Analysis

  • max time kernel
    169s
  • max time network
    27s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    20-02-2022 06:31

General

  • Target

    646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe

  • Size

    212KB

  • MD5

    3920d0157efcfbc01837be686e636a8d

  • SHA1

    494414c45d655abf60b393c7c299f7647c0dbe1d

  • SHA256

    646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629

  • SHA512

    30ad22af397df2f0d4757e9fe45a17cdee92a19ed582b93fc24250a6bb3713b8fa01d487deae5fb99b46519ffa3c007b4805a3b785d64ebd8c27d6459879eb48

Score
10/10

Malware Config

Extracted

Path

C:\RyukReadMe.txt

Family

ryuk

Ransom Note
Your network has been penetrated. All files on each network host have been encrypted with a strong algorithm. Backups were encrypted too. Shadow copies also removed, so F8 or any other methods may damage encrypted data but not recover. Only we have exclusive decryption software, suitable for your situation. More than a year ago, world experts recognized the impossibility of such encryption deciphering by any means except the original decoder. No decryption software is available in the public. Antivirus companies, researchers, IT specialists, and any other persons cannot help you to decipher the data. Decryption takes from ten minutes up to several hours. It is performed automatically and doesn't require from you any actions except decoder launching. DO NOT RESET OR SHUTDOWN SYSTEM � files may be damaged. DO NOT DELETE readme files. To confirm our honest intentions. Send 2 different random files and you will get them back decrypted. It can be from different computers on your network to be sure that one key decrypts everything. We will unlock 2 files for free. To get info (decrypt your files) contact us a [email protected] or [email protected] You will receive btc address for payment in the reply letter Ryuk No system is safe

Signatures

  • Ryuk

    Ransomware distributed via existing botnets, often Trickbot or Emotet.

  • Drops desktop.ini file(s) 49 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\Dwm.exe
    "C:\Windows\system32\Dwm.exe"
    1⤵
      PID:1360
    • C:\Windows\system32\taskhost.exe
      "taskhost.exe"
      1⤵
      • Drops desktop.ini file(s)
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1256
      • C:\Windows\System32\net.exe
        "C:\Windows\System32\net.exe" stop "spooler" /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop "spooler" /y
          3⤵
            PID:1964
        • C:\Windows\System32\net.exe
          "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1104
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop "audioendpointbuilder" /y
            3⤵
              PID:2040
          • C:\Windows\System32\net.exe
            "C:\Windows\System32\net.exe" stop "samss" /y
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1152
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop "samss" /y
              3⤵
                PID:964
            • C:\Windows\System32\net.exe
              "C:\Windows\System32\net.exe" stop "samss" /y
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4924
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 stop "samss" /y
                3⤵
                  PID:4952
              • C:\Windows\System32\net.exe
                "C:\Windows\System32\net.exe" stop "samss" /y
                2⤵
                  PID:16956
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 stop "samss" /y
                    3⤵
                      PID:16980
                • C:\Users\Admin\AppData\Local\Temp\646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe
                  "C:\Users\Admin\AppData\Local\Temp\646632b7ef80f2a29327db44817aa61792c7c2fe15e09daa6643d59312b9d629.exe"
                  1⤵
                  • Drops desktop.ini file(s)
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:1540
                  • C:\Windows\System32\net.exe
                    "C:\Windows\System32\net.exe" stop "spooler" /y
                    2⤵
                    • Suspicious use of WriteProcessMemory
                    PID:696
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 stop "spooler" /y
                      3⤵
                        PID:1852
                    • C:\Windows\System32\net.exe
                      "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                      2⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1004
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                        3⤵
                          PID:1524
                      • C:\Windows\System32\net.exe
                        "C:\Windows\System32\net.exe" stop "samss" /y
                        2⤵
                        • Suspicious use of WriteProcessMemory
                        PID:836
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 stop "samss" /y
                          3⤵
                            PID:896
                        • C:\Windows\System32\net.exe
                          "C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y
                          2⤵
                          • Suspicious use of WriteProcessMemory
                          PID:1780
                          • C:\Windows\system32\net1.exe
                            C:\Windows\system32\net1 stop "audioendpointbuilder" /y
                            3⤵
                              PID:1700
                          • C:\Windows\System32\net.exe
                            "C:\Windows\System32\net.exe" stop "samss" /y
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1760
                            • C:\Windows\system32\net1.exe
                              C:\Windows\system32\net1 stop "samss" /y
                              3⤵
                                PID:1940
                            • C:\Windows\System32\net.exe
                              "C:\Windows\System32\net.exe" stop "samss" /y
                              2⤵
                              • Suspicious use of WriteProcessMemory
                              PID:4888
                              • C:\Windows\system32\net1.exe
                                C:\Windows\system32\net1 stop "samss" /y
                                3⤵
                                  PID:4912
                              • C:\Windows\System32\net.exe
                                "C:\Windows\System32\net.exe" stop "samss" /y
                                2⤵
                                  PID:4968
                                  • C:\Windows\system32\net1.exe
                                    C:\Windows\system32\net1 stop "samss" /y
                                    3⤵
                                      PID:4992
                                  • C:\Windows\System32\net.exe
                                    "C:\Windows\System32\net.exe" stop "samss" /y
                                    2⤵
                                      PID:16908
                                      • C:\Windows\system32\net1.exe
                                        C:\Windows\system32\net1 stop "samss" /y
                                        3⤵
                                          PID:16932
                                      • C:\Windows\System32\net.exe
                                        "C:\Windows\System32\net.exe" stop "samss" /y
                                        2⤵
                                          PID:16996
                                          • C:\Windows\system32\net1.exe
                                            C:\Windows\system32\net1 stop "samss" /y
                                            3⤵
                                              PID:17020
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {995C996E-D918-4a8c-A302-45719A6F4EA7} -Embedding
                                          1⤵
                                            PID:1836

