Analysis

  • max time kernel
    168s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-02-2022 05:14

General

  • Target

    80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe

  • Size

    203KB

  • MD5

    8431a207fab74137df795fb46732544c

  • SHA1

    abb80c03d3aa69ac38f62a447636b0fc1bf21d45

  • SHA256

    80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

  • SHA512

    98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> [email protected] </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] [email protected] balance of shadow universe Ryuk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies registry class 10 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 62 IoCs

Processes

  • C:\Windows\system32\taskhostw.exe
    taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
    1⤵
      PID:2264
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:2952
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
        • Modifies registry class
        PID:1712
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3376
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
        1⤵
          PID:3156
        • C:\Windows\system32\BackgroundTransferHost.exe
          "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1376
        • C:\Windows\System32\RuntimeBroker.exe
          C:\Windows\System32\RuntimeBroker.exe -Embedding
          1⤵
            PID:3344
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:2640
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:3032
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:2888
              • C:\Windows\system32\DllHost.exe
                C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                1⤵
                • Suspicious use of WriteProcessMemory
                PID:2700
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 2700 -s 1008
                  2⤵
                  • Program crash
                  PID:5552
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p
                1⤵
                  PID:2520
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k UnistackSvcGroup
                  1⤵
                    PID:2224
                  • C:\Windows\system32\sihost.exe
                    sihost.exe
                    1⤵
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:2200
                    • C:\Windows\System32\cmd.exe
                      "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Windows\system32\sihost.exe" /f
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:3196
                      • C:\Windows\system32\reg.exe
                        REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Windows\system32\sihost.exe" /f
                        3⤵
                        • Adds Run key to start application
                        PID:2884
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:4948
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                        3⤵
                          PID:5396
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "samss" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:4984
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "samss" /y
                          3⤵
                            PID:5404
                      • C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe
                        "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe"
                        1⤵
                        • Checks computer location settings
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3148
                        • C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe
                          "C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe" 8 LAN
                          2⤵
                          • Executes dropped EXE
                          • Checks computer location settings
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3620
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                            3⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4744
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                              4⤵
                                PID:5388
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "samss" /y
                              3⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4976
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                4⤵
                                  PID:5456
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe" /f
                                3⤵
                                • Suspicious use of WriteProcessMemory
                                PID:5904
                                • C:\Windows\system32\reg.exe
                                  REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe" /f
                                  4⤵
                                  • Adds Run key to start application
                                  PID:5956
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" /f
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:3868
                              • C:\Windows\system32\reg.exe
                                REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05.exe" /f
                                3⤵
                                • Adds Run key to start application
                                PID:4324
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4728
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                3⤵
                                  PID:5444
                              • C:\Windows\System32\net.exe
                                "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                2⤵
                                • Suspicious use of WriteProcessMemory
                                PID:4940
                                • C:\Windows\system32\net1.exe
                                  C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                  3⤵
                                    PID:5420
                                • C:\Windows\System32\net.exe
                                  "C:\Windows\System32\net.exe" stop "samss" /y
                                  2⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4956
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop "samss" /y
                                    3⤵
                                      PID:5412
                                  • C:\Windows\System32\net.exe
                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                    2⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:5192
                                    • C:\Windows\system32\net1.exe
                                      C:\Windows\system32\net1 stop "samss" /y
                                      3⤵
                                        PID:5428
                                  • C:\Windows\system32\WerFault.exe
                                    C:\Windows\system32\WerFault.exe -pss -s 440 -p 3376 -ip 3376
                                    1⤵
                                      PID:5512
                                    • C:\Windows\system32\WerFault.exe
                                      C:\Windows\system32\WerFault.exe -pss -s 488 -p 1376 -ip 1376
                                      1⤵
                                        PID:5504
                                      • C:\Windows\system32\WerFault.exe
                                        C:\Windows\system32\WerFault.exe -pss -s 424 -p 2700 -ip 2700
                                        1⤵
                                          PID:5536
                                        • C:\Windows\system32\WerFault.exe
                                          C:\Windows\system32\WerFault.exe -pss -s 572 -p 2888 -ip 2888
                                          1⤵
                                            PID:5632

