Malware Analysis Report

2024-09-11 01:52

Sample ID 231129-bf6fcadf37
Target 64CO.bin
SHA256 033b4950a8f249b20eb86ec6f8f2ea0a1567bb164289d1aa7fb0ba51f9bbe46c
Tags
medusalocker evasion persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

033b4950a8f249b20eb86ec6f8f2ea0a1567bb164289d1aa7fb0ba51f9bbe46c

Threat Level: Known bad

The file 64CO.bin was found to be: Known bad.

Malicious Activity Summary

medusalocker evasion persistence ransomware spyware stealer

MedusaLocker payload

Medusalocker family

Modifies boot configuration data using bcdedit

Deletes shadow copies

Renames multiple (629) files with added filename extension

Renames multiple (916) files with added filename extension

Drops file in Drivers directory

Deletes System State backups

Checks computer location settings

Deletes itself

Reads user/profile data of web browsers

Adds Run key to start application

Drops desktop.ini file(s)

Enumerates connected drives

Drops file in System32 directory

Drops file in Program Files directory

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Interacts with shadow copies

Suspicious behavior: EnumeratesProcesses

Suspicious use of AdjustPrivilegeToken

System policy modification

Uses Volume Shadow Copy service COM API

Suspicious use of WriteProcessMemory

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2023-11-29 01:06

Signatures

MedusaLocker payload

Description Indicator Process Target
N/A N/A N/A N/A

Medusalocker family

medusalocker

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2023-11-29 01:06

Reported

2023-11-29 01:08

Platform

win7-20231023-en

Max time kernel

121s

Max time network

126s

Command Line

"C:\Users\Admin\AppData\Local\Temp\64CO.exe"

Signatures

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (916) files with added filename extension

ransomware

Deletes System State backups

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\services C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\services.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\networks C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\networks.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\protocol C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\protocol.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\services.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Deletes itself

