Analysis
-
max time kernel
139s -
max time network
12s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
16-07-2021 14:50
Static task
static1
Behavioral task
behavioral1
Sample
9M1B.TMP.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
9M1B.TMP.exe
Resource
win10v20210410
General
-
Target
9M1B.TMP.exe
-
Size
751KB
-
MD5
15f71f76e53975f8276b6736741342f3
-
SHA1
b185723d4b783392dc0229cee1b3d682662cea37
-
SHA256
d455b4adb3367a9f0dc67c1f4ff2371d5495eac4db016fbabe4fe8e3d61b2a06
-
SHA512
4ad2b8f1220188ece7b66f9480f72fd90212ff75bb587d557187b6ed0039bfe7f74f957fc5ca3c5fa88457736eb78a93a64332c3b81e75e624dc777077681e02
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
mstray.exe@RecoveryYourFiles@.exepid process 1488 mstray.exe 1664 @RecoveryYourFiles@.exe -
Modifies Installed Components in the registry 2 TTPs
-
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
cmd.exedescription ioc process File renamed C:\Users\Admin\Pictures\SubmitCheckpoint.raw => C:\Users\Admin\Pictures\SubmitCheckpoint.raw.MCNB cmd.exe File renamed C:\Users\Admin\Pictures\ConvertToUnregister.raw => C:\Users\Admin\Pictures\ConvertToUnregister.raw.MCNB cmd.exe File renamed C:\Users\Admin\Pictures\DisableApprove.tif => C:\Users\Admin\Pictures\DisableApprove.tif.MCNB cmd.exe File renamed C:\Users\Admin\Pictures\DisconnectWait.crw => C:\Users\Admin\Pictures\DisconnectWait.crw.MCNB cmd.exe File renamed C:\Users\Admin\Pictures\ExitUnpublish.crw => C:\Users\Admin\Pictures\ExitUnpublish.crw.MCNB cmd.exe File renamed C:\Users\Admin\Pictures\ProtectGet.tiff => C:\Users\Admin\Pictures\ProtectGet.tiff.MCNB cmd.exe File renamed C:\Users\Admin\Pictures\RestoreGrant.raw => C:\Users\Admin\Pictures\RestoreGrant.raw.MCNB cmd.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\822B.tmp\2Y8U.TMP upx C:\Windows\System32\mstray.exe upx -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mstray = "C:\\Windows\\system32\\mstray.exe" reg.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
cmd.exedescription ioc process File opened (read-only) \??\T: cmd.exe File opened (read-only) \??\W: cmd.exe File opened (read-only) \??\X: cmd.exe File opened (read-only) \??\Y: cmd.exe File opened (read-only) \??\E: cmd.exe File opened (read-only) \??\J: cmd.exe File opened (read-only) \??\L: cmd.exe File opened (read-only) \??\O: cmd.exe File opened (read-only) \??\U: cmd.exe File opened (read-only) \??\Z: cmd.exe File opened (read-only) \??\G: cmd.exe File opened (read-only) \??\I: cmd.exe File opened (read-only) \??\M: cmd.exe File opened (read-only) \??\R: cmd.exe File opened (read-only) \??\S: cmd.exe File opened (read-only) \??\V: cmd.exe File opened (read-only) \??\F: cmd.exe File opened (read-only) \??\K: cmd.exe File opened (read-only) \??\N: cmd.exe File opened (read-only) \??\P: cmd.exe File opened (read-only) \??\H: cmd.exe -
Drops file in System32 directory 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\system32\mstray.exe cmd.exe File opened for modification C:\Windows\system32\mstray.exe cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 46 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 1192 timeout.exe 1568 timeout.exe 1848 timeout.exe 1568 timeout.exe 1868 timeout.exe 1936 timeout.exe 1168 timeout.exe 1620 timeout.exe 1596 timeout.exe 1740 timeout.exe 1848 timeout.exe 408 timeout.exe 892 timeout.exe 1532 timeout.exe 1936 timeout.exe 1320 timeout.exe 756 timeout.exe 1108 timeout.exe 1740 timeout.exe 1852 timeout.exe 1740 timeout.exe 1836 timeout.exe 1320 timeout.exe 1456 timeout.exe 1540 timeout.exe 560 timeout.exe 1532 timeout.exe 1416 timeout.exe 1740 timeout.exe 1744 timeout.exe 1856 timeout.exe 1108 timeout.exe 1632 timeout.exe 1912 timeout.exe 1176 timeout.exe 1776 timeout.exe 760 timeout.exe 1588 timeout.exe 2032 timeout.exe 1792 timeout.exe 1744 timeout.exe 1716 timeout.exe 1604 timeout.exe 820 timeout.exe 1836 timeout.exe 108 timeout.exe -
