Malware Analysis Report

2025-06-15 20:11

Sample ID 230207-v6whlsch95
Target LBG32.exe
SHA256 b1e12d0216a946329fe549e09bf481d7df9e8e3bc3f99bc24d9940cbb8f76f06
Tags
lockbit ransomware
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

b1e12d0216a946329fe549e09bf481d7df9e8e3bc3f99bc24d9940cbb8f76f06

Threat Level: Known bad

The file LBG32.exe was found to be: Known bad.

Malicious Activity Summary

lockbit ransomware

Lockbit

Modifies extensions of user files

Drops desktop.ini file(s)

Drops file in Program Files directory

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

MITRE ATT&CK

N/A

Analysis: static1

Detonation Overview

Reported

2023-02-07 17:36

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-02-07 17:36

Reported

2023-02-07 17:37

Platform

win10v2004-20221111-en

Max time kernel

28s

Max time network

30s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LBG32.exe"

Signatures

Lockbit

ransomware lockbit

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\EnterRename.tiff => C:\Users\Admin\Pictures\EnterRename.tiff.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\PublishSet.raw => C:\Users\Admin\Pictures\PublishSet.raw.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\SyncDisable.crw => C:\Users\Admin\Pictures\SyncDisable.crw.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\TestSync.crw => C:\Users\Admin\Pictures\TestSync.crw.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\UseUndo.png => C:\Users\Admin\Pictures\UseUndo.png.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\CheckpointEnter.png => C:\Users\Admin\Pictures\CheckpointEnter.png.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\DismountCheckpoint.png => C:\Users\Admin\Pictures\DismountCheckpoint.png.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\EnterRename.tiff C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\NewSplit.png => C:\Users\Admin\Pictures\NewSplit.png.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\RemoveResize.png => C:\Users\Admin\Pictures\RemoveResize.png.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\StopDeny.tiff C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\StopDeny.tiff => C:\Users\Admin\Pictures\StopDeny.tiff.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\UndoCopy.tif => C:\Users\Admin\Pictures\UndoCopy.tif.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\offsymk.ttf C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WacLangPackEula.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\distribute_form.gif C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\COPYRIGHT C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\WordR_OEM_Perp-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\PROTTPLN.DOC C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\he\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_Grace-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Common Files\microsoft shared\Triedit\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogoSmall.scale-80.png C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL058.XML C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipshe.xml C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProDemoR_BypassTrial180-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\VisualElements_70.png C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\nn\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp2-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\rockbox_fm_presets.luac C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_MAK-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Common Files\microsoft shared\ink\sr-Latn-RS\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\net.properties C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\POWERPNT_F_COL.HXK C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\WINWORD_K_COL.HXK C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile.html C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\dt.jar C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\de.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Microsoft Office\PackageManifests\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial5-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioProVL_MAK-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Mozilla Firefox\defaults\pref\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Office 2007 - 2010.xml C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\FPA_f3\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\da.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins3d\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Common Files\System\Ole DB\fr-FR\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\bg\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioPro2019XC2RVL_MAKC2R-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Google\Update\Download\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Java\jre1.8.0_66\lib\cmm\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ms\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365ProPlusR_SubTrial1-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL093.XML C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MyriadPro-Regular.otf C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusDemoR_BypassTrial180-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription2-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalR_Retail-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PowerPoint2019R_Trial-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Extreme Shadow.eftx C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\FirstRunLogo.contrast-white_scale-140.png C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Windows NT C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessPipcR_OEM_Perp-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_Subscription2-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProVL_KMS_Client-ul.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019VL_KMS_Client_AE-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\lib\deploy\messages_es.properties C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\TellMePowerPoint.nrr C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\ff\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsen.xml C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookVL_KMS_Client-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PersonalPipcR_OEM_Perp-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\sqloledb.rll.mui C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3228 wrote to memory of 4320 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\SYSTEM32\cmd.exe
PID 3228 wrote to memory of 4320 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\SYSTEM32\cmd.exe
PID 4320 wrote to memory of 5020 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 4320 wrote to memory of 5020 N/A C:\Windows\SYSTEM32\cmd.exe C:\Windows\System32\wbem\WMIC.exe

Processes

C:\Users\Admin\AppData\Local\Temp\LBG32.exe

"C:\Users\Admin\AppData\Local\Temp\LBG32.exe"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SYSTEM32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F35FB671-1EC1-4105-8D0E-A7361B31BF47}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{F35FB671-1EC1-4105-8D0E-A7361B31BF47}'" delete

