Analysis
-
max time kernel
86s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-10-2022 15:40
Static task
static1
Behavioral task
behavioral1
Sample
lockbit.exe
Resource
win7-20220812-en
General
-
Target
lockbit.exe
-
Size
146KB
-
MD5
fed98c2820ca40c228ef080ddf68e994
-
SHA1
c61dd67fa85a6e3e1cf48512263a7097d0eac80e
-
SHA256
943d4c645f76f0d0494cb9ceca513e83a45e738bc2db71360116716720f4bed4
-
SHA512
6a9705d55b322e17e1f4d5380cf895e61ea89cdeca53e1b62833b0a37bafd3b785c8ee8625b4198c132741ad024d949eeb34053ef391a955540a8b836c5c1ca3
-
SSDEEP
1536:LzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDuKaUTGiblZ8FvBq5dF9n4KkPqD:0qJogYkcSNm9V7DxGDcYqg6lT
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
5957.tmppid process 820 5957.tmp -
Modifies extensions of user files 20 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
lockbit.exedescription ioc process File opened for modification C:\Users\Admin\Pictures\AssertConvert.png.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\NewBackup.tif.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\RestoreClear.raw => C:\Users\Admin\Pictures\RestoreClear.raw.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\AssertConvert.png => C:\Users\Admin\Pictures\AssertConvert.png.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\NewSuspend.tiff lockbit.exe File opened for modification C:\Users\Admin\Pictures\UnregisterConnect.png.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\UnregisterConnect.png => C:\Users\Admin\Pictures\UnregisterConnect.png.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\ConfirmCompress.tiff.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\NewBackup.tif => C:\Users\Admin\Pictures\NewBackup.tif.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\RestoreClear.raw.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\RestoreFind.crw.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\TestWait.crw => C:\Users\Admin\Pictures\TestWait.crw.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\NewSuspend.tiff.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\RestoreFind.crw => C:\Users\Admin\Pictures\RestoreFind.crw.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\TestWait.crw.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\ConfirmCompress.tiff lockbit.exe File renamed C:\Users\Admin\Pictures\ConfirmCompress.tiff => C:\Users\Admin\Pictures\ConfirmCompress.tiff.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\ConvertFromDisconnect.png => C:\Users\Admin\Pictures\ConvertFromDisconnect.png.jJS2yaJaB lockbit.exe File opened for modification C:\Users\Admin\Pictures\ConvertFromDisconnect.png.jJS2yaJaB lockbit.exe File renamed C:\Users\Admin\Pictures\NewSuspend.tiff => C:\Users\Admin\Pictures\NewSuspend.tiff.jJS2yaJaB lockbit.exe -
Deletes itself 1 IoCs
Processes:
5957.tmppid process 820 5957.tmp -
Loads dropped DLL 1 IoCs
Processes:
lockbit.exepid process 828 lockbit.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 1 IoCs
Processes:
lockbit.exedescription ioc process File opened for modification C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\desktop.ini lockbit.exe -
Sets desktop wallpaper using registry 2 TTPs 2 IoCs
Processes:
lockbit.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop\Wallpaper = "C:\\ProgramData\\jJS2yaJaB.bmp" lockbit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop\WallPaper = "C:\\ProgramData\\jJS2yaJaB.bmp" lockbit.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
5957.tmppid process 820 5957.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Control Panel 2 IoCs
Processes:
lockbit.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop lockbit.exe Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Control Panel\Desktop\WallpaperStyle = "10" lockbit.exe -
Modifies registry class 5 IoCs
Processes:
lockbit.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.jJS2yaJaB lockbit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.jJS2yaJaB\ = "jJS2yaJaB" lockbit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jJS2yaJaB\DefaultIcon lockbit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\jJS2yaJaB lockbit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\jJS2yaJaB\DefaultIcon\ = "C:\\ProgramData\\jJS2yaJaB.ico" lockbit.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
lockbit.exepid process 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe 828 lockbit.exe -
Suspicious behavior: RenamesItself 26 IoCs
Processes:
5957.tmppid process 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp 820 5957.tmp -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