Enumerates processes with tasklist 1 TTPs 45 IoCs
Processes:
tasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exepid process 1776 tasklist.exe 968 tasklist.exe 1868 tasklist.exe 848 tasklist.exe 1320 tasklist.exe 1364 tasklist.exe 1544 tasklist.exe 1748 tasklist.exe 1912 tasklist.exe 1808 tasklist.exe 1204 tasklist.exe 560 tasklist.exe 1028 tasklist.exe 1632 tasklist.exe 1544 tasklist.exe 2024 tasklist.exe 1632 tasklist.exe 1924 tasklist.exe 408 tasklist.exe 1356 tasklist.exe 1988 tasklist.exe 1744 tasklist.exe 1540 tasklist.exe 1564 tasklist.exe 1924 tasklist.exe 1704 tasklist.exe 1604 tasklist.exe 1356 tasklist.exe 1596 tasklist.exe 1848 tasklist.exe 1580 tasklist.exe 1632 tasklist.exe 1544 tasklist.exe 1456 tasklist.exe 1668 tasklist.exe 1988 tasklist.exe 2040 tasklist.exe 1580 tasklist.exe 1588 tasklist.exe 1544 tasklist.exe 572 tasklist.exe 1584 tasklist.exe 1560 tasklist.exe 628 tasklist.exe 1276 tasklist.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1580 taskkill.exe -
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch explorer.exe -
Modifies registry class 5 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
Processes:
mstray.exe@RecoveryYourFiles@.exepid process 1488 mstray.exe 1664 @RecoveryYourFiles@.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 1112 explorer.exe -
Suspicious use of AdjustPrivilegeToken 62 IoCs
Processes:
taskkill.exeexplorer.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exetasklist.exedescription pid process Token: SeDebugPrivilege 1580 taskkill.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeDebugPrivilege 560 tasklist.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeDebugPrivilege 1456 tasklist.exe Token: SeDebugPrivilege 1668 tasklist.exe Token: SeDebugPrivilege 1564 tasklist.exe Token: SeDebugPrivilege 1584 tasklist.exe Token: SeDebugPrivilege 1924 tasklist.exe Token: SeDebugPrivilege 1028 tasklist.exe Token: SeDebugPrivilege 1632 tasklist.exe Token: SeDebugPrivilege 1704 tasklist.exe Token: SeDebugPrivilege 1604 tasklist.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeDebugPrivilege 1320 tasklist.exe Token: SeDebugPrivilege 1560 tasklist.exe Token: SeDebugPrivilege 1364 tasklist.exe Token: SeDebugPrivilege 1356 tasklist.exe Token: SeDebugPrivilege 1544 tasklist.exe Token: SeDebugPrivilege 1988 tasklist.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeDebugPrivilege 2040 tasklist.exe Token: SeDebugPrivilege 1588 tasklist.exe Token: SeDebugPrivilege 1580 tasklist.exe Token: SeDebugPrivilege 1544 tasklist.exe Token: SeDebugPrivilege 1988 tasklist.exe Token: SeDebugPrivilege 1632 tasklist.exe Token: SeDebugPrivilege 1776 tasklist.exe Token: SeDebugPrivilege 1580 tasklist.exe Token: SeDebugPrivilege 1544 tasklist.exe Token: SeDebugPrivilege 1744 tasklist.exe Token: SeDebugPrivilege 572 tasklist.exe Token: SeDebugPrivilege 1632 tasklist.exe Token: SeDebugPrivilege 1748 tasklist.exe Token: SeDebugPrivilege 1912 tasklist.exe Token: SeDebugPrivilege 1924 tasklist.exe Token: SeDebugPrivilege 1544 tasklist.exe Token: SeDebugPrivilege 2024 