Analysis

  • max time kernel
    184s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    20-02-2022 05:43

General

  • Target

    7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe

  • Size

    189KB

  • MD5

    090826c3c34fb53a639f1d2919e1b44c

  • SHA1

    ab355fed7323cb1dfaf1e32833acd77ffa23c287

  • SHA256

    7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

  • SHA512

    d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720

Malware Config

Extracted

Path

C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html

Family

ryuk

Ransom Note
<html><body><p style="font-weight:bold;font-size:125%;top:0;left:0;"> [email protected] <br> </p><p style="position:absolute;bottom:0;right:1%;font-weight:bold;font-size:170%">balance of shadow universe</p><div style="font-size: 550%;font-weight:bold;width:50%;height:50%;overflow:auto;margin:auto;position:absolute;top:35%;left:40%;">Ryuk</div></body></html�������������������������������������������������������������������������������������������������������������������������������������������������������

Extracted

Path

C:\Users\RyukReadMe.html

Family

ryuk

Ransom Note
[email protected] balance of shadow universe Ryuk

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\System32\RuntimeBroker.exe
    C:\Windows\System32\RuntimeBroker.exe -Embedding
    1⤵
      PID:3452
    • C:\Windows\System32\RuntimeBroker.exe
      C:\Windows\System32\RuntimeBroker.exe -Embedding
      1⤵
        PID:1316
      • C:\Windows\system32\backgroundTaskHost.exe
        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
        1⤵
          PID:3732
        • C:\Windows\system32\backgroundTaskHost.exe
          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
          1⤵
            PID:3736
          • C:\Windows\System32\RuntimeBroker.exe
            C:\Windows\System32\RuntimeBroker.exe -Embedding
            1⤵
              PID:2032
            • C:\Windows\System32\RuntimeBroker.exe
              C:\Windows\System32\RuntimeBroker.exe -Embedding
              1⤵
                PID:3832
              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                1⤵
                  PID:3548
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:3372
                  • C:\Windows\system32\DllHost.exe
                    C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                    1⤵
                      PID:3284
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                      1⤵
                        PID:2992
                      • C:\Windows\system32\taskhostw.exe
                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                        1⤵
                          PID:2440
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                          1⤵
                            PID:2380
                          • C:\Windows\system32\sihost.exe
                            sihost.exe
                            1⤵
                              PID:2344
                            • C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe
                              "C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe"
                              1⤵
                              • Checks computer location settings
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:1392
                              • C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe
                                "C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe" 8 LAN
                                2⤵
                                • Executes dropped EXE
                                • Checks computer location settings
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1148
                                • C:\Windows\SysWOW64\icacls.exe
                                  icacls "C:\*" /grant Everyone:F /T /C /Q
                                  3⤵
                                  • Modifies file permissions
                                  PID:4756
                                • C:\Windows\SysWOW64\icacls.exe
                                  icacls "D:\*" /grant Everyone:F /T /C /Q
                                  3⤵
                                  • Modifies file permissions
                                  PID:4752
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c "WMIC.exe shadowcopy delet"
                                  3⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:4160
                                  • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                    WMIC.exe shadowcopy delet
                                    4⤵
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3568
                                • C:\Windows\SysWOW64\net.exe
                                  "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                  3⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:3580
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                    4⤵
                                      PID:1236
                                  • C:\Windows\SysWOW64\net.exe
                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                    3⤵
                                    • Suspicious use of WriteProcessMemory
                                    PID:4564
                                    • C:\Windows\SysWOW64\net1.exe
                                      C:\Windows\system32\net1 stop "samss" /y
                                      4⤵
                                        PID:4000
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe" /f /reg:64
                                      3⤵
                                        PID:5212
                                        • C:\Windows\SysWOW64\reg.exe
                                          REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe" /f /reg:64
                                          4⤵
                                          • Adds Run key to start application
                                          PID:5436
                                      • C:\Windows\SysWOW64\net.exe
                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                        3⤵
                                          PID:5224
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 stop "samss" /y
                                            4⤵
                                              PID:5420
                                        • C:\Windows\SysWOW64\net.exe
                                          "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                          2⤵
                                          • Suspicious use of WriteProcessMemory
                                          PID:4800
                                          • C:\Windows\SysWOW64\net1.exe
                                            C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                            3⤵
                                              PID:804
                                          • C:\Windows\SysWOW64\net.exe
                                            "C:\Windows\System32\net.exe" stop "samss" /y
                                            2⤵
                                            • Suspicious use of WriteProcessMemory
                                            PID:4820
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 stop "samss" /y
                                              3⤵
                                                PID:4452
                                            • C:\Windows\SysWOW64\icacls.exe
                                              icacls "C:\*" /grant Everyone:F /T /C /Q
                                              2⤵
                                              • Modifies file permissions
                                              PID:2372
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c "WMIC.exe shadowcopy delet"
                                              2⤵
                                                PID:4532
                                                • C:\Windows\SysWOW64\Wbem\WMIC.exe
                                                  WMIC.exe shadowcopy delet
                                                  3⤵
                                                  • Suspicious use of AdjustPrivilegeToken
                                                  PID:3720
                                              • C:\Windows\SysWOW64\icacls.exe
                                                icacls "D:\*" /grant Everyone:F /T /C /Q
                                                2⤵
                                                • Modifies file permissions
                                                PID:4512
                                              • C:\Windows\SysWOW64\net.exe
                                                "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                                                2⤵
                                                  PID:3448
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                                                    3⤵
                                                      PID:1192
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    "C:\Windows\System32\cmd.exe" /C REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe" /f /reg:64
                                                    2⤵
                                                      PID:4944
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "svchos" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030.exe" /f /reg:64
                                                        3⤵
                                                        • Adds Run key to start application
                                                        PID:548
                                                    • C:\Windows\SysWOW64\net.exe
                                                      "C:\Windows\System32\net.exe" stop "samss" /y
                                                      2⤵
                                                        PID:768
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 stop "samss" /y
                                                          3⤵
                                                            PID:4972
                                                        • C:\Windows\SysWOW64\net.exe
                                                          "C:\Windows\System32\net.exe" stop "samss" /y
                                                          2⤵
                                                            PID:5204
                                                            • C:\Windows\SysWOW64\net1.exe
                                                              C:\Windows\system32\net1 stop "samss" /y
                                                              3⤵
                                                                PID:5428
                                                            • C:\Windows\SysWOW64\net.exe
                                                              "C:\Windows\System32\net.exe" stop "samss" /y
                                                              2⤵
                                                                PID:5240
                                                                • C:\Windows\SysWOW64\net1.exe
                                                                  C:\Windows\system32\net1 stop "samss" /y
                                                                  3⤵
                                                                    PID:5408
                                                                • C:\Windows\SysWOW64\net.exe
                                                                  "C:\Windows\System32\net.exe" stop "samss" /y
                                                                  2⤵
                                                                    PID:11108
                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                      C:\Windows\system32\net1 stop "samss" /y
                                                                      3⤵
                                                                        PID:5156
                                                                    • C:\Windows\SysWOW64\net.exe
                                                                      "C:\Windows\System32\net.exe" stop "samss" /y
                                                                      2⤵
                                                                        PID:3768
                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                          C:\Windows\system32\net1 stop "samss" /y
                                                                          3⤵
                                                                            PID:11232
                                                                      • C:\Windows\system32\vssvc.exe
                                                                        C:\Windows\system32\vssvc.exe
                                                                        1⤵
                                                                          PID:11184