Network

Country Destination Domain Proto
N/A 10.127.0.1:445 tcp
N/A 10.127.0.16:445 tcp
N/A 10.127.0.30:445 tcp
N/A 10.127.0.42:445 tcp
N/A 10.127.0.19:445 tcp
N/A 10.127.0.31:445 tcp
N/A 10.127.0.28:445 tcp
N/A 10.127.0.24:445 tcp
N/A 10.127.0.50:445 tcp
N/A 10.127.0.4:445 tcp
N/A 10.127.0.6:445 tcp
N/A 10.127.0.66:445 tcp
N/A 10.127.0.60:445 tcp
N/A 10.127.0.36:445 tcp
N/A 10.127.0.38:445 tcp
N/A 10.127.0.64:445 tcp
N/A 10.127.0.65:445 tcp
N/A 10.127.0.56:445 tcp
N/A 10.127.0.63:445 tcp
N/A 10.127.0.59:445 tcp
N/A 10.127.0.0:445 tcp
N/A 10.127.0.7:445 tcp
N/A 10.127.0.34:445 tcp
N/A 10.127.0.8:445 tcp
N/A 10.127.0.14:445 tcp
N/A 10.127.0.22:445 tcp
N/A 10.127.0.23:445 tcp
N/A 10.127.0.17:445 tcp
N/A 10.127.0.25:445 tcp
N/A 10.127.0.37:445 tcp
N/A 10.127.0.41:445 tcp
N/A 10.127.0.3:445 tcp
N/A 10.127.0.13:445 tcp
N/A 10.127.0.40:445 tcp
N/A 10.127.0.52:445 tcp
N/A 10.127.0.12:445 tcp
N/A 10.127.0.54:445 tcp
N/A 10.127.0.127:445 tcp
N/A 10.127.0.2:445 tcp
N/A 10.127.0.5:445 tcp
N/A 10.127.0.9:445 tcp
N/A 10.127.0.10:445 tcp
N/A 10.127.0.11:445 tcp
N/A 10.127.0.15:445 tcp
N/A 10.127.0.18:445 tcp
N/A 10.127.0.20:445 tcp
N/A 10.127.0.21:445 tcp
N/A 10.127.0.26:445 tcp
N/A 10.127.0.27:445 tcp
N/A 10.127.0.29:445 tcp
N/A 10.127.0.32:445 tcp
N/A 10.127.0.33:445 tcp
N/A 10.127.0.35:445 tcp
N/A 10.127.0.39:445 tcp
N/A 10.127.0.43:445 tcp
N/A 10.127.0.44:445 tcp
N/A 10.127.0.45:445 tcp
N/A 10.127.0.46:445 tcp
N/A 10.127.0.47:445 tcp
N/A 10.127.0.48:445 tcp
N/A 10.127.0.49:445 tcp
N/A 10.127.0.51:445 tcp
N/A 10.127.0.53:445 tcp
N/A 10.127.0.55:445 tcp
N/A 10.127.0.57:445 tcp
N/A 10.127.0.58:445 tcp
N/A 10.127.0.61:445 tcp
N/A 10.127.0.62:445 tcp
N/A 10.127.0.67:445 tcp
N/A 10.127.0.68:445 tcp
N/A 10.127.0.69:445 tcp
N/A 10.127.0.70:445 tcp
N/A 10.127.0.71:445 tcp
N/A 10.127.0.72:445 tcp
N/A 10.127.0.73:445 tcp
N/A 10.127.0.74:445 tcp
N/A 10.127.0.75:445 tcp
N/A 10.127.0.76:445 tcp
N/A 10.127.0.77:445 tcp
N/A 10.127.0.78:445 tcp
N/A 10.127.0.79:445 tcp
N/A 10.127.0.80:445 tcp
N/A 10.127.0.81:445 tcp
N/A 10.127.0.82:445 tcp
N/A 10.127.0.83:445 tcp
N/A 10.127.0.84:445 tcp
N/A 10.127.0.85:445 tcp
N/A 10.127.0.86:445 tcp
N/A 10.127.0.87:445 tcp
N/A 10.127.0.88:445 tcp
N/A 10.127.0.89:445 tcp
N/A 10.127.0.90:445 tcp
N/A 10.127.0.91:445 tcp
N/A 10.127.0.92:445 tcp
N/A 10.127.0.93:445 tcp
N/A 10.127.0.94:445 tcp
N/A 10.127.0.95:445 tcp
N/A 10.127.0.96:445 tcp
N/A 10.127.0.97:445 tcp
N/A 10.127.0.98:445 tcp
N/A 10.127.0.99:445 tcp
N/A 10.127.0.100:445 tcp
N/A 10.127.0.101:445 tcp
N/A 10.127.0.102:445 tcp
N/A 10.127.0.103:445 tcp
N/A 10.127.0.104:445 tcp
N/A 10.127.0.105:445 tcp
N/A 10.127.0.106:445 tcp
N/A 10.127.0.107:445 tcp
N/A 10.127.0.108:445 tcp
N/A 10.127.0.109:445 tcp
N/A 10.127.0.110:445 tcp
N/A 10.127.0.111:445 tcp
N/A 10.127.0.112:445 tcp
N/A 10.127.0.113:445 tcp
N/A 10.127.0.114:445 tcp
N/A 10.127.0.115:445 tcp
N/A 10.127.0.116:445 tcp
N/A 10.127.0.117:445 tcp
N/A 10.127.0.118:445 tcp
N/A 10.127.0.119:445 tcp
N/A 10.127.0.120:445 tcp
N/A 10.127.0.121:445 tcp
N/A 10.127.0.122:445 tcp
N/A 10.127.0.123:445 tcp
N/A 10.127.0.124:445 tcp
N/A 10.127.0.125:445 tcp
N/A 10.127.0.126:445 tcp
N/A 10.127.0.128:445 tcp
