Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
06/09/2023, 03:10
Static task
static1
Behavioral task
behavioral1
Sample
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe
Resource
win10v2004-20230831-en
General
-
Target
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe
-
Size
146KB
-
MD5
059175be5681a633190cd9631e2975f6
-
SHA1
fb4ad5d21f0d8c6755eb4addba0ac288bd2574b6
-
SHA256
d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666
-
SHA512
3a6c7667161ad9122785b6ef988d59f473b517e32e93c786c6a551d4c631f0ca82de1d262a056928935f05aa6723a7fe983158011e53042743194899c3e912e7
-
SSDEEP
3072:sdjFOoTVq4m0zRilymyU3pQuz1T5SKiVi6:4M2ZmEoL3Cu6K
Malware Config
Extracted
C:\Program Files\7-Zip\!!readme!!!.txt
http://undgrddapc4reaunnrdrmnagvdelqfvmgycuvilgwb5uxm25sxawaoqd.onion/
Signatures
-
Clears Windows event logs 1 TTPs 64 IoCs
pid Process 2028 wevtutil.exe 840 wevtutil.exe 3000 wevtutil.exe 2480 wevtutil.exe 2560 wevtutil.exe 440 wevtutil.exe 2304 wevtutil.exe 1828 wevtutil.exe 2556 wevtutil.exe 2496 wevtutil.exe 1984 wevtutil.exe 1884 wevtutil.exe 2664 wevtutil.exe 1968 wevtutil.exe 2208 wevtutil.exe 2964 wevtutil.exe 2532 wevtutil.exe 1068 wevtutil.exe 2700 wevtutil.exe 2280 wevtutil.exe 1728 wevtutil.exe 536 wevtutil.exe 2584 wevtutil.exe 596 wevtutil.exe 2784 wevtutil.exe 1768 wevtutil.exe 2548 wevtutil.exe 284 wevtutil.exe 2592 wevtutil.exe 1632 wevtutil.exe 584 wevtutil.exe 2124 wevtutil.exe 2164 wevtutil.exe 1324 wevtutil.exe 1428 wevtutil.exe 908 wevtutil.exe 2260 wevtutil.exe 560 wevtutil.exe 1972 wevtutil.exe 1564 wevtutil.exe 956 wevtutil.exe 900 wevtutil.exe 1692 wevtutil.exe 1916 wevtutil.exe 536 wevtutil.exe 956 wevtutil.exe 1376 wevtutil.exe 2836 wevtutil.exe 2992 wevtutil.exe 940 wevtutil.exe 1120 wevtutil.exe 2540 wevtutil.exe 1956 wevtutil.exe 2460 wevtutil.exe 1068 wevtutil.exe 1156 wevtutil.exe 2084 wevtutil.exe 2596 wevtutil.exe 2276 wevtutil.exe 1960 wevtutil.exe 1892 wevtutil.exe 588 wevtutil.exe 2104 wevtutil.exe 3040 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Deletes itself 1 IoCs
pid Process 2140 cmd.exe -
Drops desktop.ini file(s) 40 IoCs
description ioc Process File opened for modification \??\c:\program files\common files\microsoft shared\stationery\Desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\freecell\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\music\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\music\sample music\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\pictures\sample pictures\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\videos\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\videos\sample videos\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\purble place\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\searches\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\f:\$recycle.bin\s-1-5-21-3849525425-30183055-657688904-1000\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\solitaire\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\spidersolitaire\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\pictures\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\$recycle.bin\s-1-5-21-3849525425-30183055-657688904-1000\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\stationery\Desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\dataservices\DESKTOP.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\favorites\links for united states\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\links\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\downloads\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\desktop\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\hearts\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\documents\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\music\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\documents\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\libraries\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\mahjong\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\contacts\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\recorded tv\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\microsoft games\chess\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\admin\videos\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\users\public\recorded tv\sample media\desktop.ini d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification \??\c:\program files (x86)\msbuild\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\dvd maker\shared\dvdstyles\scene_button_style_default_Thumbnail.bmp d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-execution_ja.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\visualvm\config\modules\org-netbeans-core-io-ui.xml_hidden d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\common files\system\msadc\fr-fr\msadcer.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0145707.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0341499.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File created \??\c:\program files (x86)\common files\microsoft shared\office14\cultures\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\common files\system\ole db\ja-jp\oledb32r.