                                                                        Network

                                                                        MITRE ATT&CK Matrix ATT&CK v6

                                                                        Persistence

                                                                        Registry Run Keys / Startup Folder

                                                                        1
                                                                        T1060

                                                                        Defense Evasion

                                                                        File Permissions Modification

                                                                        1
                                                                        T1222

                                                                        Modify Registry

                                                                        1
                                                                        T1112

                                                                        Discovery

                                                                        Query Registry

                                                                        1
                                                                        T1012

                                                                        System Information Discovery

                                                                        2
                                                                        T1082

                                                                        Replay Monitor

                                                                        Loading Replay Monitor...

                                                                        Downloads

                                                                        • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_e269d2c1-0edf-4391-ac7b-818b8e88b04f
                                                                          MD5

                                                                          93a5aadeec082ffc1bca5aa27af70f52

                                                                          SHA1

                                                                          47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                                                          SHA256

                                                                          a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                                                          SHA512

                                                                          df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                                                        • C:\Users\Admin\.oracle_jre_usage\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\3D Objects\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Adobe\Acrobat\DC\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Adobe\Color\Profiles\wscRGB.icc
                                                                          MD5

                                                                          c9e68ed326520b4ad5ff9f00576e1b09

                                                                          SHA1

                                                                          4189465ad4d3563eebe685d01e87ca55e7e085dd

                                                                          SHA256

                                                                          d2d79fb3e3095eefd2a8c29f499157f80df66e2a9b61bf37285d4c6841c49eab

                                                                          SHA512

                                                                          3a97934055a60fc58259d26a272d33a43c374aacf5bd762521020bd1f97b4b0159dde594e15cbc4b3a16be8b4b0dddc5ef529630bc38a4e37c1d6a281d3d5c57

                                                                        • C:\Users\Admin\AppData\Local\Adobe\Color\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Adobe\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\History.IE5\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\Low\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Microsoft\Windows\History\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe
                                                                          MD5

                                                                          090826c3c34fb53a639f1d2919e1b44c

                                                                          SHA1

                                                                          ab355fed7323cb1dfaf1e32833acd77ffa23c287

                                                                          SHA256

                                                                          7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

                                                                          SHA512

                                                                          d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720

                                                                        • C:\Users\Admin\AppData\Local\Temp\PqdfzJO.exe
                                                                          MD5

                                                                          090826c3c34fb53a639f1d2919e1b44c

                                                                          SHA1

                                                                          ab355fed7323cb1dfaf1e32833acd77ffa23c287

                                                                          SHA256

                                                                          7465a3de8afaacba99d8bf27d06b6e8702c2baae28b95b3a68749e45bd7e3030

                                                                          SHA512

                                                                          d0ac51019f6d2652ae285b99fb68cbe5e3f2acf9cfa30b9d26d95e9692a5562fb8e5f5656afb55c71d191617be4336dd9b4dd7dad8b5f9107f7c9fd4789a7720

                                                                        • C:\Users\Admin\AppData\Local\Temp\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09

                                                                        • C:\Users\RyukReadMe.html
                                                                          MD5

                                                                          8d23eb184e108fbd3fdd93df2cb2be6e

                                                                          SHA1

                                                                          6109f3336c87bac6488a193625ffd9019b209346

                                                                          SHA256

                                                                          055fbf05544ba3d8707ba53a2b51d0c5d848b7c0187db0f1a2bcd66a2a307957

                                                                          SHA512

                                                                          7c24e95603991d4145082d3749bf378ee0d6933d87dacc06fa50f6a7872d6f88fcde7dea5191a080a79af36ecfb3fab38e6cfeef6108dda1a9881d059e2aaf09