e0

                                                                      SHA256

                                                                      58afdfa77ed941fc5cb5bdef26418916ef9cfaf1e62985451ab86826e3bc0785

                                                                      SHA512

                                                                      fca88dd1dd8a242d730101e33a29a1ff90e26562794f8907b5754bde274797368991e296f994de54773db85101f16528a5af0f1d9544fa1364aa2df1fc248ee8

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USSres00001.jrs.RYK
                                                                      MD5

                                                                      4caeb62ba9202cf032549b0ece66be8d

                                                                      SHA1

                                                                      061185b8ab97ed236fab2be502e43438752bc73a

                                                                      SHA256

                                                                      8e6aed06e3aea06de9b4ab438b69c6972cd69fb5d00d1150d343676a5a523e24

                                                                      SHA512

                                                                      7278018e51a710b85b084f46462e00bc21b918004e5cb59bc99f258f5cdc241feae314f4d0a85885dd1b07aa067085ea4e4ce622468574e4b748d9bcfffb1a95

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USStmp.jtx
                                                                      MD5

                                                                      bc178c31b2a6624d550c2056c5c1772d

                                                                      SHA1

                                                                      47661320da6d07424a351cd0010d8f5c9ccae3cb

                                                                      SHA256

                                                                      ed22a57cce790ddb27f54d4f46a4e72a3af4f883a94fcbd69d3900a102fea739

                                                                      SHA512

                                                                      bc6c85f02d7f9bb2d68342e4852aa6124832241bf9c4a9c89c43cf95437fe74e0bd1e454bd13efa9330d954e3fc83bf2640c9f44bcbd2df0fcf5335a871c4206

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USStmp.jtx
                                                                      MD5

                                                                      bc178c31b2a6624d550c2056c5c1772d

                                                                      SHA1

                                                                      47661320da6d07424a351cd0010d8f5c9ccae3cb

                                                                      SHA256

                                                                      ed22a57cce790ddb27f54d4f46a4e72a3af4f883a94fcbd69d3900a102fea739

                                                                      SHA512

                                                                      bc6c85f02d7f9bb2d68342e4852aa6124832241bf9c4a9c89c43cf95437fe74e0bd1e454bd13efa9330d954e3fc83bf2640c9f44bcbd2df0fcf5335a871c4206

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\temp\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\L.Admin.cdp
                                                                      MD5

                                                                      48ce28613d74befce37174f5cbfa9f44

                                                                      SHA1

                                                                      92a733e02a05bb1a28d336b5879eb9adada1df3a

                                                                      SHA256

                                                                      98b5156f9c74bee2938a6dcfe9d4cfa5f8806f76e6b75a4a080870cf6c736c7f

                                                                      SHA512

                                                                      6b04fcc95a8dfb6826ce79b67922f88b04649b6465d2d043f686b5b03a39bb57c912d7cbd6434c2779b4931a97174f8ec4589249663010c99f042b38491ed965

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\History.IE5\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\UsageLogs\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0_32\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Login Data
                                                                      MD5

                                                                      c935ed1f454802602feab049875c44ab

                                                                      SHA1

                                                                      3ef9d65001618dae1c8113cc50902dc4cefb83b2

                                                                      SHA256

                                                                      b93f06232fb133cf2556c454aa207b74ef772452325b67534d51b1b0a834c729

                                                                      SHA512

                                                                      01d299436423266383f9a0162467db20a649f1d89f513b6832f703abe65f1c3145255626f5ef37bef4b2880bc81d5352e2a57cb853abbf88771c96e0a7ad04d3

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\Default\Web Data
                                                                      MD5

                                                                      1d1080837c225971c4cf0f2c8607df71

                                                                      SHA1

                                                                      a1aa6cba221a70b8a455cb1ae2334bf79f98beeb

                                                                      SHA256

                                                                      582d4a3f3814f6a51cfb00deac60158cd9659892292d0200134a62de89c36ef0

                                                                      SHA512

                                                                      dc191e780c38b88c8ee4ca651e976908ef8cb48bc31f04eda11619216226dde2777f1118cd70ea62c56bae9eab4c7bec39de2c6da97651ab4d6bbf839556dff9

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Edge\User Data\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\AppData\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\Admin\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\Documents and Settings\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_0d751396-3164-4736-b931-4f59d47ff1f2
                                                                      MD5

                                                                      93a5aadeec082ffc1bca5aa27af70f52

                                                                      SHA1

                                                                      47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                                                      SHA256

                                                                      a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                                                      SHA512

                                                                      df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                                                    • C:\RyukReadMe.txt
                                                                      MD5

                                                                      55b3bfb09c9b34a5800004bbc9cd87d7

                                                                      SHA1

                                                                      43fcc0be9f710cb7be8358908127cb31753f38dc

                                                                      SHA256

                                                                      3921b57959fe1fe6adac8f3e0af281395f4063d0537edfbcc1fa01f8d1700be4

                                                                      SHA512

                                                                      b4b6b947a967182a07c559d8240775ffd05279f6d4536f81d3a0b3ce46d24cca84b5da5e1d4973f68160cbfe20c02a899e2dbaa0b5117a8b0b20a41d47419efb

                                                                    • memory/2220-130-0x00007FF761430000-0x00007FF7617C6000-memory.dmp
                                                                      Filesize

                                                                      3.6MB

                                                                    • memory/2236-131-0x00007FF761430000-0x00007FF7617C6000-memory.dmp
                                                                      Filesize

                                                                      3.6MB

                                                                    • memory/2740-195-0x000001B6B83C0000-0x000001B6B83C8000-memory.dmp
                                                                      Filesize

                                                                      32KB

                                                                    • memory/2740-196-0x000001B6B8330000-0x000001B6B8331000-memory.dmp
                                                                      Filesize

                                                                      4KB