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\zi\europe\Helsinki d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\windows sidebar\gadgets\slideshow.gadget\it-it\gadget.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\document themes 14\theme colors\Essential.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.jface_3.10.1.v20140813-1009.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\SO00152_.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms5\rtf_alignleft.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows photo viewer\fr-fr\ImagingDevices.exe.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.e4.rcp_1.3.100.v20141007-2033\feature.properties d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-heapdump_ja.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\NA02092_.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\PH02810J.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\pubspapr\ZPDIR34F.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\outlookautodiscover\YAHOO.COM.HK.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\pubwiz\BIZCARD.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\de-de\tipresx.dll.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\platform\modules\org-netbeans-modules-sampler.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\videolan\vlc\lua\playlist\cue.luac d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\adobe\reader 9.0\resource\linguistics\providers\proximity\11.00\brt04.hsp d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\document themes 14\theme effects\Newsprint.eftx d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\media\cagcat10\J0281904.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\pubspapr\PDIR32F.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\common files\microsoft shared\ink\ipssve.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\lib\zi\asia\Srednekolymsk d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\rt.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0075478.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\clock.gadget\es-es\settings.html d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\media\office14\autoshap\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\dvd maker\shared\dvdstyles\huecycle\NavigationLeft_SelectionSubpicture.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.filesystem_1.4.100.v20140514-1614.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0234376.wmf d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\common files\microsoft shared\themes14\refined\PREVIEW.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\J0313974.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\GRINTL32.REST.idx_dll d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\ONGuide.onepkg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\quickstyles\Distinctive.dotx d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\toolicons\SessionMember.ico d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows media player\it-it\setup_wm.exe.mui d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\proof\MSHY7ES.lex d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jre7\lib\content-types.properties d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File created \??\c:\program files\java\jre7\lib\zi\america\argentina\!!readme!!!.txt d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\clipart\pub60cor\PH02028K.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\OUTLOOK.hxs d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\pubftscm\SCHEME50.css d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\groove\tooldata\groove.net\grooveforms\fieldtypepreview\TEXTAREA.jpg d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\outlookautodiscover\SBCGLOBAL.NET.xml d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\pubwiz\TEAROFF.poc d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench3.nl_ja_4.4.0.v20140623020002.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\lib\zi\america\indiana\Knox d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\jre\lib\zi\WET d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\visualvm\platform\modules\locale\org-openide-nodes_ja.jar d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\videolan\vlc\lua\http\images\speaker-32.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\microsoft office\office14\1033\grooveforms5\formsstyles\lime\TAB_OFF.gif d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\picturepuzzle.gadget\images\settings_box_divider_right.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files (x86)\windows sidebar\gadgets\weather.gadget\images\docked_gray_foggy.png d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe File opened for modification \??\c:\program files\java\jdk1.7.0_80\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileregistry\jmc.profile\1423861240389.profile.gz d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 284 vssadmin.exe 1744 vssadmin.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1380 reg.exe 2312 reg.