                                          Network

                                          MITRE ATT&CK Matrix ATT&CK v6

                                          Persistence

                                          Registry Run Keys / Startup Folder

                                          1
                                          T1060

                                          Defense Evasion

                                          Modify Registry

                                          1
                                          T1112

                                          Discovery

                                          Query Registry

                                          1
                                          T1012

                                          System Information Discovery

                                          2
                                          T1082

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Documents and Settings\Admin\.oracle_jre_usage\90737d32e3aba4b.timestamp.RYK
                                            MD5

                                            19eca2be09836b4efdb725b0ff707efd

                                            SHA1

                                            237a89f64124df2b413a5ff0d6edbe7500c77ab3

                                            SHA256

                                            ac0cd0958eb07be9e807d7b09a5c6af52b9d1a5e37890358b4e836b95163e5ca

                                            SHA512

                                            178676bbcf494008345970e4203ae7965519026071ebd8b8801435ef61f48793196dc2eb0e62f4055ce7ee8db56f3afc071db2fbf7c50e164f6a56f9f3aabbcc

                                          • C:\Documents and Settings\Admin\.oracle_jre_usage\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\3D Objects\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\SharedDataEvents.RYK
                                            MD5

                                            4bd79b6ed47dfb8769bd62f1ad848935

                                            SHA1

                                            0fc1399b6f53722afe0fdb86a1a17229b79c3de3

                                            SHA256

                                            733028e9cd26f613fd5e48cabc4482f195fddd4d664c428170b5603b783115bb

                                            SHA512

                                            252c8432d4179d56f957b1f5d0fb857af500d7739c89b93d57735ca797d79e402979ca3aee4b11a2ba4a317af49c7f36e8668c094ffc90416eb3bb41e4eb81bf

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\DC\UserCache.bin.RYK
                                            MD5

                                            10cf4c89750fe37efa82f5557caa73da

                                            SHA1

                                            6ac7e9665e74fbea62cbff42a1570f9e8fd074b4

                                            SHA256

                                            e4381ec45beedab4458576fb39d724c535b6d204b6f34a0ba34428e85b5eea7d

                                            SHA512

                                            a8434895041bf5ea14a660b793fe5d9105819188f1a7f452c410a392d7d40d8c907d834513d30b819be0bf4a60be4e514cf099685340fd2db010fc0026452a58

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\ACECache11.lst.RYK
                                            MD5

                                            c20eac683a455fbb640bcf6da1927747

                                            SHA1

                                            d6a58cbe9787ad6e3139ca486bd1c8425e369c55

                                            SHA256

                                            ab8d222e562e85118c1873ee4e3cac4aaecdc1435d24db2b700ce313a1061ee1

                                            SHA512

                                            c6b3c77042a146ee27516193db9982634e6a4978f7a986dd6d82a41050a433eaaac02ac402f73752489429b2c4f17bc93c83835cb79b5fda9e35a0701dfd48a5

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wsRGB.icc.RYK
                                            MD5

                                            ca8158f7979285cf88d3fde31829e7c2

                                            SHA1

                                            d4e588fd649cb62e3dd81e1b4e0c26e6aef2e794

                                            SHA256

                                            72f35a1df463887442208496dd3ce6df5691f919a9a0b4a8759628f67fa0bd19

                                            SHA512

                                            4ffb1528a6c228c130bca470c1278252e65ff261eb849987cd0fd3e0f8199cb4bff1be8876414eae45858fcbcedc61271ed34fa759f7641af2ee7cd6ff2b6110

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.icc.RYK
                                            MD5

                                            a42fc9a77e18f516d3826933139c78e7

                                            SHA1

                                            a2d75c8424f4c1fff3cfcf2d7c751451d98414e0

                                            SHA256

                                            3bd4a467b59f07be10bc4509d385c8771855fe6b5bb981a5d2ea7c8e59ebd41e

                                            SHA512

                                            f40b618db903d3d4a8bcc98e5c26a6921cff44eca51a041ef344ca24056f6d4430edb8a7b870d7d9dbb9b070973ccc432d607eaa6d4ef833bde384f4ba3e7a77