N/A 10.127.0.129:445 tcp
N/A 10.127.0.130:445 tcp
N/A 10.127.0.131:445 tcp
N/A 10.127.0.132:445 tcp
N/A 10.127.0.133:445 tcp
N/A 10.127.0.134:445 tcp
N/A 10.127.0.135:445 tcp
N/A 10.127.0.136:445 tcp
N/A 10.127.0.137:445 tcp
N/A 10.127.0.138:445 tcp
N/A 10.127.0.139:445 tcp
N/A 10.127.0.140:445 tcp
N/A 10.127.0.141:445 tcp
N/A 10.127.0.142:445 tcp
N/A 10.127.0.143:445 tcp
N/A 10.127.0.144:445 tcp
N/A 10.127.0.145:445 tcp
N/A 10.127.0.146:445 tcp
N/A 10.127.0.147:445 tcp
N/A 10.127.0.148:445 tcp
N/A 10.127.0.149:445 tcp
N/A 10.127.0.150:445 tcp
N/A 10.127.0.151:445 tcp
N/A 10.127.0.152:445 tcp
N/A 10.127.0.153:445 tcp
N/A 10.127.0.154:445 tcp
N/A 10.127.0.155:445 tcp
N/A 10.127.0.156:445 tcp
N/A 10.127.0.157:445 tcp
N/A 10.127.0.158:445 tcp
N/A 10.127.0.159:445 tcp
N/A 10.127.0.160:445 tcp
N/A 10.127.0.161:445 tcp
N/A 10.127.0.162:445 tcp
N/A 10.127.0.163:445 tcp
N/A 10.127.0.164:445 tcp
N/A 10.127.0.165:445 tcp
N/A 10.127.0.166:445 tcp
N/A 10.127.0.167:445 tcp
N/A 10.127.0.168:445 tcp
N/A 10.127.0.169:445 tcp
N/A 10.127.0.170:445 tcp
N/A 10.127.0.171:445 tcp
N/A 10.127.0.172:445 tcp
N/A 10.127.0.173:445 tcp
N/A 10.127.0.174:445 tcp
N/A 10.127.0.175:445 tcp
N/A 10.127.0.176:445 tcp
N/A 10.127.0.177:445 tcp
N/A 10.127.0.178:445 tcp
N/A 10.127.0.179:445 tcp
N/A 10.127.0.180:445 tcp
N/A 10.127.0.181:445 tcp
N/A 10.127.0.182:445 tcp
N/A 10.127.0.183:445 tcp
N/A 10.127.0.184:445 tcp
N/A 10.127.0.185:445 tcp
N/A 10.127.0.186:445 tcp
N/A 10.127.0.187:445 tcp
N/A 10.127.0.188:445 tcp
N/A 10.127.0.189:445 tcp
N/A 10.127.0.190:445 tcp
N/A 10.127.0.191:445 tcp
N/A 10.127.0.192:445 tcp
N/A 10.127.0.193:445 tcp
N/A 10.127.0.194:445 tcp
N/A 10.127.0.195:445 tcp
N/A 10.127.0.196:445 tcp
N/A 10.127.0.197:445 tcp
N/A 10.127.0.198:445 tcp
N/A 10.127.0.199:445 tcp
N/A 10.127.0.200:445 tcp
N/A 10.127.0.201:445 tcp
N/A 10.127.0.202:445 tcp
N/A 10.127.0.203:445 tcp
N/A 10.127.0.204:445 tcp
N/A 10.127.0.205:445 tcp
N/A 10.127.0.206:445 tcp
N/A 10.127.0.207:445 tcp
N/A 10.127.0.208:445 tcp
N/A 10.127.0.209:445 tcp
N/A 10.127.0.210:445 tcp
N/A 10.127.0.211:445 tcp
N/A 10.127.0.212:445 tcp
N/A 10.127.0.213:445 tcp
N/A 10.127.0.214:445 tcp
N/A 10.127.0.215:445 tcp
N/A 10.127.0.216:445 tcp
N/A 10.127.0.217:445 tcp
N/A 10.127.0.218:445 tcp
N/A 10.127.0.219:445 tcp
N/A 10.127.0.220:445 tcp
N/A 10.127.0.221:445 tcp
N/A 10.127.0.222:445 tcp
N/A 10.127.0.223:445 tcp
N/A 10.127.0.224:445 tcp
N/A 10.127.0.225:445 tcp
N/A 10.127.0.226:445 tcp
N/A 10.127.0.227:445 tcp
N/A 10.127.0.228:445 tcp
N/A 10.127.0.229:445 tcp
N/A 10.127.0.230:445 tcp
N/A 10.127.0.231:445 tcp
N/A 10.127.0.232:445 tcp
N/A 10.127.0.233:445 tcp
N/A 10.127.0.234:445 tcp
N/A 10.127.0.235:445 tcp
N/A 10.127.0.236:445 tcp
N/A 10.127.0.237:445 tcp
N/A 10.127.0.238:445 tcp
N/A 10.127.0.239:445 tcp
N/A 10.127.0.240:445 tcp
N/A 10.127.0.241:445 tcp
N/A 10.127.0.242:445 tcp
N/A 10.127.0.243:445 tcp
N/A 10.127.0.244:445 tcp
N/A 10.127.0.245:445 tcp
N/A 10.127.0.246:445 tcp
N/A 10.127.0.247:445 tcp
N/A 10.127.0.248:445 tcp
N/A 10.127.0.249:445 tcp
N/A 10.127.0.250:445 tcp
N/A 10.127.0.251:445 tcp
N/A 10.127.0.252:445 tcp
N/A 10.127.0.253:445 tcp
N/A 10.127.0.254:445 tcp
US 209.197.3.8:80 tcp

