Analysis

  • max time kernel
    175s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-02-2022 05:14

General

  • Target

    80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe

  • Size

    203KB

  • MD5

    8431a207fab74137df795fb46732544c

  • SHA1

    abb80c03d3aa69ac38f62a447636b0fc1bf21d45

  • SHA256

    80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

  • SHA512

    98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> [email protected] </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\Documents and Settings\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] [email protected] balance of shadow universe Ryuk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1172
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1116
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Windows\system32\taskhost.exe" /f
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:308
        • C:\Windows\system32\reg.exe
          REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Windows\system32\taskhost.exe" /f
          3⤵
          • Adds Run key to start application
          PID:2256
      • C:\Windows\System32\net.exe
        "C:\Windows\System32\net.exe" stop "samss" /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop "samss" /y
          3⤵
            PID:1792
        • C:\Windows\System32\net.exe
          "C:\Windows\System32\net.exe" stop "samss" /y
          2⤵
            PID:97520
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop "samss" /y
              3⤵
                PID:99652
          • C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
            "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe"
            1⤵
            • Loads dropped DLL
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1528
            • C:\Users\Admin\AppData\Local\Temp\qcmUfvS.exe
              "C:\Users\Admin\AppData\Local\Temp\qcmUfvS.exe" 8 LAN
              2⤵
              • Executes dropped EXE
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:820
              • C:\Windows\System32\net.exe
                "C:\Windows\System32\net.exe" stop "samss" /y
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:756
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 stop "samss" /y
                  4⤵
                    PID:2024
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\qcmUfvS.exe" /f
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:7188
                  • C:\Windows\system32\reg.exe
                    REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\qcmUfvS.exe" /f
                    4⤵
                    • Adds Run key to start application
                    PID:7240
                • C:\Windows\System32\net.exe
                  "C:\Windows\System32\net.exe" stop "samss" /y
                  3⤵
                    PID:111712
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop "samss" /y
                      4⤵
                        PID:112380
                  • C:\Windows\System32\net.exe
                    "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:676
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                      3⤵
                        PID:1260
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "samss" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:276
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "samss" /y
                        3⤵
                          PID:1328
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "samss" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1944
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "samss" /y
                          3⤵
                            PID:1348
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" /f
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1952
                          • C:\Windows\system32\reg.exe
                            REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" /f
                            3⤵
                            • Adds Run key to start application
                            PID:2264
                        • C:\Windows\System32\net.exe
                          "C:\Windows\System32\net.exe" stop "samss" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:7992
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "samss" /y
                            3⤵
                              PID:8016
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "samss" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:89504
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "samss" /y
                              3⤵
                                PID:91140

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Discovery

                          System Information Discovery

                          1
                          T1082

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\AcroFnt09.lst.RYK
                            MD5

                            6ad05c4624a2ef38c39b421d2cd94d2f

                            SHA1

                            2bf3d459d287fb99d455592a34b4090af936b4fd

                            SHA256

                            e4e1797e8986786c8ae77af2702b647301525a59119e29a91df567079c5437f0

                            SHA512

                            8ae457f59d276e86ebc8fc47a717eac811c28be2962931b82cf17dc7d3186ab0fa6fea5731550b464b0fc932a408dc06f456c0e17738aee3aff1d1b8225f39d7

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\ACECache10.lst.RYK
                            MD5

                            a4c5fee8d60b4fb28228e09b63251944

                            SHA1

                            faf0606cca5c2abe2f48e464a3869da89690860d

                            SHA256

                            6ae0d8d28e81f4d3fd0e0618cadcb53e83d6336c5ed72e66eb175fa6eca73558

                            SHA512

                            159d939940aaf8610aae6bf8ac2353017fef92d77f54c9079267a6336ab1b429fc595f3817c9a2efeea6ede6215c1b60f210e363a17163f3457fb238c80dd916

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wsRGB.icc.RYK
                            MD5

                            69de2e62dda158285f42c548dd41c00f

                            SHA1

                            cc077ca26827c4c265ace347759fcc2677e5ffd6

                            SHA256

                            379e54748a83205e12939cd2dc0f78a38e1f571720e485adddb84c62b6765100

                            SHA512

                            3d4c4509ec88ea324b8e1e92e04ce553fd22ca5eac0ec21b9e9cb8ceef42e853603f82e48f99829ec6037e30cf7924e8b8111dc472feaaeb150a768a73e48fb8