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jcp
                                            MD5

                                            5aeeeab8d93245fd68cb104be7476cdc

                                            SHA1

                                            2dec5a828afdaa631f33bf2a1f82022ce84c14c7

                                            SHA256

                                            e2d84c6cafefca44c79c0716e1e3a3d7992653be0c1813a3f4fdd995fa721a28

                                            SHA512

                                            d439137ca4bbffaec08315d9d6e3894f487d33ec684c29f59b4c30f2bc0accd33887b71fd664f160db78942cadca7baaba2ede7caf507db93a7486bb304c8f77

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USS.jtx
                                            MD5

                                            2a23f69282c8984018d89e96a284d98d

                                            SHA1

                                            30864c46581508e22701c6f2642296d70d5007b7

                                            SHA256

                                            d7c2bcdd43df205a2aa10da617edbd5db0373680a66f1e7bc8d165e0c3f3421b

                                            SHA512

                                            e315ff8d049bdb63bb8da3615902c9b3729eeda0284be0f9b022275759951ec6506d46d2391501ffec4b9e67d312130a44e14cf81b9b6f5c1106b7eecd3eabd7

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.jfm
                                            MD5

                                            8ddf63fa08d2f60e4fd1a31c5cfc7405

                                            SHA1

                                            44f17ff1ad5c2316c25fe754273c84b628ef873d

                                            SHA256

                                            d0547a7544a13d49cf81db13623eaa1f11c05c89c96bdf8644d2f4697039fc68

                                            SHA512

                                            06c8b49cd110843faba7b57cf74611735804f38c945696220a07e2a7b748b42118d07292ad75458551f5ee08fd7b5397e58cd0e24175ff0ac58df18a15b20650

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.vol
                                            MD5

                                            ca53c7f1b4844801fd589d05ddb8cca0

                                            SHA1

                                            65bc2e5f8ac7ce9675b4c53095cbcd3618000ee1

                                            SHA256

                                            005e079cd9bbc173d735509cc9e7fb85bdf7c367dee0e50046aeffbea3bff7dc

                                            SHA512

                                            dcf0aece6a72df3805a80da47c2e9f07de13ca605ed750fd49151cc6a44aa3488c1a34e7b14e72d04e75b0f754da0e499c382ad3b46af61f4fb06df3c93788dc

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\store.vol
                                            MD5

                                            d361070f76e8a7398c0a8e600eae7857

                                            SHA1

                                            6cd28fdf70d4b91f594569fbdf8c2961569b1303

                                            SHA256

                                            816fe71a374f01825d5a291cc19e04df54d569db3d5af9daa511112f6deada7d

                                            SHA512

                                            ab64929377606afbd329a4ac35d4d1af7871efd44c89dc11eb7736a0fbc522a57cb9a85dd0118d9e6839ee2b32cbc0c67480cb7f87e780ce421d60b1b5d04dfb

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.db.RYK
                                            MD5

                                            d4bb46b4280f29b4c8932d9a561227c1

                                            SHA1

                                            3de6f779fdf008fac0b2a438e2cbf46bf8d4f60f

                                            SHA256

                                            186d5e3b40aec29762bdabea54d0cac2a3bd864a0032708638233dba4a12961e

                                            SHA512

                                            af3a14f1029138d8d089b23b6851869128d9e570cd164e0e31372cd3489c418c2bbab9d824cc21ad294312348475e23a3f8e9012bec6e9715937bfebbdd2a2a8

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Packages\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Publishers\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\AdobeSFX.log
                                            MD5

                                            f453819b7b7c64df5eeff59905314e9c

                                            SHA1

                                            d5459dafb1650c52c92f5dc371909b55d14819b7

                                            SHA256

                                            de737f1dc5ef9364540192f797d43c879bcf8d3e602767fc9ca78bd2f673ab3d

                                            SHA512

                                            95b6cb712bea670193a2e30e59021b32caa446cf884d9e8b654c85d6b905d438484abd3867eb9fb75af3401e4a0b42f74f71c89a07eac719754f8d8657e03338

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\JavaDeployReg.log
                                            MD5