Files

memory/4320-132-0x0000000000000000-mapping.dmp

memory/5020-133-0x0000000000000000-mapping.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2023-02-07 17:36

Reported

2023-02-07 17:37

Platform

win7-20220812-en

Max time kernel

32s

Max time network

19s

Command Line

"C:\Users\Admin\AppData\Local\Temp\LBG32.exe"

Signatures

Lockbit

ransomware lockbit

Modifies extensions of user files

ransomware
Description Indicator Process Target
File renamed C:\Users\Admin\Pictures\CompleteMount.tif => C:\Users\Admin\Pictures\CompleteMount.tif.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\DismountAssert.raw => C:\Users\Admin\Pictures\DismountAssert.raw.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\InvokeSync.raw => C:\Users\Admin\Pictures\InvokeSync.raw.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\RenameHide.png => C:\Users\Admin\Pictures\RenameHide.png.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\UnregisterSend.raw => C:\Users\Admin\Pictures\UnregisterSend.raw.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\BackupWait.tiff C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\BackupWait.tiff => C:\Users\Admin\Pictures\BackupWait.tiff.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File renamed C:\Users\Admin\Pictures\ClosePop.tif => C:\Users\Admin\Pictures\ClosePop.tif.a989f46d C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Admin\Saved Games\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jdk1.7.0_80\release C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Median.thmx C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198025.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00014_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Essential.eftx C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Foundry.eftx C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\va.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\VBAOWS10.CHM C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\TALK21.COM.XML C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0195812.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01330_.GIF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Java\jre7\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107426.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0187895.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PARNT_10.MID C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0152688.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA00452_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\NVBELL.NET.XML C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGCAL.DPV C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01299_.GIF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0335112.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\RPLBRF35.CHM C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\CATWIZ11.POC C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY00792_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hwrfrash.dat C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.htm C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0195788.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01236U.BMP C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PSRCHLEX.DAT C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\WEBPAGE.DPV C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Microsoft Games\Purble Place\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0202045.JPG C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01566_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0298653.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0200383.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN01216_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099200.GIF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107266.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Microsoft Games\Solitaire\es-ES\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\XML2WORD.XSL C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105272.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107182.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0153265.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL011.XML C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\EMAILMOD.POC C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Microsoft Games\Mahjong\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files\Common Files\System\en-US\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01785_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Microsoft.NET\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01237_.GIF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0106146.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\fr.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Black Tie.eftx C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Microsoft Synchronization Services\ADO.NET\v1.0\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00012_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\STORYBB.DPV C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO01560_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099155.JPG C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107024.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL01565_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Mozilla Maintenance Service\logs\maintenanceservice-install.log C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Library\!!!-Restore-My-Files-!!!.txt C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD00160_.WMF C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1392 wrote to memory of 856 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 856 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 856 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 856 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 856 wrote to memory of 1164 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 856 wrote to memory of 1164 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 856 wrote to memory of 1164 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1144 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1144 wrote to memory of 788 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1144 wrote to memory of 788 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1144 wrote to memory of 788 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 536 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 536 wrote to memory of 360 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 536 wrote to memory of 360 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 536 wrote to memory of 360 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 304 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 304 wrote to memory of 812 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 304 wrote to memory of 812 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 304 wrote to memory of 812 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1636 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1636 wrote to memory of 1944 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1636 wrote to memory of 1944 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1636 wrote to memory of 1944 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1496 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1496 wrote to memory of 1172 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1496 wrote to memory of 1172 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1496 wrote to memory of 1172 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1324 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1860 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1860 wrote to memory of 856 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1860 wrote to memory of 856 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1860 wrote to memory of 856 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1580 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1580 wrote to memory of 272 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1580 wrote to memory of 272 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1580 wrote to memory of 272 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\wbem\WMIC.exe
PID 1392 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe
PID 1392 wrote to memory of 1132 N/A C:\Users\Admin\AppData\Local\Temp\LBG32.exe C:\Windows\system32\cmd.exe