                                          Network

                                          MITRE ATT&CK Enterprise v6

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\Cache\AcroFnt09.lst
                                            MD5

                                            fe071a5e549399e5b4309bdcf8a99cea

                                            SHA1

                                            ed0221a057cf283d90397c0681c129252c4d8b30

                                            SHA256

                                            ca40c24159424e44bdaeca9328821dfa39efa6ec687e3a66363902dd48512b15

                                            SHA512

                                            cdc63fb8270d2af966baa523ad97ec2054462c4c71509f73e5ddd48f6d4296161d47df9565533809899919ea878a0d29e6e1e8d74ea64f882d65bb2e69d7fd44

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\9.0\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Acrobat\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\Color\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Adobe\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Adobe\Acrobat\9.0\Cache\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Adobe\Color\Profiles\wscRGB.icc
                                            MD5

                                            f05a1ae799d10878f61257b9e2281773

                                            SHA1

                                            1c87927fd863be96ed3de4ae5d1c7c0688069ad0

                                            SHA256

                                            13588d623d1ec9e5b28a96d63dc2f04af0795e3c799b79fce53129ada6ae9c54

                                            SHA512

                                            12579be117ebde3a3a087cd85c238b344d930982e4f795512a29c37cb8ca56fa811626e768481d68528c43023f8d8e1dca6280eca7467ab37ff6f66fbe4c19b2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\ACECache10.lst.RYK
                                            MD5

                                            86d8fc59e4fb20a26352f4c93c8c562a

                                            SHA1

                                            5d417d0f545468bb4e19f7fe58eb10e03742ac0a

                                            SHA256

                                            dd773cce2ab1cda856e7bc14503655a256bbff5d898db7c95f22cd008d9f45b4

                                            SHA512

                                            9d6925a6a0f289a02975350309bc3e6eeae2465419715ceddad3e210f86e5eb7f6ca43e32e01cd917921715b7cb0a358654d25b726909cc4279996ec1a866f5f

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Adobe\Color\Profiles\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Google\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\desktop.ini
                                            MD5

                                            854fee44132391ff385ef2d888b44c2f

                                            SHA1

                                            c6a0267dbb3d650dc8567f745c93a8889938d3ed

                                            SHA256

                                            02ac436738dea4e5196c345af422e63b0af2283b83b3bb542407d85e60edcc56

                                            SHA512

                                            b07b25f724d93be6cd39ee495adf22aca648144b9a25749b16ff7adb34da73f33ea8ef52d948468f27a2369c62da72bd5c2b466db0f171a1490fc0458e167252