tasklist.exe Token: SeDebugPrivilege 408 tasklist.exe Token: SeDebugPrivilege 1808 tasklist.exe Token: SeDebugPrivilege 1540 tasklist.exe Token: SeShutdownPrivilege 1112 explorer.exe Token: SeDebugPrivilege 628 tasklist.exe Token: SeDebugPrivilege 1356 tasklist.exe Token: SeDebugPrivilege 1596 tasklist.exe Token: SeDebugPrivilege 1868 tasklist.exe Token: SeDebugPrivilege 1276 tasklist.exe Token: SeDebugPrivilege 848 tasklist.exe Token: SeDebugPrivilege 1204 tasklist.exe Token: SeDebugPrivilege 968 tasklist.exe Token: SeDebugPrivilege 1848 tasklist.exe -
Suspicious use of FindShellTrayWindow 26 IoCs
Processes:
explorer.exepid process 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe -
Suspicious use of SendNotifyMessage 36 IoCs
Processes:
explorer.exepid process 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe 1112 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
@RecoveryYourFiles@.exepid process 1664 @RecoveryYourFiles@.exe 1664 @RecoveryYourFiles@.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9M1B.TMP.execmd.exedescription pid process target process PID 1944 wrote to memory of 1380 1944 9M1B.TMP.exe cmd.exe PID 1944 wrote to memory of 1380 1944 9M1B.TMP.exe cmd.exe PID 1944 wrote to memory of 1380 1944 9M1B.TMP.exe cmd.exe PID 1944 wrote to memory of 1380 1944 9M1B.TMP.exe cmd.exe PID 1380 wrote to memory of 1252 1380 cmd.exe reg.exe PID 1380 wrote to memory of 1252 1380 cmd.exe reg.exe PID 1380 wrote to memory of 1252 1380 cmd.exe reg.exe PID 1380 wrote to memory of 1224 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1224 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1224 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 588 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 588 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 588 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 688 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 688 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 688 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 732 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 732 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 732 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 872 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 872 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 872 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1808 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1808 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1808 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1796 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1796 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1796 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1768 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1768 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1768 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1804 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1804 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1804 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1824 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1824 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1824 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1732 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1732 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1732 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1028 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1028 