Processes

C:\Users\Admin\AppData\Local\Temp\LBG32.exe

"C:\Users\Admin\AppData\Local\Temp\LBG32.exe"

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{38F4F273-FD4E-40EE-A757-A0C4931FC7F9}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{38F4F273-FD4E-40EE-A757-A0C4931FC7F9}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{73136CA1-40E5-44A4-ACB1-1A381327A180}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{73136CA1-40E5-44A4-ACB1-1A381327A180}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5EA5ECFC-D39D-4BAD-AC73-64FFF00D3BA9}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{5EA5ECFC-D39D-4BAD-AC73-64FFF00D3BA9}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{46F85264-C264-422A-88E8-1CD66A062AA8}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{46F85264-C264-422A-88E8-1CD66A062AA8}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E4B344C6-B590-45A1-A54B-DC4FC8A495EF}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{E4B344C6-B590-45A1-A54B-DC4FC8A495EF}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0B869F6C-1033-47AA-B556-805661309D98}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0B869F6C-1033-47AA-B556-805661309D98}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7F8063EB-8604-4FF4-AE6D-251209D63015}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7F8063EB-8604-4FF4-AE6D-251209D63015}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7FA0A99A-B76E-49F4-B158-A987EFAFE27D}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7FA0A99A-B76E-49F4-B158-A987EFAFE27D}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{88E37423-C82B-4EF4-B3FF-A2B73329B9F7}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{88E37423-C82B-4EF4-B3FF-A2B73329B9F7}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{008F9625-DDC3-4066-B788-49FC3657C4F6}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{008F9625-DDC3-4066-B788-49FC3657C4F6}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{97F00D85-BC71-4949-8703-1062C6D34D5C}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{97F00D85-BC71-4949-8703-1062C6D34D5C}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{53305AF2-5F9F-4D3C-8609-14DCE07400B8}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{53305AF2-5F9F-4D3C-8609-14DCE07400B8}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7DF6716E-9291-4F53-8EDA-9EBD48C35B06}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{7DF6716E-9291-4F53-8EDA-9EBD48C35B06}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{05D90694-70D7-4B6F-952F-C0123300DC18}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{05D90694-70D7-4B6F-952F-C0123300DC18}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1228787B-7BC4-4AA4-B53B-B657444EA523}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1228787B-7BC4-4AA4-B53B-B657444EA523}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1FF18028-010B-4686-87FE-19F7C952B49A}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{1FF18028-010B-4686-87FE-19F7C952B49A}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0D947DC8-B3AF-433F-9761-1C6E86ECC81D}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{0D947DC8-B3AF-433F-9761-1C6E86ECC81D}'" delete

C:\Windows\system32\cmd.exe

cmd.exe /c C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9856A742-F496-4BA5-9F17-06D883495F22}'" delete

C:\Windows\System32\wbem\WMIC.exe

C:\Windows\System32\wbem\WMIC.exe shadowcopy where "ID='{9856A742-F496-4BA5-9F17-06D883495F22}'" delete