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\IconCache.db
                                            MD5

                                            69eccce685ccdc091437cc187b85ff44

                                            SHA1

                                            45af608f2cbf10c03c3130865b7facca78eceb99

                                            SHA256

                                            1f1b29788901a74dadc7fc77479e3752e91235294c70b6a28de175f5a3bfb22b

                                            SHA512

                                            440653d2d7924623246d81cad794ba72eb9360bbb9afa46228d117b98e1478fd0d68fba3b80101e5127f94492efb478cf3f1dbdaa92b3ff7af20f011c474b18a

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00000.log
                                            MD5

                                            823577c7e9b82616b2c8d6a4390a6fd2

                                            SHA1

                                            017d47adb553159967ae12769eda7f2ff4a850a9

                                            SHA256

                                            faa7fd901e7189220975c2568a37346d34d7bb230ca62fdbaa239efb262cd388

                                            SHA512

                                            cbc85145fe63011971f52f1ae4c7672f08d608ca3f61a6a0aec69dcf5d5a915f49fb552c1e1168793f3b4cec6f4d1c250e0618de060f5b5cd0722eb71bdbe1e9

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\ASPNETSetup_00001.log
                                            MD5

                                            b5a52420ef3f2b60bc605ab81c6db6eb

                                            SHA1

                                            18c0e59a3e59f05d974eed9ce3ac825fbf669023

                                            SHA256

                                            45a0e2cf6c2b105c8322865f78b13ea5829d80387d549941ecaf12f6c537b9e2

                                            SHA512

                                            e439adbfe8555f2367bc7130f102c201206c9d566aa81513d8e78b279a61b842543f289aa9c3856fa8bcc0f9f2c2f0df1b3f3ad65032addaa0a268c6d99e70af

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGIFCB7.tmp
                                            MD5

                                            208c284cb82bd029a68ff70c85746dc5

                                            SHA1

                                            3006e255d1295f592aa0560033b3b2d313c45d48

                                            SHA256

                                            110f5f862a269b3c626f56d4478cb21380eecc43a22f349cdca67f9bef5a7dd1

                                            SHA512

                                            ac2370d78a25e6c51923b9c6fda8724ab02bf5f8ed97f9f08e4434efe215ddeb45ec37aa92425a2bb1ee2d2b3440d430e313e0d478b0c1024ef9ddcc08ee6d1e

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RGIFCB7.tmp-tmp
                                            MD5

                                            b70398b3048577f804681de4daf83c1d

                                            SHA1

                                            3730da7f39fb0186965ee552097602cca7a1da66

                                            SHA256

                                            14e87f90726a55a223b168f01f4ddab8b9006bfc09487c490c5f72dc2c3d691f

                                            SHA512

                                            db79bc25a33843a61efdee9ce57573beeceec994c30ca4581f593724bc980a40b0370a84023f2ea061c6b13a4f38355b680dcb2880798f49b4444c2c250a59fb

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\WPDNSE\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\chrome_installer.log
                                            MD5

                                            49c2d60987fc6e746cd03cf4d9ec8082

                                            SHA1

                                            bcf38467ddf5e6f966c92d0ee7c20dc01c7de96a

                                            SHA256

                                            7a3c9258d8617bb9ea26cfe07f9945f946b624aa8b8f62712a10d877f7d1f5bd

                                            SHA512

                                            4e9ccf9a80c08be1090f4acda19095613608276a10538b1e7a738f45138e0b8d7e015556755d81779cbd89098a04bb1bdb09806d749e5a293815faadbabf9ff9

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_SetupUtility.txt
                                            MD5

                                            bba07942c789766c42d67745e109fcb5

                                            SHA1

                                            4aed1711c8a26e4752db18b0bfc96147e38f3b45

                                            SHA256

                                            02fee08f3199b88afdb9a43c3f34f2376233e32e96c22e42e2284497ff75561e

                                            SHA512

                                            44a8db39a36f81d6a98c637586ddef4a397b92f586e128554bbc53b3a184ae1ec47239c7be775273258495fd7a290330533494a9194f9081f4069b3794c73063

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\dd_vcredistUI1E30.txt
                                            MD5