                                            01a4f1fd1f2a820f5720169371e81c2b

                                            SHA1

                                            61443373b91b89a1ba1aa89e1a58c731b35c4398

                                            SHA256

                                            6f7b4ecc5a11c60fbec9dee46757b52140407125fe425407e2595d33da67b3b2

                                            SHA512

                                            a0bc9b6cfa5a84a8e2c22d77f1ed19f77e0b33ad6bcc897645cf0ad4db4c7f0b6626e2ccb6f1e6f513c82372fe407caf75eb063cf1467c683ba6a92c739f5d18

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Low\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\aria-debug-2324.log
                                            MD5

                                            945bbad3712901f55c3f726ad38d9a68

                                            SHA1

                                            0f3494a530dabb3a288795354feceaef3d4c632d

                                            SHA256

                                            d41cbcb891743b742f5e134347e8fd96b8b4e3c8f1866b6afa8dbc0de54f465e

                                            SHA512

                                            0448cbfc0e4eb058462e65d6b0be50c5f43bf65976d939c6fdbe61c5dc6a74090b9192e61820e6ae2abaef827f9ada30d1d22ceda122219c054b0987670964eb

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.log
                                            MD5

                                            784f11c4ba607806f24449cfc1a11b08

                                            SHA1

                                            410365d1e8d584ab19c10f8a1ab0ac834fe8c2c2

                                            SHA256

                                            eb454b463bd59458183a8b015b62e748bdb220be8ab6e8048eef5009fd8253a4

                                            SHA512

                                            4d882cf40620589e303e7662109ca82369efc4e9dc0029c8b53d1334deb8ef7305eeeae519ba275b460598376dc453eb635acee83c269194360c2980cd2250c2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46A8.txt
                                            MD5

                                            bcff6c7315ed06eb1a9853a694b7ee57

                                            SHA1

                                            1eb196912a2a020313ed6921f1e67a0559e43e48

                                            SHA256

                                            17f1c25a575a42063536e220350c1770c6c1ebb4756c1952129b1a649a1a420a

                                            SHA512

                                            e6258cb0c85ffe4e637927bda0cebcfb25390502d310c8a8367c7372ef2d3f9a5d6755197eb7176c41373ae2589370dc8086113feda39085b11fec30bce5e209

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI46E0.txt
                                            MD5

                                            b2aaf8e3811b66e1932daac35eaf6dc4

                                            SHA1

                                            cc7f9de401dfd3335c36cb65460e83a634333431

                                            SHA256

                                            f3685d893c3454ab2fb77c6d95440f638e9789c31357dbc040aedc215696d399

                                            SHA512

                                            d5bbab8b96698ee2b11c5fdc3794af0b13033acd6752b22a0e8ff3482245fbef4a942b8d2d7c7207e9b97034dc7b8efdc4c5be0efc10e14f98db212efea4bc0b

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\jusched.log
                                            MD5

                                            ab583a8f5282ac4d535632641a5c8da6

                                            SHA1

                                            22507edd43b193886897c9abba6d3fa519eeea8d

                                            SHA256

                                            184cc9925aa80a9fee59b1613915354ffd8fa38f1055a96e6871bae18b83e293

                                            SHA512

                                            f4f12f9d55cb029c8d7564662d1ad82e62d111c276c640d93698f7782aa400a0ae0c121f1c70ad08ef02f50542f8af1695aa5f3cd332ab1a0a02d19f90608094

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\msedge_installer.log
                                            MD5

                                            51fe216fc224487e146dc38c7a81cd4a

                                            SHA1

                                            0a04c4072f8d4d3d2744ad5ff3b343af1483c6c2

                                            SHA256

                                            1e7e681a360784490a0e1df734c0d8dcab2feb36c2052c9f74d06f4cf2dd5bde

                                            SHA512

                                            e0f13ee7dc3145a378cb85589e6baa1d233e8a1bd86da257c5811e64c2c517a15e7ebde96c77945ea328d0a5c874d54add93287e9b864855aee637d9aeb0f3c1

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\offline.session64
                                            MD5

