Malware Analysis Report

2024-10-16 03:28

Sample ID 230316-ldhxdaab62
Target Roseland.bin
SHA256 bff12a83b1fc2e0ad0000ad9b68abc8eada559bb1094caaf5b9f52887df23705
Tags
avoslocker evasion ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

bff12a83b1fc2e0ad0000ad9b68abc8eada559bb1094caaf5b9f52887df23705

Threat Level: Known bad

The file Roseland.bin was found to be: Known bad.

Malicious Activity Summary

avoslocker evasion ransomware

Avoslocker Ransomware

Deletes shadow copies

Modifies boot configuration data using bcdedit

Modifies extensions of user files

Drops desktop.ini file(s)

Enumerates connected drives

Sets desktop wallpaper using registry

Drops file in Program Files directory

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Opens file in notepad (likely ransom note)

Suspicious behavior: EnumeratesProcesses

Interacts with shadow copies

Uses Volume Shadow Copy service COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-03-16 09:24

Signatures

N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-03-16 09:24

Reported

2023-03-16 09:28

Platform

win7-20230220-en

Max time kernel

107s

Max time network

33s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

Signatures

Avoslocker Ransomware

ransomware avoslocker

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\CloseExport.raw => C:\Users\Admin\Pictures\CloseExport.raw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\GrantWatch.crw => C:\Users\Admin\Pictures\GrantWatch.crw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\PingLock.crw => C:\Users\Admin\Pictures\PingLock.crw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\SwitchLimit.png => C:\Users\Admin\Pictures\SwitchLimit.png.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-1914912747-3343861975-731272777-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\1156130425.png" C:\Windows\system32\reg.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\VideoLAN\VLC\locale\sl\LC_MESSAGES\vlc.mo C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\fr-FR\js\highDpiImageSwap.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\images\next_rest.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Colors\Clarity.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01176_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105504.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01566_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\Annotations\Stamps\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-options-api.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099159.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\PROFILE\PREVIEW.GIF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Media Player\en-US\wmpnscfg.exe.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\modules\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Winnipeg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_bottom_left.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00090_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Microsoft Games\SpiderSolitaire\it-IT\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msaddsr.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\es-ES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04108_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Common Files\System\ado\fr-FR\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\Unicode\Mappings\Mac\CORPCHAR.TXT C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodicon.gif C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\fr-FR\settings.html C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\SIGNHM.POC C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18227_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\km\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-selector-ui_zh_CN.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\button-bullet.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_gray_thunderstorm.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178460.JPG C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0182888.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02790_.WMF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.console_1.0.300.v20131113-1212.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rcp.application_5.5.0.165303.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\GrayCheck\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\mr\LC_MESSAGES\vlc.mo C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ky\LC_MESSAGES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\be\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-swing-plaf.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-netbeans-core-ui_ja.jar C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\chrome.VisualElementsManifest.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_SelectionSubpicture.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Common Files\Microsoft Shared\MSInfo\de-DE\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\Desktop\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Templates\1033\FAX\MedianFax.Dotx C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\Teal.css C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\rtf_center.gif C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099188.JPG C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\System\msadc\en-US\msadcfr.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\it-IT\TipBand.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGLINACC.DPV C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Proofing.en-us\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\HxRuntime.HxS C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Font\CourierStd-BoldOblique.otf C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\LC_MESSAGES\vlc.mo C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\deploy\messages_zh_TW.properties C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Common Files\Services\verisign.bmp C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Templates\1033\Access\WSS\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Common Files\Microsoft Shared\ink\ja-JP\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGWEBCAL.XML C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\nb.pak C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
N/A N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2028 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2000 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 2004 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1984 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1248 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 2028 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2336 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1968 wrote to memory of 2336 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1968 wrote to memory of 2336 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2004 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2004 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2004 wrote to memory of 2360 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2000 wrote to memory of 2328 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2000 wrote to memory of 2328 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2000 wrote to memory of 2328 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1984 wrote to memory of 2480 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1984 wrote to memory of 2480 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1984 wrote to memory of 2480 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1248 wrote to memory of 2508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1248 wrote to memory of 2508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1248 wrote to memory of 2508 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2028 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2028 wrote to memory of 2916 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 2916 wrote to memory of 2584 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 2916 wrote to memory of 2584 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 2916 wrote to memory of 2584 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\reg.exe
PID 2916 wrote to memory of 2908 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe
PID 2916 wrote to memory of 2908 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe
PID 2916 wrote to memory of 2908 N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\system32\rundll32.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\Roseland.exe