Description Indicator Process Target
N/A N/A C:\Windows\system32\cmd.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2085049433-1067986815-1244098655-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\64CO.exe\" e" C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-2085049433-1067986815-1244098655-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\h: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\F: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\G: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\H: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\F: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\g: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\G: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\H: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\h: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\g: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\D: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\D: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\E: C:\Windows\system32\vssadmin.exe N/A
File opened (read-only) \??\E: C:\Windows\system32\vssadmin.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\DEFAULT C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\RegBack\SAM C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b889ab5d-f7d2-47ff-92a1-3ec877b7e01c.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\ac956b95-7128-41eb-9583-7cb00455c5ca.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\8191d76a-2c1a-4dfd-a86d-8cd114eaedad.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\b889ab5d-f7d2-47ff-92a1-3ec877b7e01c C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\COMPONENTS C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\COMPONENTS.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\RegBack\DEFAULT C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\SECURITY C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\SOFTWARE C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\BCD-Template.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\BCD-Template.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\SAM C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\RegBack\SECURITY C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\5d88ea6a-c342-44e4-a674-4ec3dda0554e C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\f22e410f-f947-4e08-8f2a-8f65df603f8d.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\5d88ea6a-c342-44e4-a674-4ec3dda0554e.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\ac956b95-7128-41eb-9583-7cb00455c5ca.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\BCD-Template C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\8191d76a-2c1a-4dfd-a86d-8cd114eaedad C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\5d88ea6a-c342-44e4-a674-4ec3dda0554e.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\SYSTEM C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\1e582198-061f-43f1-abdf-d4e9b606b035.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\RegBack\SOFTWARE C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Algiers C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Paramaribo.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-14.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Volgograd.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\HST10.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Casey.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Istanbul.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Monrovia.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Macau.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Inuvik.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Tucuman C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Troll.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\EST C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Mawson C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Halifax.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santiago.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Tirane.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Indian\Chagos.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\security\blacklist.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Rome C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\PST8PDT.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Novosibirsk C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Port-au-Prince C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Santarem.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Yakutat.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Prague.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Edmonton.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Antarctica\Troll.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Edmonton C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuala_Lumpur.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Vilnius C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\removed-files C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Canary.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Nairobi C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Krasnoyarsk.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Samarkand.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Ulaanbaatar C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Yellowknife C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Norfolk C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\ext\meta-index.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Curacao.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuching.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-4.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-6.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\EST5.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Gambier C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Midway C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\ext\meta-index C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Pacific\Niue C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Atlantic\Faroe.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Adelaide.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Fortaleza.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guyana C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Minsk C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\SystemV\MST7MDT.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Lagos.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Grand_Turk.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Manaus C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Stockholm.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\San_Luis.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Eirunepe C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Nicosia.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Dublin.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Tallinn.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_2 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_0 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_2 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb1 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb0 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_1 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_3 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl C:\Windows\system32\wbadmin.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb2 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_1 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th0 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th1 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th2 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th2 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_0 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl C:\Windows\system32\wbadmin.exe N/A
File opened for modification C:\Windows\Boot\PCAT\bootmgr C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Boot\DVD\EFI\BCD C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl C:\Windows\system32\wbadmin.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb0 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb2 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\enwindow C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Boot\DVD\PCAT\BCD C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl C:\Windows\system32\wbadmin.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl C:\Windows\system32\wbadmin.exe N/A
File opened for modification C:\Windows\Panther\setupinfo.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb1 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th1 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th0 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\dewindow C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl C:\Windows\system32\wbadmin.exe N/A
File opened for modification C:\Windows\Panther\setupinfo C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Panther\setupinfo.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1764 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2992 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2968 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2736 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2912 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2684 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2672 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 3012 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2516 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2096 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2276 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2484 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2396 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 2028 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\vssadmin.exe
PID 1764 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\bcdedit.exe
PID 1764 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\bcdedit.exe
PID 1764 wrote to memory of 1304 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\bcdedit.exe
PID 1764 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\bcdedit.exe
PID 1764 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\bcdedit.exe
PID 1764 wrote to memory of 1944 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\bcdedit.exe
PID 1764 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\wbadmin.exe
PID 1764 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\wbadmin.exe
PID 1764 wrote to memory of 1964 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\wbadmin.exe
PID 1764 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\wbadmin.exe
PID 1764 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\wbadmin.exe
PID 1764 wrote to memory of 2176 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\wbadmin.exe
PID 1764 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\System32\Wbem\wmic.exe
PID 1764 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\System32\Wbem\wmic.exe
PID 1764 wrote to memory of 1876 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\System32\Wbem\wmic.exe
PID 1764 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\cmd.exe
PID 1764 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\cmd.exe
PID 1764 wrote to memory of 1928 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\cmd.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\64CO.exe

"C:\Users\Admin\AppData\Local\Temp\64CO.exe"

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB

C:\Windows\system32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded

C:\Windows\system32\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\bcdedit.exe

bcdedit.exe /set {default} recoveryenabled No

C:\Windows\system32\bcdedit.exe

bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\wbadmin.exe

wbadmin DELETE SYSTEMSTATEBACKUP

C:\Windows\system32\wbadmin.exe

wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest

C:\Windows\System32\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\64CO.exe >> NUL

Network

N/A

Files

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2023-11-29 01:06

Reported

2023-11-29 01:08

Platform

win10v2004-20231127-en

Max time kernel

150s

Max time network

155s

Command Line

"C:\Users\Admin\AppData\Local\Temp\64CO.exe"

Signatures

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\bcdedit.exe N/A
N/A N/A C:\Windows\SYSTEM32\bcdedit.exe N/A

Renames multiple (629) files with added filename extension

ransomware

Deletes System State backups

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\SYSTEM32\wbadmin.exe N/A
N/A N/A C:\Windows\SYSTEM32\wbadmin.exe N/A

Drops file in Drivers directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\drivers\etc\hosts C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\networks C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\networks.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\protocol C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\protocol.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\services.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\hosts.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\networks.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\protocol.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\services C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\drivers\etc\services.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3455265224-196869244-2056873367-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\64CO.exe\" e" C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification \??\E:\$RECYCLE.BIN\S-1-5-21-3455265224-196869244-2056873367-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\E: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\F: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\G: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\G: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\h: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\D: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\E: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\g: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\D: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\g: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\h: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened (read-only) \??\F: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\H: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\H: C:\Windows\SYSTEM32\vssadmin.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Drops file in System32 directory