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeBackupPrivilege 2716 vssvc.exe Token: SeRestorePrivilege 2716 vssvc.exe Token: SeAuditPrivilege 2716 vssvc.exe Token: SeSecurityPrivilege 1676 wevtutil.exe Token: SeBackupPrivilege 1676 wevtutil.exe Token: SeSecurityPrivilege 1252 wevtutil.exe Token: SeBackupPrivilege 1252 wevtutil.exe Token: SeSecurityPrivilege 596 wevtutil.exe Token: SeBackupPrivilege 596 wevtutil.exe Token: SeSecurityPrivilege 1728 wevtutil.exe Token: SeBackupPrivilege 1728 wevtutil.exe Token: SeSecurityPrivilege 1736 wevtutil.exe Token: SeBackupPrivilege 1736 wevtutil.exe Token: SeSecurityPrivilege 912 wevtutil.exe Token: SeBackupPrivilege 912 wevtutil.exe Token: SeSecurityPrivilege 2668 wevtutil.exe Token: SeBackupPrivilege 2668 wevtutil.exe Token: SeSecurityPrivilege 2676 wevtutil.exe Token: SeBackupPrivilege 2676 wevtutil.exe Token: SeSecurityPrivilege 2784 wevtutil.exe Token: SeBackupPrivilege 2784 wevtutil.exe Token: SeSecurityPrivilege 2280 wevtutil.exe Token: SeBackupPrivilege 2280 wevtutil.exe Token: SeSecurityPrivilege 2224 wevtutil.exe Token: SeBackupPrivilege 2224 wevtutil.exe Token: SeSecurityPrivilege 2664 wevtutil.exe Token: SeBackupPrivilege 2664 wevtutil.exe Token: SeSecurityPrivilege 440 wevtutil.exe Token: SeBackupPrivilege 440 wevtutil.exe Token: SeSecurityPrivilege 584 wevtutil.exe Token: SeBackupPrivilege 584 wevtutil.exe Token: SeSecurityPrivilege 1116 wevtutil.exe Token: SeBackupPrivilege 1116 wevtutil.exe Token: SeSecurityPrivilege 2532 wevtutil.exe Token: SeBackupPrivilege 2532 wevtutil.exe Token: SeSecurityPrivilege 700 wevtutil.exe Token: SeBackupPrivilege 700 wevtutil.exe Token: SeSecurityPrivilege 604 wevtutil.exe Token: SeBackupPrivilege 604 wevtutil.exe Token: SeSecurityPrivilege 1892 wevtutil.exe Token: SeBackupPrivilege 1892 wevtutil.exe Token: SeSecurityPrivilege 1768 wevtutil.exe Token: SeBackupPrivilege 1768 wevtutil.exe Token: SeSecurityPrivilege 536 wevtutil.exe Token: SeBackupPrivilege 536 wevtutil.exe Token: SeSecurityPrivilege 1236 wevtutil.exe Token: SeBackupPrivilege 1236 wevtutil.exe Token: SeSecurityPrivilege 1376 wevtutil.exe Token: SeBackupPrivilege 1376 wevtutil.exe Token: SeSecurityPrivilege 1316 wevtutil.exe Token: SeBackupPrivilege 1316 wevtutil.exe Token: SeSecurityPrivilege 1968 wevtutil.exe Token: SeBackupPrivilege 1968 wevtutil.exe Token: SeSecurityPrivilege 2056 wevtutil.exe Token: SeBackupPrivilege 2056 wevtutil.exe Token: SeSecurityPrivilege 1144 wevtutil.exe Token: SeBackupPrivilege 1144 wevtutil.exe Token: SeSecurityPrivilege 2208 wevtutil.exe Token: SeBackupPrivilege 2208 wevtutil.exe Token: SeSecurityPrivilege 956 wevtutil.exe Token: SeBackupPrivilege 956 wevtutil.exe Token: SeSecurityPrivilege 1908 wevtutil.exe Token: SeBackupPrivilege 1908 wevtutil.exe Token: SeSecurityPrivilege 1068 wevtutil.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 284 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 28 PID 2544 wrote to memory of 284 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 28 PID 2544 wrote to memory of 284 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 28 PID 2544 wrote to memory of 2312 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 30 PID 2544 wrote to memory of 2312 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 30 PID 2544 wrote to memory of 2312 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 30 PID 2544 wrote to memory of 1632 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 32 PID 2544 wrote to memory of 1632 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 32 PID 2544 wrote to memory of 1632 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 32 PID 1632 wrote to memory of 2840 1632 net.exe 35 PID 1632 wrote to memory of 2840 1632 net.exe 35 PID 1632 wrote to memory of 2840 1632 net.exe 35 PID 2544 wrote to memory of 1744 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 40 PID 2544 wrote to memory of 1744 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 40 PID 2544 wrote to memory of 1744 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 40 PID 2544 wrote to memory of 1380 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 42 PID 2544 wrote to memory of 1380 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 42 PID 2544 wrote to memory of 1380 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 42 PID 2544 wrote to memory of 1336 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 44 PID 2544 wrote to memory of 1336 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 44 PID 2544 wrote to memory of 1336 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 44 PID 1336 wrote to memory of 2248 1336 net.exe 46 PID 1336 wrote to memory of 2248 1336 net.exe 46 PID 1336 wrote to memory of 2248 1336 net.exe 46 PID 2544 wrote to memory of 2140 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 47 PID 2544 wrote to memory of 2140 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 47 PID 2544 wrote to memory of 2140 2544 d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe 47 PID 2140 wrote to memory of 1436 2140 cmd.exe 49 PID 2140 wrote to memory of 1436 2140 cmd.exe 49 PID 2140 wrote to memory of 1436 2140 cmd.exe 49 PID 1436 wrote to memory of 1676 1436 cmd.exe 50 PID 1436 wrote to memory of 1676 1436 cmd.exe 50 PID 1436 wrote to memory of 1676 1436 