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1028 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1628 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1628 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1628 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1624 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1624 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1624 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1588 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1588 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1588 1380 cmd.exe cmd.exe PID 1380 wrote to memory of 1660 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1660 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1660 1380 cmd.exe cacls.exe PID 1380 wrote to memory of 1684 1380 cmd.exe reg.exe PID 1380 wrote to memory of 1684 1380 cmd.exe reg.exe PID 1380 wrote to memory of 1684 1380 cmd.exe reg.exe PID 1380 wrote to memory of 1580 1380 cmd.exe taskkill.exe PID 1380 wrote to memory of 1580 1380 cmd.exe taskkill.exe PID 1380 wrote to memory of 1580 1380 cmd.exe taskkill.exe PID 1380 wrote to memory of 1112 1380 cmd.exe explorer.exe PID 1380 wrote to memory of 1112 1380 cmd.exe explorer.exe PID 1380 wrote to memory of 1112 1380 cmd.exe explorer.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9M1B.TMP.exe"C:\Users\Admin\AppData\Local\Temp\9M1B.TMP.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\822B.tmp\822C.tmp\822D.bat C:\Users\Admin\AppData\Local\Temp\9M1B.TMP.exe"2⤵
- Modifies extensions of user files
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exereg delete HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v msfdhs /f3⤵
- Modifies registry key
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Music\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Downloads\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Links\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Favorites\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Documents\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Videos\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Pictures\*.*" /e /d everyone3⤵
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo y"3⤵
-
C:\Windows\system32\cacls.execacls "C:\Users\Admin\Desktop\*.*" /e /d everyone3⤵
-
C:\Windows\system32\reg.exereg add "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "mstray" /t REG_SZ /d "C:\Windows\system32\mstray.exe" /f3⤵
- Adds Run key to start application
-
C:\Windows\system32\taskkill.exetaskkill /f /im explorer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exeexplorer.exe3⤵
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\@readme@.txt4⤵
-
C:\Windows\system32\mstray.exeC:\Windows\system32\mstray.exe3⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
-
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8CD5.tmp\8CD6.tmp\8CD7.bat C:\Windows\system32\mstray.exe"4⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\MiniworldRansom\@RecoveryYourFiles@.exeC:\MiniworldRansom\@RecoveryYourFiles@.exe5⤵
- Executes dropped EXE
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c tasklist|find /i "@RecoveryYourFiles@.exe"5⤵
-
C:\Windows\system32\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\find.exefind /i "@RecoveryYourFiles@.exe"6⤵
-
C:\Windows\system32\timeout.exetimeout /t 35⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\MiniworldRansom\@RecoveryYourFiles@.exeMD5
4fa99da1c78cfaa53253e55043e5f5d4