                                            9ebab6883687ac3d805085a65cdd97e8

                                            SHA1

                                            7186f05e8873e0d46b299891d6b0a55c4da9752c

                                            SHA256

                                            990302fdc50190cf6609e0e645c8cfbdd1650909022c77556d675aff860d13a5

                                            SHA512

                                            eef9cc77538d92952adb46ccc4bd463b0aefbba6e1d695cd6f24e81280a41a50178a31a99cff669bb7463a6190e43adf445799c2422962e56902beff0e8b9353

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\java_install.log
                                            MD5

                                            4a0fadc3147a7b2a23bf6852c29b64ab

                                            SHA1

                                            bb5790457013cde7f6099d237a001f6703789259

                                            SHA256

                                            d60966aa0713f00fbdf0f6e653cc6631f22d4d9fd183e1e00df657f5a0559bab

                                            SHA512

                                            e9b39abb26d8ed16126c59f39d175d97dad41c4b562ab6f60adb2742af289d10ecd1ac0acd25da2f4847eb2c6df6c4dc64747b96d923e7f1cc6424b455b2a4a8

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\jusched.log
                                            MD5

                                            be25f3c29bb7421963cb09560f8aea34

                                            SHA1

                                            d05cdbd733779a2c7851dab5f1237e5ee31c6e7e

                                            SHA256

                                            974425cedc6d4fac8f3568479a14e44fda548bba843e56e608c015f8582e41b2

                                            SHA512

                                            bb000060ccb90e5b4a7225fa5ae65ad67240c644ad31864c6173f4424002337e427406ed7d834987c539a3edf7417ebf0061a2ad07db40529f405eda32573dd7

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\History.IE5\desktop.ini
                                            MD5

                                            65a9baa7985e1bc24770014bc157f822

                                            SHA1

                                            ad833537c4bb2fe18f1442e1bb5d20d49dabeece

                                            SHA256

                                            10a744361784410ccf951e3d98fc7a9282deea8419d940d3844160b019750702

                                            SHA512

                                            2485ce83a14ff774c0f4fcba47dca3dc94ad0c5f4b56e72aef9dceb00718f5ee54f82fa0cdaef3b829f9c1f1cce898d90b8fa29d5fab43bd469ebffd60454a17

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\History\Low\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Credentials\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\E16QEJ8K\desktop.ini
                                            MD5

                                            de2358c65848035f87bb78cced7700a5

                                            SHA1

                                            3ea6357097a463b45e607b7fc6f7ce6f3c70df81

                                            SHA256

                                            117b3c33a12e0932659541d9179eff10251035e341765cde9c92b93ba68ddf6a

                                            SHA512

                                            d459f4716129e52539d37a18092adfdf9482a300320a5013929cf3675e5914be50d26c26bb273e30bdab048de2c80cde42db16ec35b9fd58bb10dcb17760dc7c

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\H2R8HLJC\desktop.ini
                                            MD5

                                            c9b98c92d7358c4cd7e6ab85e91d4517

                                            SHA1

                                            98760a25fffdfb2896661c4e5544fc0167390226

                                            SHA256

                                            ad390444f687828addee20c87c709bc6808ce9cc6e97d191f5764f4598bfdc38

                                            SHA512

                                            34092faa7da86f6525a422ea4ce5057bfd6a104c562789bc255c02fb465d49fa6b48ac0179fd2222256cfea4277665039a4c53b6cf8a5ce62797ae7f670ca214

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\VL9MRVWS\desktop.ini
                                            MD5

                                            bcc3b6f5fa6aa9842fc2c9ee03ffdfc3

                                            SHA1

                                            a28b128b9489f1981b6a6bde97d3f04fa9af9e58

                                            SHA256

                                            b7ec38d681c402d2e91d8050bfe34ae27f1480001ec56d3efaf383f4c3bbe1df

                                            SHA512

                                            aa4ae65f60edb32d33305d466b224ec391ec5ec42f7cac073cdbf0935b44076291e7e11b20a053831ecdcf15209fa35b6193a3650a742f2d7b525e924193679f

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds Cache\ZZZ3YRT4\desktop.ini
                                            MD5