                                            685d0f30768a2ca5ccb60ae6f690d78e

                                            SHA1

                                            07e7487106250671eb50f6d86139a5c2001a17d6

                                            SHA256

                                            59521cb00d5af55f47ec859f72ed5d3b541991a500ef889cdbd0459f705ccf47

                                            SHA512

                                            37491096a00d1d8ac1e05c67ff5bdb8fb11c3ee761c9e1de22f875ab32c9497fdb0812462204446d5f8224f80611419d7713234f56736b61e5e574da141f2b2d

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\tmp3097.tmp
                                            MD5

                                            370773f0115ab92444862ccd15ac0d37

                                            SHA1

                                            c3b569019bbd9167d7465c419c9281015db2bd65

                                            SHA256

                                            31a8c150003f5ed5949cb8ebd1b7206877313fc3b59aa8466a478c7644fda477

                                            SHA512

                                            a79c8ebbd4997c5d6a041f7c14864a40c36578f32dcbc4d46689a6ab274ad94df84bac42dd51f4e9de90a245ef009fae961ec0087cfcfc8cd5534cfd91334698

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\tmp3384.tmp
                                            MD5

                                            5924f4ba540df8d9de78295b3aabc635

                                            SHA1

                                            e2c7d8ad188d9bfbc3fdf361084b2d7cd2c543e5

                                            SHA256

                                            9d6881ce139ff5f8661ba340d8db50daa49a7a8793397d0f6960b440f854370d

                                            SHA512

                                            5ce826c6784f86232b5662b1e3d7b4ebac9eeede1eabd7a964f92d67925cdf9909d735b0d207c0ca02325b98be893c26f825aebe50eda0b22cb0c1a39235aebd

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct2BC9.tmp
                                            MD5

                                            941c6153d7fd4f5099e334e621b16c01

                                            SHA1

                                            94eba97eef327b6fd1c10884e57581270036ec6e

                                            SHA256

                                            9a55760c732460376ba6add08a3326affdc32688aceadc3f2e796a696df9e86b

                                            SHA512

                                            36ce9be9d5b18d74de3f96beda4be9b6039abead4e9476de4f719e970cedd0dea673b27b0beb1ad3234e3695304711d5daab5c9f797a7a330e091f101a88c2b3

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct2D5A.tmp
                                            MD5

                                            aca60af2cc09738d013e6632dc22be5d

                                            SHA1

                                            273bcc9f84c95f26a7a3ca7787140fb32816610c

                                            SHA256

                                            bf8ad68b610f1718a7fcb1700bc3f100b1bc9aa4100b550eb7c68d3e20446c2d

                                            SHA512

                                            37d808a058d0fbc2a54097437bf9993c83c6e6ae288d59d355160b30fda2e06429f8cbfc1da0602991a59f2aa79d470c977929c7362175f149fb68d60578f86a

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wct530C.tmp
                                            MD5

                                            e119bd2dae97c0e266d882b41413ddfe

                                            SHA1

                                            b3806772fb4ce96025ebbff16dc91e20db526866

                                            SHA256

                                            6b6911f05874994b52ad852eee9721b3e6496f3080d18c753dbffe7b057ceca1

                                            SHA512

                                            e16f525022f274580951f54f54eb8ce89c79d5458d2493fbae208471cc53db2d62549f826e792e3585e92b2ce2f0551f544c832370bbd06a2f0264eace2f390c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wctEFCE.tmp
                                            MD5

                                            07cee0e68d6373090fc64bc2667452ae

                                            SHA1

                                            78e13d070192446ad0376e313a079723560c3fd6

                                            SHA256

                                            1b44769f7f20751ecf6dd4177195637c56e33a7ceb037d383d38465021058f63

                                            SHA512

                                            6bf624361f713abdbc1580ba3d66453f3bea24dbbe0ffd964a962600507b47e5e15e7b370906e6f67197f95b63ee260ff4335c7f4ff6af3dbd0f35d706e15907

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\wmsetup.log
                                            MD5