SHA1ba8f4be3e782283cc0bacd20eab8a50960bd27a7
SHA256a65554fbc7aded7f05894923c699c17b909f810a0a4ddf60cf053f07a190db85
SHA512146da3fc2ca5825b04ceb398ae8d4e711ca77f6f3be6fb5ae7d35030b300e24d00ea8acbe8db2f5ecaebdaa07e7e3e1a84db595d07d061c1dc30d4291feb697f
-
C:\MiniworldRansom\@RecoveryYourFiles@.exeMD5
4fa99da1c78cfaa53253e55043e5f5d4
SHA1ba8f4be3e782283cc0bacd20eab8a50960bd27a7
SHA256a65554fbc7aded7f05894923c699c17b909f810a0a4ddf60cf053f07a190db85
SHA512146da3fc2ca5825b04ceb398ae8d4e711ca77f6f3be6fb5ae7d35030b300e24d00ea8acbe8db2f5ecaebdaa07e7e3e1a84db595d07d061c1dc30d4291feb697f
-
C:\Users\Admin\AppData\Local\Temp\822B.tmp\2Y8U.TMPMD5
a8b1f3a1ff16facab894394044460a67
SHA184807917cd43a75d295340263f34cde7655f90db
SHA256c35eecb5533a63a7f9f0e32ce559f679e7207448f5be5ccbb2c368cd20aeaab1
SHA51247fb76a21cecc65474ccd9c6b355afbb61aa482671a61682b6b2759f995bdaf166b97f6153513e7058beb107a24637254f854d58a34bacca80931558d4bd2425
-
C:\Users\Admin\AppData\Local\Temp\822B.tmp\3R9J.TMPMD5
4fa99da1c78cfaa53253e55043e5f5d4
SHA1ba8f4be3e782283cc0bacd20eab8a50960bd27a7
SHA256a65554fbc7aded7f05894923c699c17b909f810a0a4ddf60cf053f07a190db85
SHA512146da3fc2ca5825b04ceb398ae8d4e711ca77f6f3be6fb5ae7d35030b300e24d00ea8acbe8db2f5ecaebdaa07e7e3e1a84db595d07d061c1dc30d4291feb697f
-
C:\Users\Admin\AppData\Local\Temp\822B.tmp\822C.tmp\822D.batMD5
e9b7f5e881a2acedaed2ab8a383ae868
SHA1007dd77306674371ac941350e391f76b95d75892
SHA2567f46a26b89ef1c5f291b2b5a389160ff00c072e90e8796a0ccd0818476fa7e43
SHA512bdeb27b48621b5cef41c3c9329ba64c47347d6ee6489177ab2a9ca3a4529bd823f760dcec3d3f030bba517c6accc89d3277c6699a08d32fc33bec6b6e1860acd
-
C:\Users\Admin\AppData\Local\Temp\822B.tmp\@readme@.txtMD5
d2d51c6d6cc1cdd77ef953437e55086c
SHA12b4d4a9ff45540c137a426ea93d508c8364e1e9e
SHA2566266559ecd24ef4be236373a0b059415d24ad689ad0a60ba7ee0ca0ee99d31b9
SHA512440eb2ebb00a3008bf40d2a1a59ce88ca49db30c9fe8179e0947e5b75d6007678e54fc4c2bd1df6f5dfdc4629e7fa99d0039154b9d0904b8ef142f7e681aa7da
-
C:\Users\Admin\AppData\Local\Temp\822B.tmp\background.jpgMD5
8caeb0ab9e567bbe2bb1d3a6f8871782
SHA1c7a5522eccaab5c0d435cf32a982c24ec69ceda3
SHA2561fead54464769a95c719c665083cd6022c2f8f85d8b865f5481a7ad09d4c1631
SHA5123d2bb691304c873a8ace9ea8909cd466278487ac2af87fbbb973038e3d0e5bd24e74f85ef7158c1f44290ac21e52ad1ed3bfa1fa061c9fda0165f085c7880619
-
C:\Users\Admin\AppData\Local\Temp\8CD5.tmp\8CD6.tmp\8CD7.batMD5
3f8ac701a1bdb8ce5a89f49c3071aff4
SHA184e76f63cf9f91495a5e7eb9220f10c51e4d828f
SHA2562354202cdaf8d417b682ba1440e84f0aea6495fa4268fb306647a2ea22df9d56
SHA5121a884548f1fb52d770ee2e1d88282bbc81a0bdbd67087e401efc7ede3afd3f3bc7424100a1e21cd718930d06671af3fe7a51e8812309846a6c9d2b3b49894045
-
C:\Users\Public\Desktop\@RecoveryYourFiles@.exeMD5
4fa99da1c78cfaa53253e55043e5f5d4
SHA1ba8f4be3e782283cc0bacd20eab8a50960bd27a7
SHA256a65554fbc7aded7f05894923c699c17b909f810a0a4ddf60cf053f07a190db85
SHA512146da3fc2ca5825b04ceb398ae8d4e711ca77f6f3be6fb5ae7d35030b300e24d00ea8acbe8db2f5ecaebdaa07e7e3e1a84db595d07d061c1dc30d4291feb697f
-
C:\Users\Public\Desktop\@readme@.txtMD5
d2d51c6d6cc1cdd77ef953437e55086c
SHA12b4d4a9ff45540c137a426ea93d508c8364e1e9e
SHA2566266559ecd24ef4be236373a0b059415d24ad689ad0a60ba7ee0ca0ee99d31b9
SHA512440eb2ebb00a3008bf40d2a1a59ce88ca49db30c9fe8179e0947e5b75d6007678e54fc4c2bd1df6f5dfdc4629e7fa99d0039154b9d0904b8ef142f7e681aa7da
-
C:\Windows\System32\mstray.exeMD5
a8b1f3a1ff16facab894394044460a67
SHA184807917cd43a75d295340263f34cde7655f90db
SHA256c35eecb5533a63a7f9f0e32ce559f679e7207448f5be5ccbb2c368cd20aeaab1