Network

Country Destination Domain Proto
N/A 10.127.0.1:445 tcp
N/A 10.127.0.27:445 tcp
N/A 10.127.0.42:445 tcp
N/A 10.127.0.45:445 tcp
N/A 10.127.0.63:445 tcp
N/A 10.127.0.16:445 tcp
N/A 10.127.0.48:445 tcp
N/A 10.127.0.51:445 tcp
N/A 10.127.0.37:445 tcp
N/A 10.127.0.40:445 tcp
N/A 10.127.0.242:445 tcp
N/A 10.127.0.50:445 tcp
N/A 10.127.0.32:445 tcp
N/A 10.127.0.36:445 tcp
N/A 10.127.0.13:445 tcp
N/A 10.127.0.59:445 tcp
N/A 10.127.0.2:445 tcp
N/A 10.127.0.38:445 tcp
N/A 10.127.0.33:445 tcp
N/A 10.127.0.46:445 tcp
N/A 10.127.0.67:445 tcp
N/A 10.127.0.3:445 tcp
N/A 10.127.0.8:445 tcp
N/A 10.127.0.55:445 tcp
N/A 10.127.0.66:445 tcp
N/A 10.127.0.26:445 tcp
N/A 10.127.0.41:445 tcp
N/A 10.127.0.18:445 tcp
N/A 10.127.0.57:445 tcp
N/A 10.127.0.7:445 tcp
N/A 10.127.0.19:445 tcp
N/A 10.127.0.5:445 tcp
N/A 10.127.0.12:445 tcp
N/A 10.127.0.20:445 tcp
N/A 10.127.0.58:445 tcp
N/A 10.127.0.15:445 tcp
N/A 10.127.0.9:445 tcp
N/A 10.127.0.17:445 tcp
N/A 10.127.0.30:445 tcp
N/A 10.127.0.35:445 tcp
N/A 10.127.0.52:445 tcp
N/A 10.127.0.241:445 tcp
N/A 10.127.0.44:445 tcp
N/A 10.127.0.14:445 tcp
N/A 10.127.0.53:445 tcp
N/A 10.127.0.65:445 tcp
N/A 10.127.0.23:445 tcp
N/A 10.127.0.31:445 tcp
N/A 10.127.0.60:445 tcp
N/A 10.127.0.11:445 tcp
N/A 10.127.0.49:445 tcp
N/A 10.127.0.10:445 tcp
N/A 10.127.0.61:445 tcp
N/A 10.127.0.6:445 tcp
N/A 10.127.0.43:445 tcp
N/A 10.127.0.102:445 tcp
N/A 10.127.0.56:445 tcp
N/A 10.127.0.78:445 tcp
N/A 10.127.0.97:445 tcp
N/A 10.127.0.24:445 tcp
N/A 10.127.0.135:445 tcp
N/A 10.127.0.64:445 tcp
N/A 10.127.0.21:445 tcp
N/A 10.127.0.73:445 tcp
N/A 10.127.0.4:445 tcp
N/A 10.127.0.240:445 tcp
N/A 10.127.0.77:445 tcp
N/A 10.127.0.0:445 tcp
N/A 10.127.0.22:445 tcp
N/A 10.127.0.25:445 tcp
N/A 10.127.0.28:445 tcp
N/A 10.127.0.29:445 tcp
N/A 10.127.0.34:445 tcp
N/A 10.127.0.39:445 tcp
N/A 10.127.0.47:445 tcp
N/A 10.127.0.54:445 tcp
N/A 10.127.0.62:445 tcp
N/A 10.127.0.68:445 tcp
N/A 10.127.0.69:445 tcp
N/A 10.127.0.70:445 tcp
N/A 10.127.0.71:445 tcp
N/A 10.127.0.72:445 tcp
N/A 10.127.0.74:445 tcp
N/A 10.127.0.75:445 tcp
N/A 10.127.0.76:445 tcp
N/A 10.127.0.79:445 tcp
N/A 10.127.0.80:445 tcp
N/A 10.127.0.81:445 tcp
N/A 10.127.0.82:445 tcp
N/A 10.127.0.83:445 tcp
N/A 10.127.0.84:445 tcp
N/A 10.127.0.85:445 tcp
N/A 10.127.0.86:445 tcp
N/A 10.127.0.87:445 tcp
N/A 10.127.0.88:445 tcp
N/A 10.127.0.89:445 tcp
N/A 10.127.0.90:445 tcp
N/A 10.127.0.91:445 tcp
N/A 10.127.0.92:445 tcp
N/A 10.127.0.93:445 tcp
N/A 10.127.0.94:445 tcp
N/A 10.127.0.95:445 tcp
N/A 10.127.0.96:445 tcp
N/A 10.127.0.98:445 tcp
N/A 10.127.0.99:445 tcp
N/A 10.127.0.100:445 tcp
N/A 10.127.0.101:445 tcp
N/A 10.127.0.103:445 tcp
N/A 10.127.0.104:445 tcp
N/A 10.127.0.105:445 tcp
N/A 10.127.0.106:445 tcp
N/A 10.127.0.107:445 tcp
N/A 10.127.0.108:445 tcp
N/A 10.127.0.109:445 tcp
N/A 10.127.0.110:445 tcp
N/A 10.127.0.111:445 tcp
N/A 10.127.0.112:445 tcp
N/A 10.127.0.113:445 tcp
N/A 10.127.0.114:445 tcp
N/A 10.127.0.115:445 tcp
N/A 10.127.0.116:445 tcp
N/A 10.127.0.117:445 tcp
N/A 10.127.0.118:445 tcp
N/A 10.127.0.119:445 tcp
N/A 10.127.0.120:445 tcp
N/A 10.127.0.121:445 tcp
N/A 10.127.0.122:445 tcp
N/A 10.127.0.123:445 tcp
N/A 10.127.0.124:445 tcp