Description Indicator Process Target
File opened for modification C:\Windows\System32\config\BBI C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File created C:\Windows\system32\CatRoot2\edbtmp.log C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\system32\CatRoot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.jfm C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\ResPriImageListLowCost C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\DRIVERS.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\TextServicesFramework\MsCtfMonitor.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157 C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\SYSTEM C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\system32\CatRoot2\edb.log C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan Static Task C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\SECURITY C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\system32\CatRoot2\edbtmp.log C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\ELAM C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File created C:\Windows\system32\CatRoot2\edbres00002.jrs C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.jfm C:\Windows\system32\svchost.exe N/A
File created C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\16843576-125f-43ea-90ea-a83e2e54d435.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File created C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb.jfm C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Work.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\FB0D848F74F70BB2EAA93746D24D9749.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Schedule Scan.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\UpdateModelTask C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\ResPriHMImageList C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\BCD-Template.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\system32\CatRoot2\{127D0A1D-4EF2-11D1-8608-00C04FC295EE}\catdb C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\654bd96f-ff2e-4668-9fcb-e8d873679815 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\ELAM.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\catroot2\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\catdb.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\16843576-125f-43ea-90ea-a83e2e54d435 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\654bd96f-ff2e-4668-9fcb-e8d873679815.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\87d379a3-e6c5-484a-9ef9-9428568c9b8d C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\User\Preferred C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_0FB9553B978E7F00C6B2309507DEB64A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_363582827213C09529A76F35FB615187 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\Tasks\Microsoft\Windows\UpdateOrchestrator\Report policies C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\COMPONENTS.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\System32\config\COMPONENTS.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\system32\CatRoot2\edb.jcp C:\Windows\system32\svchost.exe N/A
File opened for modification C:\Windows\System32\Microsoft\Protect\S-1-5-18\Preferred.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File created C:\Windows\system32\CatRoot2\edbres00001.jrs C:\Windows\system32\svchost.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files\Mozilla Firefox\removed-files C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\removed-files.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\precomplete.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\postSigningData.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\removed-files.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000008\FA000000008 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f14\FA000000014 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f4\FA000000005.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000009\FA000000009 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000011\FA000000011.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_w1\WA104381125.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-H C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Google\Chrome\Application\master_preferences.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f7\FA000000007.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000006\FA000000006.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\CMap\Identity-V C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\precomplete.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f3\FA000000003 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\postSigningData C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\ZeroByteFile C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Mozilla Firefox\precomplete C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f2\FA000000002.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_f33\FA000000033.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\FPA_FA000000050\FA000000050 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{5FCE6D76-F5DC-37AB-B2B8-22AB8CEDB1D4} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{AE86D888-1404-47CC-A7BB-8D86C0503E58}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{76DEEAB3-122F-4231-83C7-0C35363D02F9}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\e1ea7b2e20a22fbee6e9dd5d883e9f3cc75fdee790ea383a755da4381088ec52 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{E30D8B21-D82D-3211-82CC-0F0A5D1495E8} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{3A706840-2882-423C-90EB-B31545E2BC7A}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{76DEEAB3-122F-4231-83C7-0C35363D02F9}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{BD95A8CD-1D9F-35AD-981A-3E7925026EBB}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{F0C3E5D1-1ADE-321E-8167-68EF0DE699A5}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl C:\Windows\SYSTEM32\wbadmin.