SHA51247fb76a21cecc65474ccd9c6b355afbb61aa482671a61682b6b2759f995bdaf166b97f6153513e7058beb107a24637254f854d58a34bacca80931558d4bd2425
-
memory/108-134-0x0000000000000000-mapping.dmp
-
memory/316-126-0x0000000000000000-mapping.dmp
-
memory/560-96-0x0000000000000000-mapping.dmp
-
memory/588-64-0x0000000000000000-mapping.dmp
-
memory/688-65-0x0000000000000000-mapping.dmp
-
memory/732-66-0x0000000000000000-mapping.dmp
-
memory/820-92-0x0000000000000000-mapping.dmp
-
memory/864-90-0x0000000000000000-mapping.dmp
-
memory/872-67-0x0000000000000000-mapping.dmp
-
memory/900-110-0x0000000000000000-mapping.dmp
-
memory/1028-74-0x0000000000000000-mapping.dmp
-
memory/1028-125-0x0000000000000000-mapping.dmp
-
memory/1108-128-0x0000000000000000-mapping.dmp
-
memory/1112-106-0x0000000004440000-0x000000000447D000-memory.dmpFilesize
244KB
-
memory/1112-89-0x000007FEFB8D1000-0x000007FEFB8D3000-memory.dmpFilesize
8KB
-
memory/1112-85-0x0000000000000000-mapping.dmp
-
memory/1224-63-0x0000000000000000-mapping.dmp
-
memory/1252-62-0x0000000000000000-mapping.dmp
-
memory/1268-108-0x0000000000000000-mapping.dmp
-
memory/1280-97-0x0000000000000000-mapping.dmp
-
memory/1320-127-0x0000000000000000-mapping.dmp
-
memory/1344-95-0x0000000000000000-mapping.dmp
-
memory/1380-60-0x0000000000000000-mapping.dmp
-
memory/1384-136-0x0000000000000000-mapping.dmp
-
memory/1396-120-0x0000000000000000-mapping.dmp
-
memory/1416-101-0x0000000000000000-mapping.dmp
-
memory/1428-114-0x0000000000000000-mapping.dmp
-
memory/1456-122-0x0000000000000000-mapping.dmp
-
memory/1456-104-0x0000000000000000-mapping.dmp
-
memory/1488-86-0x0000000000000000-mapping.dmp
-
memory/1504-138-0x0000000000000000-mapping.dmp
-
memory/1524-124-0x0000000000000000-mapping.dmp
-
memory/1532-131-0x0000000000000000-mapping.dmp
-
memory/1560-130-0x0000000000000000-mapping.dmp
-
memory/1564-113-0x0000000000000000-mapping.dmp
-
memory/1572-105-0x0000000000000000-mapping.dmp
-
memory/1576-112-0x0000000000000000-mapping.dmp
-
memory/1580-84-0x0000000000000000-mapping.dmp
-
memory/1580-103-0x0000000000000000-mapping.dmp
-
memory/1584-117-0x0000000000000000-mapping.dmp
-
memory/1588-77-0x0000000000000000-mapping.dmp
-
memory/1596-119-0x0000000000000000-mapping.dmp
-
memory/1604-137-0x0000000000000000-mapping.dmp
-
memory/1624-76-0x0000000000000000-mapping.dmp
-
memory/1628-75-0x0000000000000000-mapping.dmp
-
memory/1632-129-0x0000000000000000-mapping.dmp
-
memory/1660-118-0x0000000000000000-mapping.dmp
-
memory/1660-78-0x0000000000000000-mapping.dmp
-
memory/1664-99-0x0000000000000000-mapping.dmp
-
memory/1668-109-0x0000000000000000-mapping.dmp
-
memory/1684-83-0x0000000000000000-mapping.dmp
-
memory/1704-133-0x0000000000000000-mapping.dmp
-
memory/1732-73-0x0000000000000000-mapping.dmp
-
memory/1740-107-0x0000000000000000-mapping.dmp
-
memory/1740-123-0x0000000000000000-mapping.dmp
-
memory/1744-111-0x0000000000000000-mapping.dmp
-
memory/1768-70-0x0000000000000000-mapping.dmp
-
memory/1796-69-0x0000000000000000-mapping.dmp
-
memory/1804-71-0x0000000000000000-mapping.dmp
-
memory/1808-68-0x0000000000000000-mapping.dmp
-
memory/1824-72-0x0000000000000000-mapping.dmp
-
memory/1832-116-0x0000000000000000-mapping.dmp
-
memory/1836-115-0x0000000000000000-mapping.dmp
-
memory/1848-135-0x0000000000000000-mapping.dmp
-
memory/1924-121-0x0000000000000000-mapping.dmp
-
memory/1936-132-0x0000000000000000-mapping.dmp
-
memory/1944-59-0x00000000760B1000-0x00000000760B3000-memory.dmpFilesize
8KB