cmd.exe 50 PID 2140 wrote to memory of 1252 2140 cmd.exe 51 PID 2140 wrote to memory of 1252 2140 cmd.exe 51 PID 2140 wrote to memory of 1252 2140 cmd.exe 51 PID 2140 wrote to memory of 596 2140 cmd.exe 52 PID 2140 wrote to memory of 596 2140 cmd.exe 52 PID 2140 wrote to memory of 596 2140 cmd.exe 52 PID 2140 wrote to memory of 1728 2140 cmd.exe 53 PID 2140 wrote to memory of 1728 2140 cmd.exe 53 PID 2140 wrote to memory of 1728 2140 cmd.exe 53 PID 2140 wrote to memory of 1736 2140 cmd.exe 54 PID 2140 wrote to memory of 1736 2140 cmd.exe 54 PID 2140 wrote to memory of 1736 2140 cmd.exe 54 PID 2140 wrote to memory of 912 2140 cmd.exe 55 PID 2140 wrote to memory of 912 2140 cmd.exe 55 PID 2140 wrote to memory of 912 2140 cmd.exe 55 PID 2140 wrote to memory of 2668 2140 cmd.exe 56 PID 2140 wrote to memory of 2668 2140 cmd.exe 56 PID 2140 wrote to memory of 2668 2140 cmd.exe 56 PID 2140 wrote to memory of 2676 2140 cmd.exe 57 PID 2140 wrote to memory of 2676 2140 cmd.exe 57 PID 2140 wrote to memory of 2676 2140 cmd.exe 57 PID 2140 wrote to memory of 2784 2140 cmd.exe 58 PID 2140 wrote to memory of 2784 2140 cmd.exe 58 PID 2140 wrote to memory of 2784 2140 cmd.exe 58 PID 2140 wrote to memory of 2280 2140 cmd.exe 59 PID 2140 wrote to memory of 2280 2140 cmd.exe 59 PID 2140 wrote to memory of 2280 2140 cmd.exe 59 PID 2140 wrote to memory of 2224 2140 cmd.exe 60 PID 2140 wrote to memory of 2224 2140 cmd.exe 60 PID 2140 wrote to memory of 2224 2140 cmd.exe 60 PID 2140 wrote to memory of 2664 2140 cmd.exe 61 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe"C:\Users\Admin\AppData\Local\Temp\d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:284
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services / v MaxDisconnectionTime / t REG_DWORD / d 1209600000 / f2⤵
- Modifies registry key
PID:2312
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop MSSQLSERVER /f /m2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /f /m3⤵PID:2840
-
-
-
C:\Windows\System32\vssadmin.exe"C:\Windows\System32\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:1744
-
-
C:\Windows\System32\reg.exe"C:\Windows\System32\reg.exe" add HKLM\SOFTWARE\Policies\Microsoft\Windows NT\Terminal Services / v MaxDisconnectionTime / t REG_DWORD / d 1209600000 / f2⤵
- Modifies registry key
PID:1380
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop MSSQLSERVER /f /m2⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /f /m3⤵PID:2248
-
-
-
C:\Windows\system32\cmd.execmd /c temp.cmd C:\Users\Admin\AppData\Local\Temp\d4a847fa9c4c7130a852a2e197b205493170a8b44426d9ec481fc4b285a92666.exe2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c wevtutil.exe el3⤵
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\system32\wevtutil.exewevtutil.exe el4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Analytic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1252
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Application"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:596
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "DebugChannel"3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1728
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "DirectShowFilterGraph"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "DirectShowPluginControl"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:912
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Els_Hyphenation/Analytic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "EndpointMapper"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2676
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "ForwardedEvents"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "HardwareEvents"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2280
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Internet Explorer"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Key Management Service"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2664
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "MF_MediaFoundationDeviceProxy"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:440
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Media Center"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:584
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "MediaFoundationDeviceProxy"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1116
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "MediaFoundationPerformance"3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2532
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "MediaFoundationPipeline"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:700
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "MediaFoundationPlatform"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:604
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-IE/Diagnostic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-IEDVTOOL/Diagnostic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-IEFRAME/Diagnostic"3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-JSDumpHeap/Diagnostic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-PerfTrack-IEFRAME/Diagnostic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1376
