Analysis
-
max time kernel
134s -
max time network
149s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
05-03-2022 18:02
Static task
static1
Behavioral task
behavioral1
Sample
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe
Resource
win10v2004-en-20220113
General
-
Target
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe
-
Size
1.0MB
-
MD5
ca84fed65adf022bd0d2477ebcc2329f
-
SHA1
2cfa335779f1231f8df2f1de958dcefdfdd70a13
-
SHA256
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b
-
SHA512
0f6b92c1d5f2958ff3edeccfeb33c41237c2279a18f87105ce04e7657ee2043b555e9191335f01d3a09a9dd689bb16b3d6015a6ce17622177d9bf54a913fd928
Malware Config
Extracted
C:\README1.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README2.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README3.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README4.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README5.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README6.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README7.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README8.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README9.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Extracted
C:\README10.txt
http://cryptsen7fo43rr6.onion/
http://cryptsen7fo43rr6.onion.to/
http://cryptsen7fo43rr6.onion.cab/
Signatures
-
Troldesh, Shade, Encoder.858
Troldesh is a ransomware spread by malspam.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Processes:
resource yara_rule behavioral1/memory/780-57-0x0000000000400000-0x0000000000607000-memory.dmp upx behavioral1/memory/780-58-0x0000000000400000-0x0000000000607000-memory.dmp upx -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Software\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Subsystem = "\"C:\\ProgramData\\Windows\\csrss.exe\"" f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 13 whatismyipaddress.com -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2329389628-4064185017-3901522362-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Roaming\\01F1FB8E01F1FB8E.bmp" f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe -
Drops file in Program Files directory 64 IoCs
Processes:
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exedescription ioc process File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Travel\16_9-frame-highlight.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_moon-first-quarter_partly-cloudy.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_150.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Rectangles\NavigationUp_SelectionSubpicture.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_glass.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\en-US\currency.html f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\settings_left_disabled.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.rjmx_5.5.0.165303\icons\time-span-16.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\icons\file_obj.gif f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Circle_ButtonGraphic.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\de-DE\css\picturePuzzle.css f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\es-ES\css\calendar.css f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-api-caching.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-core-windows.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Performance\performance.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrenclm.dat f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\greenStateIcon.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\es-ES\js\settings.js f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\js\settings.js f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\MediaCenter.Gadget\flyout.html f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.feature_3.9.1.v20140827-1444\feature.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_frame-highlight.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_performance_Thumbnail.bmp f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Genko_1.emf f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscat.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\(120DPI)alertIcon.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Notebook.jpg f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-util-enumerations.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jvm.hprof.txt f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Shatter\NavigationLeft_SelectionSubpicture.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-image-mask.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\fr-FR\js\init.js f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-modules-appui.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.ssl.feature_1.0.0.v20140827-1444\feature.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\OldAge\NavigationLeft_ButtonGraphic.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\7-Zip\Lang\hr.txt f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\divider-vertical.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-jvm.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\css\e4_basestyle.css f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_rainy.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\27.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\drag.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\images\combo-hover-right.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\en-US\clock.html f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.feature_1.1.0.v20140827-1444\about.html f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\HueCycle\15x15dot.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Memories\16_9-frame-background.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsfra.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\js\slideShow.js f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-editor-mimelookup-impl.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\configuration\org.eclipse.update\platform.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\circleround_videoinset.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Cave_Drawings.gif f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-waxing-gibbous.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-modules-profiler-attach.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-modules-templates.xml f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\images\modern_m.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\VisualElements\Logo.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\FlipPage\NavigationUp_SelectionSubpicture.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_right_rest.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\localizedStrings.js f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\images\dial_lrg.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\docked_black_foggy.png f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1896 1200 WerFault.exe -
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 812 vssadmin.exe 1660 vssadmin.exe 1828 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exepid process 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 1100 vssvc.exe Token: SeRestorePrivilege 1100 vssvc.exe Token: SeAuditPrivilege 1100 vssvc.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exepid process 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.execmd.exedescription pid process target process PID 780 wrote to memory of 1660 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1660 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1660 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1660 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1828 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1828 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1828 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1828 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 812 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 812 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 812 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 812 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe vssadmin.exe PID 780 wrote to memory of 1104 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe cmd.exe PID 780 wrote to memory of 1104 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe cmd.exe PID 780 wrote to memory of 1104 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe cmd.exe PID 780 wrote to memory of 1104 780 f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe cmd.exe PID 1104 wrote to memory of 1728 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1728 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1728 1104 cmd.exe chcp.com PID 1104 wrote to memory of 1728 1104 cmd.exe chcp.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe"C:\Users\Admin\AppData\Local\Temp\f140cab283c35c92dc74db53b6d9964706538554d4151a637a406b093746692b.exe"1⤵
- Adds Run key to start application
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:1660
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1828
-
-
C:\Windows\system32\vssadmin.exeC:\Windows\system32\vssadmin.exe List Shadows2⤵
- Interacts with shadow copies
PID:812
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\chcp.comchcp3⤵PID:1728
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1200 -s 5921⤵
- Program crash
PID:1896