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

C:\Windows\system32\cmd.exe

cmd /c wmic shadowcopy delete /nointeractive

C:\Windows\system32\cmd.exe

cmd /c vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\cmd.exe

cmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\cmd.exe

cmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\cmd.exe

cmd /c bcdedit /set {default} recoveryenabled No

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete /nointeractive

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled No

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"

C:\Windows\system32\reg.exe

"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1156130425.png /f

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False

Network

N/A

Files

C:\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379

memory/2336-590-0x0000000002810000-0x0000000002890000-memory.dmp

memory/2336-603-0x000000001B0F0000-0x000000001B3D2000-memory.dmp

memory/2336-604-0x0000000002050000-0x0000000002058000-memory.dmp

memory/2336-696-0x0000000002810000-0x0000000002890000-memory.dmp

memory/2336-703-0x0000000002810000-0x0000000002890000-memory.dmp

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

MD5 18187291505151954c8d44759d3c7e98
SHA1 5ba813ddb605f73db53d1d034eb1f19c1bb65bc9
SHA256 d22644b191f366a566318024c0713b15c1bd79e14fc572d24a976cee1932c701
SHA512 6f4f0bb2ec640f0731a60395eca862c4630b18ed2ae239c67ac8c3b584942f14d2a6227051603e92027794d94af6edf9640fd2e7128d9fc8d28f3c694f906de3

C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\VVAFBZ3Q43KWRVE3U07F.temp

MD5 18187291505151954c8d44759d3c7e98
SHA1 5ba813ddb605f73db53d1d034eb1f19c1bb65bc9
SHA256 d22644b191f366a566318024c0713b15c1bd79e14fc572d24a976cee1932c701
SHA512 6f4f0bb2ec640f0731a60395eca862c4630b18ed2ae239c67ac8c3b584942f14d2a6227051603e92027794d94af6edf9640fd2e7128d9fc8d28f3c694f906de3