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-PerfTrack-MSHTML/Diagnostic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ADSI/Debug"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-API-Tracing/Operational"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ATAPort/General"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ATAPort/SATA-LPM"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ActionQueue/Analytic"3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:956
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-AltTab/Diagnostic"3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-AppID/Operational"3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-AppLocker/EXE and DLL"3⤵
- Clears Windows event logs
PID:2836
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-AppLocker/MSI and Script"3⤵PID:588
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application Server-Applications/Admin"3⤵PID:2964
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application Server-Applications/Analytic"3⤵
- Clears Windows event logs
PID:2164
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application Server-Applications/Debug"3⤵PID:3004
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application Server-Applications/Operational"3⤵PID:3056
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application-Experience/Problem-Steps-Recorder"3⤵
- Clears Windows event logs
PID:2992
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application-Experience/Program-Compatibility-Assistant"3⤵PID:2384
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application-Experience/Program-Compatibility-Troubleshooter"3⤵PID:1396
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application-Experience/Program-Inventory"3⤵PID:1704
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application-Experience/Program-Inventory/Debug"3⤵PID:1208
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Application-Experience/Program-Telemetry"3⤵
- Clears Windows event logs
PID:2548
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Audio/CaptureMonitor"3⤵
- Clears Windows event logs
PID:2028
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Audio/Operational"3⤵PID:760
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Audio/Performance"3⤵PID:1624
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Audit/Analytic"3⤵PID:2320
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Authentication User Interface/Operational"3⤵PID:2096
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-AxInstallService/Log"3⤵
- Clears Windows event logs
PID:2304
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Backup"3⤵PID:1920
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Biometrics/Operational"3⤵PID:212
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BitLocker-DrivePreparationTool/Admin"3⤵PID:2932
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BitLocker-DrivePreparationTool/Operational"3⤵PID:988
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Bits-Client/Analytic"3⤵PID:648
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Bits-Client/Operational"3⤵
- Clears Windows event logs
PID:2700
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Bluetooth-MTPEnum/Operational"3⤵
- Clears Windows event logs
PID:284
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BranchCache/Operational"3⤵
- Clears Windows event logs
PID:2084
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BranchCacheClientEventProvider/Diagnostic"3⤵PID:2976
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BranchCacheEventProvider/Diagnostic"3⤵PID:1816
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BranchCacheSMB/Analytic"3⤵
- Clears Windows event logs
PID:2104
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-BranchCacheSMB/Operational"3⤵PID:1664
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CAPI2/Operational"3⤵
- Clears Windows event logs
PID:3040
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CDROM/Operational"3⤵PID:1888
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-COM/Analytic"3⤵
- Clears Windows event logs
PID:840
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-COMRuntime/Tracing"3⤵
- Clears Windows event logs
PID:1156
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Calculator/Debug"3⤵PID:1752
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Calculator/Diagnostic"3⤵
- Clears Windows event logs
PID:2596
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CertPoleEng/Operational"3⤵PID:1448
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CertificateServicesClient-CredentialRoaming/Operational"3⤵
- Clears Windows event logs
PID:1324
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ClearTypeTextTuner/Diagnostic"3⤵PID:1808
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CmiSetup/Analytic"3⤵
- Clears Windows event logs
PID:1828
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CodeIntegrity/Operational"3⤵
- Clears Windows event logs
PID:2276
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CodeIntegrity/Verbose"3⤵
- Clears Windows event logs
PID:940
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ComDlg32/Analytic"3⤵PID:932