                                            e2a3a50e124035bdd65079c363440097

                                            SHA1

                                            c24f2c08ae04b89926e2f7da67721e7da0e28749

                                            SHA256

                                            a1ddb99ebe9dac9de52d05357e5404a53d737a48ea3dc13370ecaf226ef40430

                                            SHA512

                                            f7975571212a4ecdc46fdc02360894795c511ccf12d25d24f9ded3d4cc55d78df0a1c542072d523b2ac6abc63d72c2517d882f28f52f19d7c9aad8961be64fbf

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USSres00002.jrs
                                            MD5

                                            e7dc7eda57723c7b4ee20a1d24281d6b

                                            SHA1

                                            f061975f9cb1299aba7b133cb1db1be713240800

                                            SHA256

                                            950c36365c938e40989d2136b910094b4d0aeb77e85212731fb5eb345c797572

                                            SHA512

                                            7bdc0cf34ed570cfb00fa5d7b3e9c9b6a03661d02f621dd9fca3969fb496d4d981582c36b97241458ad6776b49630b9b6a94eff3d16b0dfb6f875e91edd41b1f

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\UnistoreDB\USSres00002.jrs
                                            MD5

                                            e7dc7eda57723c7b4ee20a1d24281d6b

                                            SHA1

                                            f061975f9cb1299aba7b133cb1db1be713240800

                                            SHA256

                                            950c36365c938e40989d2136b910094b4d0aeb77e85212731fb5eb345c797572

                                            SHA512

                                            7bdc0cf34ed570cfb00fa5d7b3e9c9b6a03661d02f621dd9fca3969fb496d4d981582c36b97241458ad6776b49630b9b6a94eff3d16b0dfb6f875e91edd41b1f

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Comms\Unistore\data\temp\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\ConnectedDevicesPlatform\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\CLR_v4.0_32\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\AppData\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\Admin\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Documents and Settings\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_0d751396-3164-4736-b931-4f59d47ff1f2
                                            MD5

                                            93a5aadeec082ffc1bca5aa27af70f52

                                            SHA1

                                            47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                            SHA256

                                            a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                            SHA512

                                            df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                          • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_0d751396-3164-4736-b931-4f59d47ff1f2
                                            MD5

                                            93a5aadeec082ffc1bca5aa27af70f52

                                            SHA1

                                            47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                            SHA256

                                            a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                            SHA512

                                            df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                          • C:\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
                                            MD5

                                            7aca9a85f47666aeb858d5c5c7d1ea44

                                            SHA1

                                            4e1921a90b9f972aaa4859ca3128da9de876bc8a

                                            SHA256

                                            b0be99bc59bb81464487aa6bc63d147eea716dc2758aa843ea8891015403356c

                                            SHA512

                                            6ed02d7993424f68ef03e32c58127e227744721341892e44e0b0c80c33fb0f169accc74c6498120d211c8ed3c1bcd9beffbfb85e2a44fd9f446df0524dc82d2c

                                          • C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe
                                            MD5

                                            8431a207fab74137df795fb46732544c

                                            SHA1

                                            abb80c03d3aa69ac38f62a447636b0fc1bf21d45

                                            SHA256

                                            80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

                                            SHA512

                                            98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

                                          • C:\Users\Admin\AppData\Local\Temp\SjvaCxf.exe
                                            MD5

                                            8431a207fab74137df795fb46732544c

                                            SHA1

                                            abb80c03d3aa69ac38f62a447636b0fc1bf21d45

                                            SHA256

                                            80bb8c391d008606bf99888d7341e530375b92b0ff5ad326b0b0fddacb5ebb05

                                            SHA512

                                            98971c7ff9154482a53c05e725cea25f873ed88d6ac721e943bad35183ad070788f28da22ec2f8ee5fb38b862664a37c15b97bffcb5567d54c6476b1abef39db

                                          • memory/2200-132-0x00007FF7741A0000-0x00007FF774236000-memory.dmp
                                            Filesize

                                            600KB

                                          • memory/2224-133-0x00007FF7741A0000-0x00007FF774236000-memory.dmp
                                            Filesize

                                            600KB

                                          • memory/2888-134-0x00007FF7741A0000-0x00007FF774236000-memory.dmp
                                            Filesize

                                            600KB