                                            48fdc4b02de1cc92a3bb6c1b8adc97d7

                                            SHA1

                                            497a7a190122ab010f65e2cd842b0149f2a76342

                                            SHA256

                                            b887989b1d46b035aac125787927bd69cb8da235661ea04d6e05bc04b3fc38b8

                                            SHA512

                                            2de5f803f5b9e41921542444f274e7adf824f5de75f6c89164ece44da609be9ad8133d0794029aca4b433fb00d774a2a13aacbef05285e28b13aa9c1ef97376e

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Feeds\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Internet Explorer\brndlog.txt
                                            MD5

                                            408eb355d2412c199040269a15fa7024

                                            SHA1

                                            835769d38b9b527459d85fd0dcb870538b2a1cb2

                                            SHA256

                                            4973403241892201f6462af5e29ef05c0ab52780cd01ebeecf56dd4f9e19e53e

                                            SHA512

                                            deeea5cd0d30d345a15685bffbf338b9d12f82b129a4eb34d736b3128ba9f03bac0764596e8e05263bd9be8af372afdda69d1b7a1c13b946b848358ac7d32130

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Media Player\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\Groove\User\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Office\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\PlayReady\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Bears.htm
                                            MD5

                                            17d0d9a2ae62249b7f3344c032542139

                                            SHA1

                                            555ca359994454dfb202a3e19a27bf0ff5241cc8

                                            SHA256

                                            455ad241a571fe8792c9d85470860530cbe34689e4eaa7e5d32bae47ee52ce90

                                            SHA512

                                            eebcb4ff177391677ed06f4df6e07e4c89836a97e3febd1dc1e778c8258bf7f28b3ac652bae70d3f5ca45ea4159e69ea1bda702b1978c9e0c1e01046c6355312

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Graph.emf
                                            MD5

                                            8a9f870624be05dea735859f99b82230

                                            SHA1

                                            210fffde50d3d7412d7cf3d92a018c377b5adf79

                                            SHA256

                                            9b6f46a602d5393e29993d485f7b882952bb19d5b1c77d6a362a7e998151168d

                                            SHA512

                                            ffaaced8b4c498acfb24cef31e40843abda8f5ffedbc552421b8a95737a686632fabac0c83ffe645bff6d1cf78aff3b706fae34dc9d19a63fc4d7e0a5f560957

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Music.emf
                                            MD5

                                            3968f74c2dfaaec6d858b533ba05fdbf

                                            SHA1

                                            4c15797b628a22df804832a1c2cf4c9ddee57429

                                            SHA256

                                            700551a974e92cd583c8c69f2df0357e46af0db2fe0cba527ef91d2f2cfa9d48

                                            SHA512

                                            82fe61251d727631cc40c572d67fb058e92a91ab4b24ab950697d338ee12abf99c1398686a1102cb5fa33196d677a247afa77143d247ea523b26fefb3f35588f

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Roses.htm
                                            MD5

                                            64f9f898c27378a084648dbbcf5c33cd

                                            SHA1

                                            dbf70ecd88605e712db06faff6ade721eb060702

                                            SHA256

                                            9518ce28ac8d823cdbdc743bd4c875e920b4994123362d81092c7ff9f89ee8b2

                                            SHA512

                                            3616f6d9d6193637296ea4f4a406369d4eefb6811c0f1b892eb421aa3f6e716328a5e9900d4539615ccf0240fbb960ff4242775bfd2bc3ec05c99eef98a50ad3

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Stars.htm
                                            MD5

                                            c44fe59cd1c20ea93157976cf3432d4b

                                            SHA1

                                            2960eb058a04754eb450ad953fc1a98313913b75

                                            SHA256

                                            5ccc7fa417eb2027faef3bdd9a607c11058d64fb11b75adce50068093b090eba

                                            SHA512

                                            94517cf8935d3e4b32589f7d23b07c1b8124afa14e58f27fcd7a1bc508b9873e28736059c7f03ee261c5bf11984149514bce3272c5d04fa3eb12310c533376dc

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\Stationery\Tiki.gif
                                            MD5