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.icc.RYK
                            MD5

                            8704e16fd12a1dd62bde8fa7f984ffb8

                            SHA1

                            fdc33b7b5a53520ca4bec933fc9565960b79b9ec

                            SHA256

                            a173fd55bcb678a7e19cebdabc4180b8a15628d1b1f55fae3ac087567756e959

                            SHA512

                            916033c78f2a48f55aacc68d9b02c35ac433b348c98bd112d14e490a86c235c95ae288b9459ed862f9d5a79120be435ea27c33a4b643d4659a8bce86414da332

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00000.log
                            MD5

                            d64f1dbb5228c854947c4bb22d3e1650

                            SHA1

                            1a134aea77b399271bb1895b1dad6d58a8522f18

                            SHA256

                            ef742b029135af3b8dc0a02198b6a4b8ce76a1081a5b036ba491ba2220c6f589

                            SHA512

                            a5fa3d93620c2965f3e1928c951eb17ceca321406092f84f24a9eacd51670ea1665a185af97499afe70f9add1224789cc435cc0b3276e6d358850ad4a43b9c9c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00001.log
                            MD5

                            659de372ab2f38296e6a3f04a5b910a4

                            SHA1

                            2ce3a9330e73a852dc079e087c356e48001ccc42

                            SHA256

                            738f88bc2b6727502806b9cb242dc1444bde2832b4969c6c221fc65bb50e08f3

                            SHA512

                            c08e8f8a711c902a0f9c56a2949d7e72a70796b72330ef6b0549f99146724d0acc18cea0693c646679e949451a4d909faae01eb339f6ee0b27ffff71c0865781

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGID605.tmp
                            MD5

                            4d727a21ff8e89bdfbecce4108fb2ff6

                            SHA1

                            cdc365a9c14b57600869e6bd2e0de55089f2a972

                            SHA256

                            af5c5773aa8661fb7802a38f936c967b5f8b3bbe3aba5ca705eb39e41ed6635b

                            SHA512

                            a7b2c6c3efca0e2fb67d6e5a4df77556b4ce41a0ca9c8f31f36ca949fae1afeb59a23d7c1e9ff9933034579e702a846afbca63ac640052b3a7dffd9647656710

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.log
                            MD5

                            c43e74af077a5bddf7ddb8df5ddbc27f

                            SHA1

                            5444bcc788b3f299cd83853b03c589a3d4a5adf1

                            SHA256

                            5537ca0164fe3c5f6ec233e79405701b3286eab9a23d60eb7a772ce58cd7f3e2

                            SHA512

                            15a53ad04079595ab3a0b9fe30d6a677e20c27b7b566da0010f46fb20769fec7084990d6867523f88437144be4479074f0cfb9c2570ee894f7e602268a9ed730

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\java_install_reg.log
                            MD5

                            cf40c2f13cec42a80238f678216e237e

                            SHA1

                            7a31132f8154dc7d7d904a281e46e092ddaaeeda

                            SHA256

                            18cc1f84aeb3d83f54c607677de88fd06db616cdab141b02d8af38df540def3d

                            SHA512

                            439bf9d12d501568855113ad270558bf670f43d3b329b61ff70ae41faba02052e58edc811d4e66c071634ebdeb603354777625cb4c006ecf8b06d9912e776e66

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wmsetup.log
                            MD5

                            c97d5a00faefa833687e098cf9dbedec

                            SHA1

                            f7e106266ce278c225615927adf8416d9d93b781

                            SHA256

                            01c810438e60a821efc0be349a71484d55a3f59ef61bf72df76817870f340362

                            SHA512

                            74193412346275fa7886e6b330e77a83bae4e21cdd8fd25e80845f59ea7fab5b9f75fba85f597c7b09222da368feaee8a83976402b5313075b884ff70ac44734

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\FeedsStore.feedsdb-ms
                            MD5

                            6759dd67092ab01baae35736ad962476

                            SHA1

                            e312dccc0ef0afa9f16f62e178d610d16e94f159

                            SHA256

                            d52bb81b0d5d58a5893150731fd8775da3b8bedbeb704753e5c394cefe7dd1c8

                            SHA512

                            ad8eeaa99a33b20e23ec85d80ad2d933c69502012259b15bf18b2f11ba12681464d02440918c1004fd877ad30532f531882a45fc38d9dd7271807f99e9ddcf29

