Malware Analysis Report

2024-11-16 12:20

Sample ID 230715-ar5shshd8s
Target 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7
SHA256 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7
Tags
phobos evasion persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7

Threat Level: Known bad

The file 8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 was found to be: Known bad.

Malicious Activity Summary

phobos evasion persistence ransomware spyware stealer

Phobos

Modifies boot configuration data using bcdedit

Renames multiple (449) files with added filename extension

Deletes shadow copies

Modifies Windows Firewall

Deletes backup catalog

Drops startup file

Reads user/profile data of web browsers

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in Program Files directory

Unsigned PE

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Modifies registry class

Checks SCSI registry key(s)

Suspicious use of WriteProcessMemory

Suspicious use of AdjustPrivilegeToken

Uses Volume Shadow Copy service COM API

Interacts with shadow copies

Uses Task Scheduler COM API

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2023-07-15 00:27

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-07-15 00:27

Reported

2023-07-15 00:30

Platform

win10-20230703-en

Max time kernel

150s

Max time network

131s

Command Line

"C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (449) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 = "C:\\Users\\Admin\\AppData\\Local\\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe" C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000\Software\Microsoft\Windows\CurrentVersion\Run\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7 = "C:\\Users\\Admin\\AppData\\Local\\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe" C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu Places\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1766410430-2870137818-4067673745-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\5941_48x48x32.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\FA000000049\manifest.xml C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\osf\miniinfoblue_16x16x32.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\win-scrollbar\themes\dark\arrow-up.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Java\jdk1.8.0_66\jre\bin\java.exe.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libplaylist_plugin.dll C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.OneConnect_2.1701.277.0_x64__8wekyb3d8bbwe\Assets\contrast-black\OneConnectAppList.targetsize-40.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1702.333.0_x64__8wekyb3d8bbwe\Assets\TimerMedTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_link_18.svg.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\libaccess_realrtsp_plugin.dll C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Cartridges\as90.xsl.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office 15\ClientX64\OfficeClickToRun.exe.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Windows.Presentation.resources.dll C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.15.2003.0_x64__8wekyb3d8bbwe\resources.pri C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\icucnv58.dll.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\HomeBanner-4x.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365HomePremR_Subscription1-ul-oob.xrm-ms C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\Templates\1033\OriginReport.Dotx.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Windows Defender\ja-JP\MsMpResL.dll.mui C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\XboxApp.Telemetry\BIEvents.xml C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\It.ps1 C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\Outlook2019R_Grace-ppd.xrm-ms.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\SharpDXEngine\Rendering\Shaders\Builtin\HLSL\ConstantsPerFrame.fx C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\pt-br\ui-strings.js C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\7-Zip\Lang\mng.txt.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\check-mark-1x.png.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-48_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\Resources\1033\msmdsrvi.rll.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Assets\HowToPlay\Klondike\Tips_5.jpg C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\example_icons2x.png.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\WATER\PREVIEW.GIF.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL117.XML C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONDIRECTX.DLL C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.16112.11601.0_neutral_resources.scale-200_8wekyb3d8bbwe\Assets\SplashScreen.scale-200.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Place\LTR\contrast-black\SmallTile.scale-125.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Common AppData\Microsoft\OFFICE\DocumentRepository.ico C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\informix.xsl.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xe7cb.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Java\jdk1.8.0_66\jre\lib\psfont.properties.ja.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\VideoLAN\VLC\plugins\misc\liblogger_plugin.dll.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2017.125.40.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-16.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-black\GenericMailWideTile.scale-125.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1611.10393.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Place\LargeTile.scale-200.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Java\jre1.8.0_66\bin\ssv.dll C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdVL_MAK-ul-oob.xrm-ms.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\msvcr120.dll.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Java\jdk1.8.0_66\jre\lib\cmm\GRAY.pf C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MUOPTIN.DLL C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\4694_20x20x32.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\reviews_joined.gif.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\profiler\config\Modules\org-netbeans-lib-profiler-ui.xml.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\Fonts\private\DUBAI-MEDIUM.TTF C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_17.7906.42257.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Light.scale-200.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_25.25.13009.0_x64__8wekyb3d8bbwe\Generic.xbf C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\Locales\fil.pak.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_17.7668.58071.0_x64__8wekyb3d8bbwe\images\5311_24x24x32.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_3.14.1181.0_x64__8wekyb3d8bbwe\Arkadium.Win10.DailyChallenges\Assets\PrizeHistory\3_badges_gold.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_11.8.204.0_x64__kzf8qxf38zg5c\SkypeApp\Designs\Flags\large\mw_60x42.png C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\he-il\ui-strings.js C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\ADDINS\Power Map Excel Add-in\VISUALIZATIONDIRECTX.DLL.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File created C:\Program Files\Microsoft Office\root\Office16\Resources.pri.id[326C6384-3483].[[email protected]].8base C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Word2019VL_MAK_AE-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 C:\Windows\System32\vds.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1766410430-2870137818-4067673745-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3716 wrote to memory of 504 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\system32\cmd.exe
PID 3716 wrote to memory of 504 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\system32\cmd.exe
PID 3716 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\system32\cmd.exe
PID 3716 wrote to memory of 1252 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\system32\cmd.exe
PID 1252 wrote to memory of 4928 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1252 wrote to memory of 4928 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 504 wrote to memory of 1240 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 504 wrote to memory of 1240 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 504 wrote to memory of 832 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 504 wrote to memory of 832 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1252 wrote to memory of 580 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1252 wrote to memory of 580 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 504 wrote to memory of 4960 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 504 wrote to memory of 4960 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 504 wrote to memory of 372 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 504 wrote to memory of 372 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 504 wrote to memory of 3008 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 504 wrote to memory of 3008 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 3716 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 368 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 2544 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 32 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 32 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 32 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 2752 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\SysWOW64\mshta.exe
PID 3716 wrote to memory of 3512 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\system32\cmd.exe
PID 3716 wrote to memory of 3512 N/A C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe C:\Windows\system32\cmd.exe
PID 3512 wrote to memory of 1604 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3512 wrote to memory of 1604 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 3512 wrote to memory of 216 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3512 wrote to memory of 216 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 3512 wrote to memory of 3780 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3512 wrote to memory of 3780 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3512 wrote to memory of 4252 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3512 wrote to memory of 4252 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 3512 wrote to memory of 1800 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 3512 wrote to memory of 1800 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe

"C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe"

C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe

"C:\Users\Admin\AppData\Local\Temp\8879a7a950a3916f5438685f994ee829a20e4c60021db73060cd078e4a72b5a7.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

Country Destination Domain Proto
US 8.8.8.8:53 0.0.a.0.0.0.8.2.0.0.9.0.0.0.9.0.0.0.0.0.0.0.0.0.8.0.8.0.8.0.8.0.ip6.arpa udp
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 86.8.109.52.in-addr.arpa udp
US 8.8.8.8:53 38.148.119.40.in-addr.arpa udp
US 8.8.8.8:53 90.65.42.20.in-addr.arpa udp

Files

memory/3716-118-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/3716-119-0x0000000000730000-0x000000000073F000-memory.dmp

memory/3716-120-0x0000000000400000-0x00000000004E3000-memory.dmp

C:\Program Files\Common Files\microsoft shared\ClickToRun\AppvIsvSubsystems32.dll.id[326C6384-3483].[[email protected]].8base

MD5 46814e167b583c580f5141913461dc8e
SHA1 2e01c273b99b3bd12e98d4313a811201d92ee7b4
SHA256 9a854ba4465bca20086fe1ec6d3e2baaf90c3d90e3547215fb5cc9a11e47b716
SHA512 7758dcfcf8ca95f2dc329473e7f6cf46906947d0b9179bec052133c97561c2162dbf6aa7c06e7db776d3765139ebb45a15b192b204c71ce498d8e99f706fb3b7

memory/3716-625-0x00000000007F0000-0x00000000008F0000-memory.dmp

memory/3716-734-0x0000000000730000-0x000000000073F000-memory.dmp

memory/3716-735-0x0000000000400000-0x00000000004E3000-memory.dmp

memory/4604-736-0x0000000000810000-0x0000000000910000-memory.dmp

memory/4604-737-0x0000000000400000-0x00000000004E3000-memory.dmp

memory/3716-742-0x0000000000400000-0x00000000004E3000-memory.dmp

memory/3716-2567-0x0000000000400000-0x00000000004E3000-memory.dmp

memory/3716-4358-0x0000000000400000-0x00000000004E3000-memory.dmp

memory/3716-6270-0x0000000000400000-0x00000000004E3000-memory.dmp

memory/3716-9820-0x0000000000400000-0x00000000004E3000-memory.dmp

C:\info.hta

MD5 3cad80a08c2e88362c3ccda095a743b0
SHA1 0f0b691070e627d4340296ef4fb6f6f7fdb174ae
SHA256 61b5e612fc054a49918ca7c34b54f7558008fc23b6105da32162d8a3bc1b7394
SHA512 43ff8efc00727ab2731c037d5da3403748290d95927c5cd0ba44465605b2636715ff9423c2b9e101150a7e00abf6ab10e91a76d2b1012c0082c8976a7c41a4d9

C:\users\public\desktop\info.hta

MD5 3cad80a08c2e88362c3ccda095a743b0
SHA1 0f0b691070e627d4340296ef4fb6f6f7fdb174ae
SHA256 61b5e612fc054a49918ca7c34b54f7558008fc23b6105da32162d8a3bc1b7394
SHA512 43ff8efc00727ab2731c037d5da3403748290d95927c5cd0ba44465605b2636715ff9423c2b9e101150a7e00abf6ab10e91a76d2b1012c0082c8976a7c41a4d9

C:\Users\Admin\Desktop\info.hta

MD5 3cad80a08c2e88362c3ccda095a743b0
SHA1 0f0b691070e627d4340296ef4fb6f6f7fdb174ae
SHA256 61b5e612fc054a49918ca7c34b54f7558008fc23b6105da32162d8a3bc1b7394
SHA512 43ff8efc00727ab2731c037d5da3403748290d95927c5cd0ba44465605b2636715ff9423c2b9e101150a7e00abf6ab10e91a76d2b1012c0082c8976a7c41a4d9

C:\info.hta

MD5 3cad80a08c2e88362c3ccda095a743b0
SHA1 0f0b691070e627d4340296ef4fb6f6f7fdb174ae
SHA256 61b5e612fc054a49918ca7c34b54f7558008fc23b6105da32162d8a3bc1b7394
SHA512 43ff8efc00727ab2731c037d5da3403748290d95927c5cd0ba44465605b2636715ff9423c2b9e101150a7e00abf6ab10e91a76d2b1012c0082c8976a7c41a4d9

F:\info.hta

MD5 3cad80a08c2e88362c3ccda095a743b0
SHA1 0f0b691070e627d4340296ef4fb6f6f7fdb174ae
SHA256 61b5e612fc054a49918ca7c34b54f7558008fc23b6105da32162d8a3bc1b7394
SHA512 43ff8efc00727ab2731c037d5da3403748290d95927c5cd0ba44465605b2636715ff9423c2b9e101150a7e00abf6ab10e91a76d2b1012c0082c8976a7c41a4d9

memory/3716-12197-0x0000000000400000-0x00000000004E3000-memory.dmp