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{4A03706F-666A-4037-7777-5F2748764D10} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{3A706840-2882-423C-90EB-B31545E2BC7A} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{3544B2EE-E62F-4D11-B79C-3DDEACE94DA5}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{BD95A8CD-1D9F-35AD-981A-3E7925026EBB} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\e1ea7b2e20a22fbee6e9dd5d883e9f3cc75fdee790ea383a755da4381088ec52.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{CF2BEA3C-26EA-32F8-AA9B-331F7E34BA97}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Boot\DVD\PCAT\BCD C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{7DAD0258-515C-3DD4-8964-BD714199E0F7}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{9BE518E6-ECC6-35A9-88E4-87755C07200F}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Crypto\Keys\de7cf8a7901d2ad13e5c67c29e5d1662_63cc4225-b733-40b3-b5f9-0991cac33c4b.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{F6080405-9FA8-4CAA-9982-14E95D1A3DAC}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\LocalService\AppData\Local\Microsoft\Credentials\DFBE70A7E5CC19A398EBF1B96859CE5D.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\AppReadiness\S-1-5-21-3455265224-196869244-2056873367-1000 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\AppReadiness\S-1-5-21-3455265224-196869244-2056873367-1000.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{CB0836EC-B072-368D-82B2-D3470BF95707} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{77924AE4-039E-4CA4-87B4-2F64180381F0}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{B175520C-86A2-35A7-8619-86DC379688B9}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{D44822A8-FC28-42FC-8B1D-21A78579FC79} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\SoftwareDistribution\Download\SharedFileCache\ffb218cb78a2ca5b027e463f2a6bbb9c7036730212098e4fb7c330c70dcdfda4 C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{64A3A4F4-B792-11D6-A78A-00B0D0180381}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{6DB765A8-05AF-49A1-A71D-6F645EE3CE41}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{C7141A99-592B-4226-A4E9-B767C1D0FBAF} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{C7141A99-592B-4226-A4E9-B767C1D0FBAF}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{5740BD44-B58D-321A-AFC0-6D3D4556DD6C}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{E30D8B21-D82D-3211-82CC-0F0A5D1495E8}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0000-1000-0000000FF1CE} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{AC76BA86-7AD7-1033-7B44-AC0F074E4100}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{D44822A8-FC28-42FC-8B1D-21A78579FC79}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Boot\PCAT\bootmgr C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{113C0ADC-B9BD-4F95-9653-4F5BC540ED03} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{1D8E6291-B0D5-35EC-8441-6616F567A0F7}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{662A0088-6FCD-45DD-9EA7-68674058AED5} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE}.keversen C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-008C-0409-1000-0000000FF1CE}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{BF08E976-B92E-4336-B56F-2171179476C4}.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\SystemCertificates\My\AppContainerUserCertRead.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl C:\Windows\SYSTEM32\wbadmin.exe N/A
File opened for modification C:\Windows\Panther\setupinfo.inprocess C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
File opened for modification C:\Windows\Installer\SourceHash{90160000-007E-0000-1000-0000000FF1CE} C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\wmic.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\wmic.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4880 wrote to memory of 3564 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 3564 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2024 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2024 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4156 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2360 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 900 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 900 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 1760 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 1908 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4064 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4064 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 3824 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4164 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2932 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 2932 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 3384 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 3384 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\vssadmin.exe
PID 4880 wrote to memory of 4444 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\bcdedit.exe
PID 4880 wrote to memory of 4444 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\bcdedit.exe
PID 4880 wrote to memory of 4876 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\bcdedit.exe
PID 4880 wrote to memory of 4876 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\bcdedit.exe
PID 4880 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\wbadmin.exe
PID 4880 wrote to memory of 4360 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\wbadmin.exe
PID 4880 wrote to memory of 740 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\wbadmin.exe
PID 4880 wrote to memory of 740 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\SYSTEM32\wbadmin.exe
PID 4880 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\System32\Wbem\wmic.exe
PID 4880 wrote to memory of 2284 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\System32\Wbem\wmic.exe
PID 4880 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\cmd.exe
PID 4880 wrote to memory of 4404 N/A C:\Users\Admin\AppData\Local\Temp\64CO.exe C:\Windows\system32\cmd.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" C:\Users\Admin\AppData\Local\Temp\64CO.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\64CO.exe