N/A 10.127.0.125:445 tcp
N/A 10.127.0.126:445 tcp
N/A 10.127.0.127:445 tcp
N/A 10.127.0.128:445 tcp
N/A 10.127.0.129:445 tcp
N/A 10.127.0.130:445 tcp
N/A 10.127.0.131:445 tcp
N/A 10.127.0.132:445 tcp
N/A 10.127.0.133:445 tcp
N/A 10.127.0.134:445 tcp
N/A 10.127.0.136:445 tcp
N/A 10.127.0.137:445 tcp
N/A 10.127.0.138:445 tcp
N/A 10.127.0.139:445 tcp
N/A 10.127.0.140:445 tcp
N/A 10.127.0.141:445 tcp
N/A 10.127.0.142:445 tcp
N/A 10.127.0.143:445 tcp
N/A 10.127.0.144:445 tcp
N/A 10.127.0.145:445 tcp
N/A 10.127.0.146:445 tcp
N/A 10.127.0.147:445 tcp
N/A 10.127.0.148:445 tcp
N/A 10.127.0.149:445 tcp
N/A 10.127.0.150:445 tcp
N/A 10.127.0.151:445 tcp
N/A 10.127.0.152:445 tcp
N/A 10.127.0.153:445 tcp
N/A 10.127.0.154:445 tcp
N/A 10.127.0.155:445 tcp
N/A 10.127.0.156:445 tcp
N/A 10.127.0.157:445 tcp
N/A 10.127.0.158:445 tcp
N/A 10.127.0.159:445 tcp
N/A 10.127.0.160:445 tcp
N/A 10.127.0.161:445 tcp
N/A 10.127.0.162:445 tcp
N/A 10.127.0.163:445 tcp
N/A 10.127.0.164:445 tcp
N/A 10.127.0.165:445 tcp
N/A 10.127.0.166:445 tcp
N/A 10.127.0.167:445 tcp
N/A 10.127.0.168:445 tcp
N/A 10.127.0.169:445 tcp
N/A 10.127.0.170:445 tcp
N/A 10.127.0.171:445 tcp
N/A 10.127.0.172:445 tcp
N/A 10.127.0.173:445 tcp
N/A 10.127.0.174:445 tcp
N/A 10.127.0.175:445 tcp
N/A 10.127.0.176:445 tcp
N/A 10.127.0.177:445 tcp
N/A 10.127.0.178:445 tcp
N/A 10.127.0.179:445 tcp
N/A 10.127.0.180:445 tcp
N/A 10.127.0.181:445 tcp
N/A 10.127.0.182:445 tcp
N/A 10.127.0.183:445 tcp
N/A 10.127.0.184:445 tcp
N/A 10.127.0.185:445 tcp
N/A 10.127.0.186:445 tcp
N/A 10.127.0.187:445 tcp
N/A 10.127.0.188:445 tcp
N/A 10.127.0.189:445 tcp
N/A 10.127.0.190:445 tcp
N/A 10.127.0.191:445 tcp
N/A 10.127.0.192:445 tcp
N/A 10.127.0.193:445 tcp
N/A 10.127.0.194:445 tcp
N/A 10.127.0.195:445 tcp
N/A 10.127.0.196:445 tcp
N/A 10.127.0.197:445 tcp
N/A 10.127.0.198:445 tcp
N/A 10.127.0.199:445 tcp
N/A 10.127.0.200:445 tcp
N/A 10.127.0.201:445 tcp
N/A 10.127.0.202:445 tcp
N/A 10.127.0.203:445 tcp
N/A 10.127.0.204:445 tcp
N/A 10.127.0.205:445 tcp
N/A 10.127.0.206:445 tcp
N/A 10.127.0.207:445 tcp
N/A 10.127.0.208:445 tcp
N/A 10.127.0.209:445 tcp
N/A 10.127.0.210:445 tcp
N/A 10.127.0.211:445 tcp
N/A 10.127.0.212:445 tcp
N/A 10.127.0.213:445 tcp
N/A 10.127.0.214:445 tcp
N/A 10.127.0.215:445 tcp
N/A 10.127.0.216:445 tcp
N/A 10.127.0.217:445 tcp
N/A 10.127.0.218:445 tcp
N/A 10.127.0.219:445 tcp
N/A 10.127.0.220:445 tcp
N/A 10.127.0.221:445 tcp
N/A 10.127.0.222:445 tcp
N/A 10.127.0.223:445 tcp
N/A 10.127.0.224:445 tcp
N/A 10.127.0.225:445 tcp
N/A 10.127.0.226:445 tcp
N/A 10.127.0.227:445 tcp
N/A 10.127.0.228:445 tcp
N/A 10.127.0.229:445 tcp
N/A 10.127.0.230:445 tcp
N/A 10.127.0.231:445 tcp
N/A 10.127.0.232:445 tcp
N/A 10.127.0.233:445 tcp
N/A 10.127.0.234:445 tcp
N/A 10.127.0.235:445 tcp
N/A 10.127.0.236:445 tcp
N/A 10.127.0.237:445 tcp
N/A 10.127.0.238:445 tcp
N/A 10.127.0.239:445 tcp
N/A 10.127.0.243:445 tcp
N/A 10.127.0.244:445 tcp
N/A 10.127.0.245:445 tcp
N/A 10.127.0.246:445 tcp
N/A 10.127.0.247:445 tcp
N/A 10.127.0.248:445 tcp
N/A 10.127.0.249:445 tcp
N/A 10.127.0.250:445 tcp
N/A 10.127.0.251:445 tcp
N/A 10.127.0.252:445 tcp
N/A 10.127.0.253:445 tcp
N/A 10.127.0.254:445 tcp