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-ComDlg32/Debug"3⤵PID:1592
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CorruptedFileRecovery-Client/Operational"3⤵
- Clears Windows event logs
PID:2592
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CorruptedFileRecovery-Server/Operational"3⤵
- Clears Windows event logs
PID:1120
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-CredUI/Diagnostic"3⤵PID:2352
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Crypto-RNG/Analytic"3⤵PID:2872
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-D3D10Level9/Analytic"3⤵
- Clears Windows event logs
PID:2540
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-D3D10Level9/PerfTiming"3⤵PID:2128
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DCLocator/Debug"3⤵
- Clears Windows event logs
PID:1428
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DNS-Client/Operational"3⤵
- Clears Windows event logs
PID:908
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DUI/Diagnostic"3⤵PID:2168
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DUSER/Diagnostic"3⤵PID:1776
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DXGI/Analytic"3⤵PID:1612
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DXGI/Logging"3⤵PID:2292
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DXP/Analytic"3⤵PID:2876
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DateTimeControlPanel/Analytic"3⤵
- Clears Windows event logs
PID:2260
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DateTimeControlPanel/Debug"3⤵PID:3052
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DateTimeControlPanel/Operational"3⤵PID:1640
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Deplorch/Analytic"3⤵
- Clears Windows event logs
PID:560
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DeviceSync/Analytic"3⤵PID:2436
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DeviceSync/Operational"3⤵
- Clears Windows event logs
PID:1956
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DeviceUx/Informational"3⤵PID:2868
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DeviceUx/Performance"3⤵PID:896
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Dhcp-Client/Admin"3⤵PID:888
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Dhcp-Client/Operational"3⤵PID:1688
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DhcpNap/Admin"3⤵PID:2220
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DhcpNap/Operational"3⤵PID:1576
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Dhcpv6-Client/Admin"3⤵PID:1580
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Dhcpv6-Client/Operational"3⤵PID:1680
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DiagCpl/Debug"3⤵
- Clears Windows event logs
PID:1972
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-DPS/Analytic"3⤵
- Clears Windows event logs
PID:2556
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-DPS/Debug"3⤵PID:2312
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-DPS/Operational"3⤵PID:2620
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-MSDE/Debug"3⤵
- Clears Windows event logs
PID:1632
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-PCW/Analytic"3⤵
- Clears Windows event logs
PID:3000
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-PCW/Debug"3⤵PID:1344
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-PCW/Operational"3⤵PID:2788
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-PLA/Debug"3⤵PID:1628
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-PLA/Operational"3⤵PID:2512
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-Perfhost/Analytic"3⤵
- Clears Windows event logs
PID:2460
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-Scheduled/Operational"3⤵
- Clears Windows event logs
PID:2480
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-Scripted/Admin"3⤵PID:2476
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-Scripted/Analytic"3⤵
- Clears Windows event logs
PID:2496
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-Scripted/Debug"3⤵PID:2528
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-Scripted/Operational"3⤵
- Clears Windows event logs
PID:2584
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider/Debug"3⤵PID:2948
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-ScriptedDiagnosticsProvider/Operational"3⤵PID:2880
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-TaskManager/Debug"3⤵PID:2900
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-WDC/Analytic"3⤵PID:1760
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnosis-WDI/Debug"3⤵
- Clears Windows event logs
PID:1984
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-Networking/Debug"3⤵
- Clears Windows event logs
PID:1884
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-Networking/Operational"3⤵
- Clears Windows event logs
PID:2560
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-PerfTrack-Counters/Diagnostic"3⤵
- Clears Windows event logs
PID:1960
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-PerfTrack/Diagnostic"3⤵PID:1504
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-Performance/Diagnostic"3⤵
- Clears Windows event logs
PID:900
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-Performance/Diagnostic/Loopback"3⤵PID:1656