memory/2916-24518-0x000000001B100000-0x000000001B3E2000-memory.dmp

memory/2916-24519-0x00000000023F0000-0x00000000023F8000-memory.dmp

memory/2916-24520-0x0000000002300000-0x0000000002380000-memory.dmp

memory/2916-24521-0x0000000002300000-0x0000000002380000-memory.dmp

memory/2916-24522-0x0000000002300000-0x0000000002380000-memory.dmp

memory/2916-24524-0x0000000002300000-0x0000000002380000-memory.dmp

C:\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379

Analysis: behavioral2

Detonation Overview

Submitted

2023-03-16 09:24

Reported

2023-03-16 09:27

Platform

win10v2004-20230220-en

Max time kernel

62s

Max time network

132s

Command Line

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

Signatures

Avoslocker Ransomware

ransomware avoslocker

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\GrantOpen.crw => C:\Users\Admin\Pictures\GrantOpen.crw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\ConnectSkip.raw => C:\Users\Admin\Pictures\ConnectSkip.raw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\ExpandMount.crw => C:\Users\Admin\Pictures\ExpandMount.crw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\SelectConvertFrom.raw => C:\Users\Admin\Pictures\SelectConvertFrom.raw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\RequestSwitch.raw => C:\Users\Admin\Pictures\RequestSwitch.raw.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File renamed C:\Users\Admin\Pictures\ConfirmRemove.png => C:\Users\Admin\Pictures\ConfirmRemove.png.avos2 C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\cs-cz\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\ja-jp\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\pl-pl\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECLIPSE\THMBNAIL.PNG C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\css\main-selector.css C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\it-it\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-36.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ar\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\StoreLogo.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONENOTE.VisualElementsManifest.xml C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ja-jp\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ar-ae\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\sr\LC_MESSAGES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\tet\LC_MESSAGES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nb-no\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\sk-sk\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailMediumTile.scale-125.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxA-Outlook.scale-200.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\GADUGIB.TTF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\OriginResume.Dotx C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\pl-pl\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\sl-si\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\rename.svg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\PROOF\MSWDS_ES.LEX C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\ro-ro\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\eu-es\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\en-gb\locimages\offsymxl.ttf C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_fillandsign_18.svg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\et\LC_MESSAGES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-30_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailAppList.targetsize-96_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarAppList.targetsize-72_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\CAPSULES.INF C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Windows Photo Viewer\es-ES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\css\main.css C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\tr-tr\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Reference Assemblies\Microsoft\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_highcontrast.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGMN110.XML C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Trust Protection Lists\Mu\Fingerprinting C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\Other.DATA C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\ms.pak.DATA C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\ja-JP\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\LinkedInboxWideTile.scale-400.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\REFINED\REFINED.ELM C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.contrast-white_scale-180.png C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\fr-FR\InkObj.dll.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\delete.svg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Windows Defender\de-DE\OfflineScannerShell.exe.mui C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\es-es\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\ui-strings.js C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_sortedby_up_hover_18.svg C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000018\cardview\lib\native-common\assets\[email protected] C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\qu.pak.DATA C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\rsod\excelmui.msi.16.en-us.boot.tree.dat C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\fr-fr\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File opened for modification C:\Program Files\CompleteShow.DVR C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
File created C:\Program Files\Windows Media Player\it-IT\GET_YOUR_FILES_BACK.txt C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Opens file in notepad (likely ransom note)

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\NOTEPAD.EXE N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeTakeOwnershipPrivilege N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4868 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 3904 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 3772 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 3772 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 3904 wrote to memory of 3884 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3904 wrote to memory of 3884 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4868 wrote to memory of 3960 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 3960 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 1872 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 4868 wrote to memory of 1936 N/A C:\Users\Admin\AppData\Local\Temp\Roseland.exe C:\Windows\SYSTEM32\cmd.exe
PID 1936 wrote to memory of 3164 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 1936 wrote to memory of 3164 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
PID 3772 wrote to memory of 3908 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3772 wrote to memory of 3908 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3960 wrote to memory of 544 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3960 wrote to memory of 544 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1872 wrote to memory of 2548 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1872 wrote to memory of 2548 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\system32\bcdedit.exe

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\Roseland.exe

"C:\Users\Admin\AppData\Local\Temp\Roseland.exe"

C:\Windows\SYSTEM32\cmd.exe

cmd /c wmic shadowcopy delete /nointeractive

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete /nointeractive

C:\Windows\SYSTEM32\cmd.exe

cmd /c vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\SYSTEM32\cmd.exe

cmd /c powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\SYSTEM32\cmd.exe

cmd /c bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\SYSTEM32\cmd.exe

cmd /c bcdedit /set {default} recoveryenabled No

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -command "Get-EventLog -LogName * | ForEach { Clear-EventLog $_.Log }"

C:\Windows\system32\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled No

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe

powershell -Command "$a = [System.IO.File]::ReadAllText(\"C:\GET_YOUR_FILES_BACK.txt\");Add-Type -AssemblyName System.Drawing;$filename = \"$env:temp\$(Get-Random).png\";$bmp = new-object System.Drawing.Bitmap 1920,1080;$font = new-object System.Drawing.Font Consolas,10;$brushBg = [System.Drawing.Brushes]::Black;$brushFg = [System.Drawing.Brushes]::White;$format = [System.Drawing.StringFormat]::GenericDefault;$format.Alignment = [System.Drawing.StringAlignment]::Center;$format.LineAlignment = [System.Drawing.StringAlignment]::Center;$graphics = [System.Drawing.Graphics]::FromImage($bmp);$graphics.FillRectangle($brushBg,0,0,$bmp.Width,$bmp.Height);$graphics.DrawString($a,$font,$brushFg,[System.Drawing.RectangleF]::FromLTRB(0, 0, 1920, 1080),$format);$graphics.Dispose();$bmp.Save($filename);reg add \"HKEY_CURRENT_USER\Control Panel\Desktop\" /v Wallpaper /t REG_SZ /d $filename /f;Start-Sleep 1;rundll32.exe user32.dll, UpdatePerUserSystemParameters, 0, $false;"