lockbit.exedescription pid process Token: SeAssignPrimaryTokenPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeDebugPrivilege 828 lockbit.exe Token: 36 828 lockbit.exe Token: SeImpersonatePrivilege 828 lockbit.exe Token: SeIncBasePriorityPrivilege 828 lockbit.exe Token: SeIncreaseQuotaPrivilege 828 lockbit.exe Token: 33 828 lockbit.exe Token: SeManageVolumePrivilege 828 lockbit.exe Token: SeProfSingleProcessPrivilege 828 lockbit.exe Token: SeRestorePrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSystemProfilePrivilege 828 lockbit.exe Token: SeTakeOwnershipPrivilege 828 lockbit.exe Token: SeShutdownPrivilege 828 lockbit.exe Token: SeDebugPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeBackupPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe Token: SeSecurityPrivilege 828 lockbit.exe -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
lockbit.exe5957.tmpdescription pid process target process PID 828 wrote to memory of 820 828 lockbit.exe 5957.tmp PID 828 wrote to memory of 820 828 lockbit.exe 5957.tmp PID 828 wrote to memory of 820 828 lockbit.exe 5957.tmp PID 828 wrote to memory of 820 828 lockbit.exe 5957.tmp PID 828 wrote to memory of 820 828 lockbit.exe 5957.tmp PID 820 wrote to memory of 1384 820 5957.tmp cmd.exe PID 820 wrote to memory of 1384 820 5957.tmp cmd.exe PID 820 wrote to memory of 1384 820 5957.tmp cmd.exe PID 820 wrote to memory of 1384 820 5957.tmp cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\lockbit.exe"C:\Users\Admin\AppData\Local\Temp\lockbit.exe"1⤵
- Modifies extensions of user files
- Loads dropped DLL
- Drops desktop.ini file(s)
- Sets desktop wallpaper using registry
- Modifies Control Panel
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\5957.tmp"C:\ProgramData\5957.tmp"2⤵
- Executes dropped EXE
- Deletes itself
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\5957.tmp >> NUL3⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x1541⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\AAAAAAAAAAAFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\BBBBBBBBBBBFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\CCCCCCCCCCCFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\DDDDDDDDDDDFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\EEEEEEEEEEEFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\FFFFFFFFFFFFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\GGGGGGGGGGGFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\HHHHHHHHHHHFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\IIIIIIIIIIIFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\JJJJJJJJJJJFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\KKKKKKKKKKKFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\LLLLLLLLLLLFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\MMMMMMMMMMMFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\NNNNNNNNNNNFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\OOOOOOOOOOOFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\PPPPPPPPPPPFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\QQQQQQQQQQQFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\RRRRRRRRRRRFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\SSSSSSSSSSSFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\TTTTTTTTTTTFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\UUUUUUUUUUUFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\VVVVVVVVVVVFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\WWWWWWWWWWWFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\XXXXXXXXXXXFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\YYYYYYYYYYYFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\$Recycle.Bin\S-1-5-21-3845472200-3839195424-595303356-1000\desktop.iniFilesize
129B
MD585d73daa8bf33697c864dafc4b82eba0
SHA1c56c9ce52dd3dc0dc3a30b6a16e06e9a53df4ff5
SHA256e395c57a185f1bb9e392261d18d5da41abaf9b0242496c3594bd7548c967df10
SHA512db1438ce9645687e36c8c59428fd9eeb40730bd77e8216f51b630db007745a5e6b08d92f0dae94d0712a85659962ad3f65ece7a742053fb956ca885422cdc3d5
-
C:\ProgramData\5957.tmpFilesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
C:\ProgramData\5957.tmpFilesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
\ProgramData\5957.tmpFilesize
14KB
MD5294e9f64cb1642dd89229fff0592856b
SHA197b148c27f3da29ba7b18d6aee8a0db9102f47c9
SHA256917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2
SHA512b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf
-
memory/820-83-0x0000000000000000-mapping.dmp
-
memory/820-88-0x0000000000400000-0x0000000000407000-memory.dmpFilesize
28KB
-
memory/820-89-0x00000000021E5000-0x00000000021F6000-memory.dmpFilesize
68KB
-
memory/828-54-0x0000000075A11000-0x0000000075A13000-memory.dmpFilesize
8KB
-
memory/828-81-0x00000000020E5000-0x00000000020F6000-memory.dmpFilesize
68KB
-
memory/1384-87-0x0000000000000000-mapping.dmp