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Diagnostics-Performance/Operational"3⤵PID:2608
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Direct3D10/Analytic"3⤵
- Clears Windows event logs
PID:1692
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Direct3D10_1/Analytic"3⤵
- Clears Windows event logs
PID:2124
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Direct3D11/Analytic"3⤵
- Clears Windows event logs
PID:1916
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Direct3D11/Logging"3⤵
- Clears Windows event logs
PID:1564
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Direct3D11/PerfTiming"3⤵PID:1436
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DirectShow-KernelSupport/Performance"3⤵PID:1252
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DirectSound/Debug"3⤵
- Clears Windows event logs
PID:596
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DirectWrite-FontCache/Tracing"3⤵PID:1728
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DirectWrite/Tracing"3⤵PID:1736
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Disk/Operational"3⤵PID:912
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DiskDiagnostic/Operational"3⤵PID:2668
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DiskDiagnosticDataCollector/Operational"3⤵PID:2676
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DiskDiagnosticResolver/Operational"3⤵
- Clears Windows event logs
PID:2784
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DisplayColorCalibration/Debug"3⤵
- Clears Windows event logs
PID:2280
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DisplayColorCalibration/Operational"3⤵PID:2224
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DisplaySwitch/Diagnostic"3⤵
- Clears Windows event logs
PID:2664
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Documents/Performance"3⤵
- Clears Windows event logs
PID:440
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DriverFrameworks-UserMode/Operational"3⤵
- Clears Windows event logs
PID:584
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DxgKrnl/Diagnostic"3⤵PID:1116
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DxgKrnl/Performance"3⤵PID:2532
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DxpTaskRingtone/Analytic"3⤵PID:700
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-DxpTaskSyncProvider/Analytic"3⤵PID:604
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EFS/Debug"3⤵
- Clears Windows event logs
PID:1892
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EapHost/Analytic"3⤵
- Clears Windows event logs
PID:1768
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EapHost/Debug"3⤵
- Clears Windows event logs
PID:536
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EapHost/Operational"3⤵PID:1236
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EaseOfAccess/Diagnostic"3⤵
- Clears Windows event logs
PID:1376
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EventCollector/Debug"3⤵PID:1316
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EventCollector/Operational"3⤵
- Clears Windows event logs
PID:1968
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EventLog-WMIProvider/Debug"3⤵PID:2056
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EventLog/Analytic"3⤵PID:1144
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-EventLog/Debug"3⤵
- Clears Windows event logs
PID:2208
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-FMS/Analytic"3⤵
- Clears Windows event logs
PID:956
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-FMS/Debug"3⤵PID:1908
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-FMS/Operational"3⤵
- Clears Windows event logs
PID:1068
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-FailoverClustering-Client/Diagnostic"3⤵PID:2836
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Fault-Tolerant-Heap/Operational"3⤵
- Clears Windows event logs
PID:588
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Feedback-Service-TriggerProvider"3⤵
- Clears Windows event logs
PID:2964
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-FileInfoMinifilter/Operational"3⤵PID:2164
-
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl "Microsoft-Windows-Firewall-CPL/Diagnostic"3⤵PID:3004
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2716
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5138279c8f0163f97e43be9764db21a86
SHA1f95395e97a0668fb0770fbdf1fe0f2aa23398ed2
SHA256ea63e6798b94e184ce486048867abfd0f0fd2268c19909d5251dc07b137208f1
SHA5124d64f91ed7dedc6e1c6abe99b8fc110802ff52505a1bb8ce8f9c36378cb12dcce5aff45914220cba3026b3d4a089bc96499ac5979c99ce5e2c5ad347c8ad588a
-
Filesize
134B
MD5d81eac651a27977bd85805ff21a4bb7e
SHA178941577c618fd03df79d9e0921bb9a5e5063892
SHA256442c16903c74297f029c964e9c78302816d3e9b9a1562ea8fd3d652790db3a5e
SHA512b50bc5044cd6fa3a02fa2a34c63a6ed1da4c43df6a496fc92b99c9cd896b5d04dc2af57a66f248a328c0027f767af9f36048a640c027744c47389a6cbba1c88d
-
Filesize
134B
MD5d81eac651a27977bd85805ff21a4bb7e
SHA178941577c618fd03df79d9e0921bb9a5e5063892
SHA256442c16903c74297f029c964e9c78302816d3e9b9a1562ea8fd3d652790db3a5e
SHA512b50bc5044cd6fa3a02fa2a34c63a6ed1da4c43df6a496fc92b99c9cd896b5d04dc2af57a66f248a328c0027f767af9f36048a640c027744c47389a6cbba1c88d