C:\Windows\system32\reg.exe

"C:\Windows\system32\reg.exe" add "HKEY_CURRENT_USER\Control Panel\Desktop" /v Wallpaper /t REG_SZ /d C:\Users\Admin\AppData\Local\Temp\1866990087.png /f

C:\Windows\system32\rundll32.exe

"C:\Windows\system32\rundll32.exe" user32.dll UpdatePerUserSystemParameters 0 False

C:\Windows\system32\NOTEPAD.EXE

"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt

Network

Country Destination Domain Proto
US 8.8.8.8:53 226.101.242.52.in-addr.arpa udp
US 8.8.8.8:53 76.38.195.152.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 154.210.82.20.in-addr.arpa udp
US 8.8.8.8:53 139.238.32.23.in-addr.arpa udp
US 8.8.8.8:53 149.220.183.52.in-addr.arpa udp
US 8.8.8.8:53 33.146.190.20.in-addr.arpa udp
US 20.189.173.15:443 tcp
US 8.8.8.8:53 42.220.44.20.in-addr.arpa udp
US 204.79.197.203:80 tcp
US 8.247.210.254:80 tcp
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 62.13.109.52.in-addr.arpa udp
US 8.8.8.8:53 97.17.167.52.in-addr.arpa udp
US 8.8.8.8:53 199.176.139.52.in-addr.arpa udp
US 8.8.8.8:53 234.238.32.23.in-addr.arpa udp

Files

memory/3164-140-0x0000024CAFBE0000-0x0000024CAFC02000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_3ff2xkg2.55o.ps1

MD5 d17fe0a3f47be24a6453e9ef58c94641
SHA1 6ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA256 96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA512 5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

C:\Users\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379

memory/3164-157-0x0000024C94F10000-0x0000024C94F20000-memory.dmp

memory/3164-158-0x0000024C94F10000-0x0000024C94F20000-memory.dmp

memory/3164-159-0x0000024C94F10000-0x0000024C94F20000-memory.dmp

C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

MD5 6cf293cb4d80be23433eecf74ddb5503
SHA1 24fe4752df102c2ef492954d6b046cb5512ad408
SHA256 b1f292b6199aa29c7fafbca007e5f9e3f68edcbbca1965bc828cc92dc0f18bb8
SHA512 0f91e2da0da8794b9797c7b50eb5dfd27bde4546ceb6902a776664ce887dd6f12a0dd8773d612ccc76dfd029cd280778a0f0ae17ce679b3d2ffd968dd7e94a00

C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

MD5 a6c9d692ed2826ecb12c09356e69cc09
SHA1 def728a6138cf083d8a7c61337f3c9dade41a37f
SHA256 a07d329eb9b4105ba442c89f7cfa0d7b263f9f0617e26df93cf8cdc8dc94d57b
SHA512 2f27d2b241ce34f988c39e17ca5a1ebe628ac6c1b8ee8df121db9ad8929eaadf5f24ad66457591cccf87e60d2ba2eab88af860ab9c323a5c2a9867045d6e7ba3

C:\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379

memory/8344-24929-0x0000016874380000-0x0000016874390000-memory.dmp

memory/8344-24930-0x0000016874380000-0x0000016874390000-memory.dmp

C:\Users\Admin\Desktop\GET_YOUR_FILES_BACK.txt

MD5 6d81ed40ba0a283e5483bfe6a448e9d7
SHA1 0c847a5f9df743b13e1aa11b4c24a4309e9a7119
SHA256 b4464f61655ca584170694bedd52c6cff2b74c18a761b33cfb1387f017d2d57d
SHA512 8956415f155f24852ac672aa06cc6a8819a2a0e44a9b940f8f3390c34ebb43ff10f4635722f104a5a9a94098d3f286362f507dc49d3f048e540f48c073eaf379