Files

memory/1392-54-0x0000000075521000-0x0000000075523000-memory.dmp

memory/856-55-0x0000000000000000-mapping.dmp

memory/1164-56-0x0000000000000000-mapping.dmp

memory/1144-57-0x0000000000000000-mapping.dmp

memory/788-58-0x0000000000000000-mapping.dmp

memory/536-59-0x0000000000000000-mapping.dmp

memory/360-60-0x0000000000000000-mapping.dmp

memory/304-61-0x0000000000000000-mapping.dmp

memory/812-62-0x0000000000000000-mapping.dmp

memory/1636-63-0x0000000000000000-mapping.dmp

memory/1944-64-0x0000000000000000-mapping.dmp

memory/1496-65-0x0000000000000000-mapping.dmp

memory/1172-66-0x0000000000000000-mapping.dmp

memory/1324-67-0x0000000000000000-mapping.dmp

memory/1860-68-0x0000000000000000-mapping.dmp

memory/856-69-0x0000000000000000-mapping.dmp

memory/1580-70-0x0000000000000000-mapping.dmp

memory/272-71-0x0000000000000000-mapping.dmp

memory/1132-72-0x0000000000000000-mapping.dmp

memory/1224-73-0x0000000000000000-mapping.dmp

memory/592-74-0x0000000000000000-mapping.dmp

memory/1088-75-0x0000000000000000-mapping.dmp

memory/1556-76-0x0000000000000000-mapping.dmp

memory/1112-77-0x0000000000000000-mapping.dmp

memory/2008-78-0x0000000000000000-mapping.dmp

memory/944-79-0x0000000000000000-mapping.dmp

memory/736-80-0x0000000000000000-mapping.dmp

memory/1916-81-0x0000000000000000-mapping.dmp

memory/584-82-0x0000000000000000-mapping.dmp

memory/292-83-0x0000000000000000-mapping.dmp

memory/276-84-0x0000000000000000-mapping.dmp

memory/1952-85-0x0000000000000000-mapping.dmp

memory/268-86-0x0000000000000000-mapping.dmp

memory/1964-87-0x0000000000000000-mapping.dmp

memory/392-88-0x0000000000000000-mapping.dmp

memory/1736-89-0x0000000000000000-mapping.dmp