"C:\Users\Admin\AppData\Local\Temp\64CO.exe"

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded

C:\Windows\SYSTEM32\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\SYSTEM32\bcdedit.exe

bcdedit.exe /set {default} recoveryenabled No

C:\Windows\SYSTEM32\bcdedit.exe

bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\SYSTEM32\wbadmin.exe

wbadmin DELETE SYSTEMSTATEBACKUP

C:\Windows\SYSTEM32\wbadmin.exe

wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest

C:\Windows\System32\Wbem\wmic.exe

wmic.exe SHADOWCOPY /nointeractive

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\64CO.exe >> NUL

Network

Country Destination Domain Proto
US 8.8.8.8:53 8.8.8.8.in-addr.arpa udp
US 8.8.8.8:53 73.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 67.254.221.88.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 39.142.81.104.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 15.164.165.52.in-addr.arpa udp
US 8.8.8.8:53 1.208.79.178.in-addr.arpa udp
US 8.8.8.8:53 23.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 169.117.168.52.in-addr.arpa udp

Files

memory/64-729-0x000001FE363A0000-0x000001FE363B0000-memory.dmp

memory/64-735-0x000001FE36950000-0x000001FE36960000-memory.dmp

memory/64-745-0x000001FE3AD80000-0x000001FE3AD81000-memory.dmp

memory/64-753-0x000001FE3AA40000-0x000001FE3AA41000-memory.dmp

C:\Windows\System32\catroot2\edb.log

MD5 7ee5c1f681b959b8eff0c3e54f46976d
SHA1 8c7e2f9ee17db5a80bbc0603baef87583a343901
SHA256 f1e74880a14afba83a83e5274bfc8d18d3a84f441976dcf781a9ef86de147f5d
SHA512 a017e55a70e7167313dcfb17d8e435d2e0b6556d8874bb4ce55c38bd19c182aa4f4f34afb7081d6abfa25456e6adf5fc9d854c5b8c0269e3c4ce8a53335d3e1f

memory/64-775-0x000001FE3AE20000-0x000001FE3AE21000-memory.dmp

memory/64-777-0x000001FE3AE20000-0x000001FE3AE21000-memory.dmp

memory/64-778-0x000001FE3AF60000-0x000001FE3AF61000-memory.dmp

memory/64-779-0x000001FE3AF80000-0x000001FE3AF81000-memory.dmp

memory/64-782-0x000001FE3B060000-0x000001FE3B061000-memory.dmp

memory/64-784-0x000001FE3B060000-0x000001FE3B061000-memory.dmp

memory/64-785-0x000001FE3B190000-0x000001FE3B191000-memory.dmp

memory/64-786-0x000001FE3B1B0000-0x000001FE3B1B1000-memory.dmp

C:\Windows\System32\catroot2\dberr.txt

MD5 23c80d155e245ba8a6ceeec50b15746f
SHA1 144ddad37dc61843d8fe01a112d50382649fb554
SHA256 4f129e2ab632a5d65ac76389303df9de0e5df39ad187b49b9bdc59a985cd3dad
SHA512 66e956fcdd5dbce6a71a35f160cc4a0023997159ca95e5e496aa72f52790f048c67c92254997443b7902835098a3971059cad56438e55d7e25fb7d1ef3d083ca