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.bak
                            MD5

                            d3666d7fbd0181614846fc58962382fd

                            SHA1

                            f106bc2379e6e5007823cb6f91913c98aeb75ec9

                            SHA256

                            2bb5291300608969eb53c6ec9da494be8d0334109fd7f40fddc7e7f512a93d33

                            SHA512

                            30640e350b28c5b0a0040af687434bbba52f6831b971bea13099eaed9e804e4919576a683f1f2b5210d1310c58c9bc15e0b56fa4f342630c58bfb95bb085f7c4

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.txt
                            MD5

                            6fe077f37126d6cc6a601a21bf59a623

                            SHA1

                            900a6f0a489469695c15d494e92fe8eaaa0a2fbb

                            SHA256

                            84f520c695e55bb0004fa65315e6248f539647b63add827e4b92882ba40e3d70

                            SHA512

                            c140053b3612cfc58c4df5ab058a6e29f41ee050d6d52fb8e14feeb440bbcd591ef0ff27271939d26674269f431a17024afcd40d2815f9ec48f63a96f1cba50e

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.htm
                            MD5

                            e81766b72807b94dacf40a7bc8cd033c

                            SHA1

                            c68edeecddca803a003078c9b2c6d20b63a45774

                            SHA256

                            7be91c343e29ac79aded29fe02215f1e976d9bd9beb547634176a20c38988c2b

                            SHA512

                            e6b06d8aee979445ad1f33404703d5b1b4c03a58da85f7cfc3c95006d19cc3901254f876246cebd818b080eaf623a08acffdfc4d261aab907223158950415ba3

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.jpg
                            MD5

                            4d7a7578ede64ed923c0477a05a52aec

                            SHA1

                            a64ac1f4f079a31554456905b2846e759e24c676

                            SHA256

                            3b144ce09b133492b9f6e93d0c6d8085a254a1078250bb29f07c2d4a80efe1d8

                            SHA512

                            b25b28d6ff7854d0d543c0bdb776249cd4749bd4abc1dee89a94d0fdfec47b2791afe373c554d326790cc7dd7d29652975c287545244b6f4253953c78923c845

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Graph.emf
                            MD5

                            e8931414359e4783093b266e1a47ad0d

                            SHA1

                            b25816055d8f07c5c8733c6c02a22ac8bed390d0

                            SHA256

                            fe57d6f07cf5df99737889f915645e6148ff058f9b54e33223c3190bc47e5a87

                            SHA512

                            b91018ba2e93d63ef110c05b0f04b12c0063df45ca2c6ff1c5cf5610182310ab5cb9b04d9aa050f410367852b3e4cd324ad1e63c23114ca7dff523287680463e

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Memo.emf
                            MD5

                            3cb8fe3e79440cf3ca80ba463d46b24d

                            SHA1

                            718a8cd3d9592b0a495179d10fdc7270e71d6c76

                            SHA256

                            25cf2e28586722861813193299ed4012cb9d405acd8f28b0639e01ac484a72b0

                            SHA512

                            3c41ec41a12b9369d1d926c0bcfefbb166fed668ef48393ab2e0031a3e0e64888ff100e3d8e3c7abddfa75a4a9c0f4b3cd833fbef29db5b785559f4c2962d955

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Monet.jpg
                            MD5

                            b8a8bc4707924d1db7a69fbd5a54fb98

                            SHA1

                            c4424d5ec1cd876864380dc8aa2255a59188359c

                            SHA256

                            e616cc54c158c6b736416287d5f9bcef47c1988dbab996b9deef20b3be8de241

                            SHA512

                            3f8a81a60564b3dc7eda83ab2e06f288734d97d2dcf101a2ed0321b807742f1ae56c7dbdbd115e5920aa84ae145f25d6f226b3651a9cfe4205e4ff8a3eda8497

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Music.emf
                            MD5