                                            198e4f49023cf66b57c79fec216a4549

                                            SHA1

                                            7fbb6762804e715d87b6226d866618092ade75ba

                                            SHA256

                                            71baeec5396338c5aba641d29fb4edd1636f7ba0aba588d6b9a699340c1a4e5b

                                            SHA512

                                            6893d4b7a68c55787ef47188f998d98b7f8731a421ce15801966e01b519dda5c455b0a50c2a36b5dbf2ef09c362a101087db1d70171fed201f921e04a5bc85b1

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\WindowsMail.pat
                                            MD5

                                            1a45ccd67c9bfc67f714781075801ca7

                                            SHA1

                                            9175a6ba38f685f56bd5155ed33a1cd83f2b01a5

                                            SHA256

                                            b98790d3261ad6713f982e870db29866d62690a32a9cb619f8cb321ba97925b7

                                            SHA512

                                            824063190a83fcba1e1314b880773142784166d8b73a7141fb151e2d22bdecd313ac8675f91a974ddfde08e00e05c0516f72bd88f7177df8097bf0f8fde06791

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\edb.chk
                                            MD5

                                            c0ae2fb9e8c3f071e7fa2c7db47716e9

                                            SHA1

                                            207e8a84dcef149009a19160a502ec4f174a23c1

                                            SHA256

                                            1a13c7f81d3c4b35bbaaed2c4524b1b4a40bb801b32bbdb5279aa19651cb2b9a

                                            SHA512

                                            7100e2a56d736c0ab9c5096199bfd28423218d4a6864e267407247a31f30b92e9dd9d39664f8305f68bcd884ecc78092b72a04885fd3b727623a9f728f574a14

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Mail\oeold.xml
                                            MD5

                                            d2f52619f00b55e8071c956bcce25884

                                            SHA1

                                            7463ccde4e5ce853a4947d98ef05e5c1be7ab248

                                            SHA256

                                            8744f07dce3629360a66ea6710cf7376e0f54f38bce78d9556f114649d0181b9

                                            SHA512

                                            b0477617dfbe0d3e7ca407bcc37274e43ce41ef02a282d3deac38902eb917742d6fb4193a29227a0520ea535e55d2b56c0cb8c48e4bb6a3b924e4be24a748c8d

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows Media\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\Burn\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Burn\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Caches\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Explorer\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\Ringtones\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Microsoft\Windows\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\Local\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\AppData\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\Admin\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\Documents and Settings\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • C:\ProgramData\Microsoft\Crypto\RSA\MachineKeys\08e575673cce10c72090304839888e02_3bd845b8-ce6a-4337-9974-31490196462a
                                            MD5

                                            93a5aadeec082ffc1bca5aa27af70f52

                                            SHA1

                                            47a92aee3ea4d1c1954ed4da9f86dd79d9277d31

                                            SHA256

                                            a1a21799e98f97f271657ce656076f33dcb020d9370f1f2671d783cafd230294

                                            SHA512

                                            df388c8d83e779e006d6311b2046fcf9259ec33d379fc0e2c6a4b6b90418f587a12c5c23acd488413a02568ca2d3effe04608ec7c791925c7ed53dc71093ca45

                                          • C:\RyukReadMe.txt
                                            MD5

                                            83b18aa439053d822902d3a2e44454b3

                                            SHA1

                                            b9ac50dc79cfd1ea0e7bd275b5cfaee6c443bf58

                                            SHA256

                                            7dbdb87c184a35921c51947c8b056646a595acfb57aa95de30180512054fa9c5

                                            SHA512

                                            94e3199fe8d58e71170ca29bfa6dae4cd8b67cb7fac8c4fe620c514500038af0affb091cd94edf3a6fd5e867d736de9a00655a712a7754a7c142721abe9a20e2

                                          • memory/1256-58-0x000000013F720000-0x000000013FAB7000-memory.dmp
                                            Filesize

                                            3.6MB

                                          • memory/1256-56-0x000000013F720000-0x000000013FAB7000-memory.dmp
                                            Filesize

                                            3.6MB

                                          • memory/1360-59-0x000000013F720000-0x000000013FAB7000-memory.dmp
                                            Filesize

                                            3.6MB

                                          • memory/1540-55-0x000007FEFBE21000-0x000007FEFBE23000-memory.dmp
                                            Filesize

                                            8KB