memory/64-789-0x000001FE3B2E0000-0x000001FE3B2E1000-memory.dmp

memory/64-790-0x000001FE3BF70000-0x000001FE3BF71000-memory.dmp

memory/64-794-0x000001FE3C850000-0x000001FE3C851000-memory.dmp

memory/64-801-0x000001FE3C850000-0x000001FE3C851000-memory.dmp

memory/64-803-0x000001FE3CEF0000-0x000001FE3CEF1000-memory.dmp

memory/64-804-0x000001FE3DBD0000-0x000001FE3DBD1000-memory.dmp

memory/64-805-0x000001FE3DBD0000-0x000001FE3DBD1000-memory.dmp

memory/64-807-0x000001FE3B6B0000-0x000001FE3B6B1000-memory.dmp

memory/64-811-0x000001FE3E490000-0x000001FE3E491000-memory.dmp

memory/64-812-0x000001FE3E490000-0x000001FE3E491000-memory.dmp

memory/64-813-0x000001FE3C330000-0x000001FE3C331000-memory.dmp

memory/64-815-0x000001FE3E960000-0x000001FE3E961000-memory.dmp

memory/64-843-0x000001FE3EC70000-0x000001FE3EC71000-memory.dmp

memory/64-850-0x000001FE3EC70000-0x000001FE3EC71000-memory.dmp

memory/64-858-0x000001FE3F650000-0x000001FE3F651000-memory.dmp

memory/64-868-0x000001FE3BA70000-0x000001FE3BA71000-memory.dmp

memory/64-875-0x000001FE3BA70000-0x000001FE3BA71000-memory.dmp

memory/64-1015-0x000001FE40660000-0x000001FE40661000-memory.dmp

memory/64-1016-0x000001FE410B0000-0x000001FE410B1000-memory.dmp

memory/64-1017-0x000001FE410B0000-0x000001FE410B1000-memory.dmp

memory/64-1019-0x000001FE415A0000-0x000001FE415A1000-memory.dmp

memory/64-1020-0x000001FE42610000-0x000001FE42611000-memory.dmp

memory/64-1021-0x000001FE40970000-0x000001FE40971000-memory.dmp

memory/64-1023-0x000001FE42650000-0x000001FE42651000-memory.dmp

memory/64-1033-0x000001FE43010000-0x000001FE43011000-memory.dmp

memory/64-1037-0x000001FE42030000-0x000001FE42031000-memory.dmp

memory/64-1038-0x000001FE42030000-0x000001FE42031000-memory.dmp

memory/64-1040-0x000001FE443F0000-0x000001FE443F1000-memory.dmp

C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157

MD5 7f34ae4b60b3da7ababa8b129cc35fa6
SHA1 28e763c23fbdd863b41ca8ec9ee9460fb99fbfd6
SHA256 598e6c630e279f3dd1ee4fcfd77bdfce374a839fdbf5941b2ebece5c337f286f
SHA512 4917502265c4057e9888ef6d2f9a8cc2afb94be37f98fafd699ddcb619dd5170772129bc9d920f704098e5101789d4a11da04cdc24f338017e31f24cd0de71a1

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157.keversen

MD5 0eb6e1875269be11df9201496aff5a83
SHA1 878dd586c9b45c1dca1a52f9df96f4466e995048
SHA256 e3f71c19d7a60e2030c57e3d77183da83e7ac3e51707785d67c4a1636e25e748
SHA512 1b327bbec6adc3b4c91e9d2d265888110f966597605e82247d3bfb121188343ed4c4c6f154a47246d0074f157c13e8ac31583f0908511f694faad252bb3085bd

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\FB0D848F74F70BB2EAA93746D24D9749.keversen

MD5 b00998e7184e9d4d4c79747441b2b3bb
SHA1 e42f1d6ce9c43ed673bcb46e5282ddbfc3ed540e
SHA256 0871cc581cd8610812795430819cbf48a081a7be7876674a5b7af0ea327247d8
SHA512 c7b3fa71a90cc649eee9f7bcf052f59c82ba170f5aef07df59683e4c04020cef92ab0539d6d47b7a7b306e635656fe065898a001c05920c9ceb8caa28eb0ee92

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C86BD7751D53F10F65AAAD66BBDF33C7.keversen

MD5 c0ec87ea5071471b443ece8bf23e86b7
SHA1 72600953fb557732c8d2710b0ca4d10ffb038452
SHA256 e5369e24eb34a96813bd9daa62fb63464640ff67cc605a4173a4a38b72709e2b
SHA512 10f04a0d8f41c4e11fbd886eb585e4e2ea1dab3e2663cbfdc1ba345072a14696670ad8032eda78851bcd46c128f294808add9551f976b5191eeaf751a39ea505

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506.keversen

MD5 e5ec6c3c57a2b3872912a4a8eb1e1004
SHA1 538204c8b668e4980477a4adefb999b108ef4f13
SHA256 e4799dc078e016952719338909f339b3ac38019a0a05206ce2e16393b0f5e6fc
SHA512 c3727fad1484fe53edfcd47ecf5024f9e08b42c7c03019ace72e24515ecd860774e77cea34f53e421676a9dd47b9560c5b429b390686c911b09f10290c74bc39

C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\398EE64D66758B5715368AA94044B13A.keversen

MD5 31c5920536e892041123cc3552756b95
SHA1 3537449938f8fb73a9e37e79ed973270586ddaf3
SHA256 ccc671deb21fdf5ee401574f6573990509b11a1c1d3dda6aa61e8f85be7816be
SHA512 97deba22755862befdb5c53dee4fe0674421eae74f7608c2b394bbc4970c300cafe02e0e897b7efe27b3bb5945ff299c8fa361e9f4568242c152ba0b076609cd