                            7d1d4da501702726e875ddf7645b51e1

                            SHA1

                            ec08db8ff44d81e1e1627a86399a6cdc7f943a32

                            SHA256

                            befd6a61ee0d9a31073fc5b9cbfaae11743412a9ab5429c56b1e50bac4a66708

                            SHA512

                            f3dfb9344c55fd285fa6f54577b14e4251d6c1b85253b55e01b7fe19f8c07ed87a20e10a9c9f5110a58ba9cb1610e8d7716ecb96a70cb332325b31963f661bbf

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.htm
                            MD5

                            c152d06da156d8b449c601af2d638412

                            SHA1

                            eb8717f32e2fe93142b1bd670dc27c6e6c1d0326

                            SHA256

                            f19c48e2778c8e7f0250e02499e432cda2690f1d6735955b14d2cec65a7e4702

                            SHA512

                            ccd9b795658082f32fd338d89d15a4580adff876a434c7920ce234d48af21f35f76dc608edd994f60f6009b327f04cdfe88ce5f12a571416235055fd2e5b4ef3

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.jpg
                            MD5

                            0ab361b8be73ba6f94298584f0678920

                            SHA1

                            de98e4058e049dea7e6db12f49eeb79fe9ca2e0e

                            SHA256

                            bf3b94baa562dec50db90a016605cd4e8adcfde8ee7e1a0a4162197b06e58361

                            SHA512

                            b845160c57bb95fd20cbedd41869c20ad81b3e1cd9c8c0904a5687c34f79efc35ad3a913e5dee4a4a47fe6a17a00d784f87e7fff4d32e455df667c42a9f9322e

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Seyes.emf
                            MD5

                            b937e3f00d3375cca90d26ab73b31a2c

                            SHA1

                            5a941f38afda6ffe078d5a33da19f4104fcd2be3

                            SHA256

                            f34a29598505f7fa1f49d91f401edbd3d9b3afeb15b47c2db9b42867efe33246

                            SHA512

                            3400862aaab4ffbfdb3c749559dbf60ca50de38cbf8b838dad7783bbf27432de8c8dcfdb468f9ad977d8554e0099682670bffda960c5114dd69b8f45b1987a88

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.htm
                            MD5

                            0d067a9c37148edc994a9d0dfae48748

                            SHA1

                            193b848a958701ffe26418951b395533ca7f135f

                            SHA256

                            8ca6724d61d2554d6ccb1fb112f4dc30eed76cc5f40b5023eded1383925d764a

                            SHA512

                            4aee4042d6bb933d7ad5a6ea135abfcef381dc45027c898b6dfbb85f77581882fe4422ca83b3d6bcfe19a43457d24a11b7aa6f02465e0189e9c7714e63fce7a1

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.jpg
                            MD5

                            ab36e44e94145b83fd21f8d46404e88e

                            SHA1

                            5ca38df33349bf9d5b3705d49b7a9fd67acd6056

                            SHA256

                            a9ec234977b88353a782cbe38cf8c8a745a539d77597b68ed7351cd40b7f7ba2

                            SHA512

                            2ddf1bb74180fd7f02c9252cc8413ccf04b6d70f7e9f57dd5fff36fa1156be9bb20e5f7ecc23178a0ec28293792fb06b57f3402965d50a866ef7e8cddd66bbb3

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.chk
                            MD5

                            248380e8e878673c1f3d1c5d503869c4

                            SHA1

                            1f9eaad3d2ccfb41edb959ff0e637b4f448fa9fb

                            SHA256

                            a352d1147394eb81ac1975f85c92d320aaeb348bf69262918edddafdd88b907d

                            SHA512

                            c4be3ef31b2f89091ec0dc5741d821b331bf517b23ec285e810358c604da88da127dc6d2132394372207bd7661c273c47f2b3f392976db35ec401f7c98e837bf

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.log
                            MD5

                            d24549b1db22fd40006cb7324bce6c67

                            SHA1

                            a7dd5f4936a00d476e0dd97d7866aaf5d0e98408

                            SHA256

                            20c34231eaba7ebd1e7010d7d9fca4fa208aa9611f04d681d3ce2580c1aecd88

                            SHA512

                            1231550e0d2d1df5988a184ab298a953252d3b280e7b08e44c069c42c38a5e52ddaa3d82694018459177a6e07bab56308d14ff4e73e647afeb29973ae0adfb34

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb00001.log
                            MD5

                            bff091796ef03436fd7776596cc7c822

                            SHA1

                            1e5a9dd36289cbd8f7732599c13ab4350c28a84b

                            SHA256

                            c905a6827b4c54c02e1d0ca3c9c8ed4ec68d808e64644f4c551234b178fdd820

                            SHA512

                            0e986f441cfd47d7f7d84548add199d68769078cfbbf0db7ce7ccabd76fd57b6328e9829203185e65fb417fe16a52dc73be3c20a3a141129a7f05413c025a055

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edbres00001.jrs
                            MD5

                            4595b3eea727863c18506abad3470f3e

                            SHA1

                            ad64fc68dfb8ac76db2178b9cc4847c107f78094

                            SHA256

                            37f00b1f88ac309e32d0418682f540dee8d534fd065c6e8c0b0459c8ecf4557d

                            SHA512

                            eac7f0667d7ad74408910d857a3d1968c74ce6b45dd6a77a85b09ed40b2bc7e56f4f5b25fa14321dbab63ba55b26112b106e3d2b4450ff4fab497261fe7f7f89

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edbres00002.jrs
                            MD5

                            5c68f98397b76be5cd328b9fdc1fb0db

                            SHA1

                            68af656eecc169eebb0c90818a268eb51a270e5f

                            SHA256

                            a8b183127b7f430326df249e1a8d67f17eaca208393a0d23a615a28ba09698b4

                            SHA512

                            3b7e078ae59b8521c3188f88f3baa2eb15a3fefe113e0cc43dab2f26acad47cb1b7abe68f547d44fe4d8374314274a8a720371e748307f8caa8473ac5ef528f3

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edbres00002.jrs
                            MD5

                            5b63d250ec92c644e776c8a70fe3b5bc

                            SHA1

                            35dbc54381986adeb0ebc96c45c60ce7b6f8c141

                            SHA256

                            5b21f401b71d3017f826f8f6a74af887c8feb543ae58a21b7d5357ce23ab93cc

                            SHA512

                            7830d308f55d722b8f06d63b74e0f10ff4fc23b0cba436ed1f9b1f6a1a9bc5eb768db69552ea170c7635b3130542cbf2a13bb430821eba7c4b3e258e787169a5

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Media\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\Burn\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\AppData\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\Admin\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Documents and Settings\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_bc8e1036-7fb3-448e-8ad9-a824b1a03b8e
                            MD5

                            93a5aadeec082ffc1bca5aa27af70f52

                            SHA1

                            47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                            SHA256

                            a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                            SHA512

                            df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                          • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_bc8e1036-7fb3-448e-8ad9-a824b1a03b8e
                            MD5

                            93a5aadeec082ffc1bca5aa27af70f52

                            SHA1

                            47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                            SHA256

                            a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                            SHA512

                            df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                          • C:\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
                            MD5

                            7aca9a85f47666aeb858d5c5c7d1ea44

                            SHA1

                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                            SHA256

                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                            SHA512

                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                          • C:\Users\Admin\AppData\Local\Temp\qcmUfvS.exe
                            MD5

                            8431a207fab74137df795fb46732544c

                            SHA1

                            abb80c03d3aa69ac38f62a447636b0fc1bf21d45

                            SHA256

                            80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

                            SHA512

                            98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

                          • \Users\Admin\AppData\Local\Temp\qcmUfvS.exe
                            MD5

                            8431a207fab74137df795fb46732544c

                            SHA1

                            abb80c03d3aa69ac38f62a447636b0fc1bf21d45

                            SHA256

                            80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

                            SHA512

                            98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

                          • \Users\Admin\AppData\Local\Temp\qcmUfvS.exe
                            MD5

                            8431a207fab74137df795fb46732544c

                            SHA1

                            abb80c03d3aa69ac38f62a447636b0fc1bf21d45

                            SHA256

                            80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

                            SHA512

                            98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

                          • memory/1116-59-0x000000013FB90000-0x000000013FC26000-memory.dmp
                            Filesize

                            600KB

                          • memory/1116-58-0x000000013FB90000-0x000000013FC26000-memory.dmp
                            Filesize

                            600KB

                          • memory/1528-54-0x000007FEFB9C1000-0x000007FEFB9C3000-memory.dmp
                            Filesize

                            8KB