Malware Analysis Report

2024-09-11 01:17

Sample ID 240419-wynngabg73
Target 6f07f884dc68b581dcb0762d0cf19f3c4caed5cc38075a808b5b307b27d76f2c
SHA256 6f07f884dc68b581dcb0762d0cf19f3c4caed5cc38075a808b5b307b27d76f2c
Tags
phobos evasion persistence ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

6f07f884dc68b581dcb0762d0cf19f3c4caed5cc38075a808b5b307b27d76f2c

Threat Level: Known bad

The file 6f07f884dc68b581dcb0762d0cf19f3c4caed5cc38075a808b5b307b27d76f2c was found to be: Known bad.

Malicious Activity Summary

phobos evasion persistence ransomware spyware stealer

Phobos

Deletes shadow copies

Renames multiple (314) files with added filename extension

Renames multiple (518) files with added filename extension

Modifies boot configuration data using bcdedit

Deletes backup catalog

Modifies Windows Firewall

Drops startup file

Checks computer location settings

Reads user/profile data of web browsers

Adds Run key to start application

Drops desktop.ini file(s)

Drops file in Program Files directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of WriteProcessMemory

Uses Volume Shadow Copy service COM API

Checks SCSI registry key(s)

Modifies registry class

Uses Task Scheduler COM API

Interacts with shadow copies

Suspicious use of AdjustPrivilegeToken

Suspicious behavior: EnumeratesProcesses

Modifies Internet Explorer settings

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-04-19 18:19

Signatures

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-19 18:19

Reported

2024-04-19 18:23

Platform

win7-20240221-en

Max time kernel

150s

Max time network

119s

Command Line

"C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (314) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6 = "C:\\Users\\Admin\\AppData\\Local\\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe" C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6 = "C:\\Users\\Admin\\AppData\\Local\\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe" C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JYWEBS5E\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\PY5FLSJ8\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\108YEMNS\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Recorded TV\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\F9UL0C6O\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3452737119-3959686427-228443150-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Recorded TV\Sample Media\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\J3XTYXPF\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\LGZQH3SP\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\CYTS71XD\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\CLVWINTL.DLL C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR45B.GIF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR45F.GIF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\PSS10R.CHM C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0178459.JPG C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00914_.WMF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0186002.WMF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Java\jre7\bin\jp2ssv.dll.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_gray_few-showers.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MSPTLS.DLL C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\TextConv\WPFT632.CNV C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO00479_.WMF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR18F.GIF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02754U.BMP.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH02810J.JPG.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR5B.GIF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR9B.GIF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\7-Zip\Lang\fr.txt C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.jarprocessor.nl_zh_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\VideoLAN\VLC\lua\playlist\vimeo.luac.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\MUOPTIN.DLL C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OutlookAutoDiscover\YAHOO.HK.XML C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0199609.WMF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PE00633_.WMF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SO02227_.WMF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-lib-profiler-ui_zh_CN.jar C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\update_tracking\org-netbeans-lib-profiler-charts.xml C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\fr-FR\sbdrop.dll.mui C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BLENDS\BLENDS.INF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\images\pause_hov.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\SATIN\SATIN.INF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD08868_.WMF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\BCSLaunch.dll.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\rectangle_travel_Thumbnail.bmp C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Pacific\Palau C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\SpiderSolitaireMCE.lnk C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Windows Journal\MSPVWCTL.DLL C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\Dataset.zip.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01239_.GIF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR33F.GIF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sqlcecompact35.dll.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\ja-JP\js\slideShow.js C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\7-Zip\Lang\lt.txt.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Vignette\NavigationUp_ButtonGraphic.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\DVD Maker\Shared\Parity.fx C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Atlantic\Azores.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.0\PresentationFramework.Royale.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\WidevineCdm\LICENSE.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00242_.WMF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\PDIR24F.GIF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolBMPs\DiscussionToolIconImages.jpg.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\oracle.gif.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\RE00006_.WMF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\RECL.ICO C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\gifs\prodbig.gif C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\it-IT\css\settings.css C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\BOLDSTRI\PREVIEW.GIF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00152_.WMF.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.p2.touchpoint.natives.nl_zh_4.4.0.v20140623020002.jar C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Clock.Gadget\icon.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\LINES\BD14538_.GIF C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\fr\System.Management.Instrumentation.Resources.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\uk\LC_MESSAGES\vlc.mo.id[289394F7-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\logo.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Enumerates physical storage devices

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Internet Explorer\Main C:\Windows\SysWOW64\mshta.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2196 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 1968 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 2704 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 1968 wrote to memory of 2628 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1968 wrote to memory of 2628 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1968 wrote to memory of 2628 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2704 wrote to memory of 3008 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2704 wrote to memory of 3008 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 2704 wrote to memory of 3008 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1968 wrote to memory of 2400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1968 wrote to memory of 2400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 1968 wrote to memory of 2400 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 2704 wrote to memory of 1396 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2704 wrote to memory of 1396 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2704 wrote to memory of 1396 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 2704 wrote to memory of 2824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2704 wrote to memory of 2824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2704 wrote to memory of 2824 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2704 wrote to memory of 1444 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2704 wrote to memory of 1444 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2704 wrote to memory of 1444 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 2704 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2704 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2704 wrote to memory of 2556 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 2196 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 808 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 348 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 348 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 348 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 348 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 2076 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 352 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 352 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 352 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 352 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 2196 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 2196 wrote to memory of 1676 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 1676 wrote to memory of 280 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1676 wrote to memory of 280 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1676 wrote to memory of 280 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 1676 wrote to memory of 2484 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1676 wrote to memory of 2484 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1676 wrote to memory of 2484 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 1676 wrote to memory of 2712 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1676 wrote to memory of 2712 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1676 wrote to memory of 2712 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1676 wrote to memory of 2324 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1676 wrote to memory of 2324 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1676 wrote to memory of 2324 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 1676 wrote to memory of 1628 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1676 wrote to memory of 1628 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 1676 wrote to memory of 1628 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe

"C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe"

C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe

"C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta"

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

N/A

Files

C:\MSOCache\All Users\{90140000-0011-0000-0000-0000000FF1CE}-C\ProPsWW.cab.id[289394F7-3398].[[email protected]].Elbie

MD5 d3158ca483837ee9c15ff8908c65b4f8
SHA1 57fa51911852711d3086b589cdbbfbfd7c2a4d19
SHA256 131d520217a90953c1da3a790b53c385dd3ae956bc5b7a8eb624ef8f1e1aeabe
SHA512 9fab105ecb36563bbbe462f3d045e19100f3a9fcea9f374fea374a36d4eda189dbea7801e5f4c949bfb7a642a8fe57073ffd6615365fe0e1f77b24b51a3e314f

C:\info.hta

MD5 44e8d0b8b4c453d604abbd325c6bc40c
SHA1 6c964839810d1b1abfd8520fa9ec00b17506c498
SHA256 6c7e9daa64af17a0527372d70a1a703ec901e8fc060f92d16a62de4f1e313da6
SHA512 81e593540cf4c99fe8be767c8c6645915bc035a60e6a977ad65dd3efcf7a92c4d05ca6c140c0ed9f5d99baa1b2d01ab823e5ab07dfdd0ca8e924359f1165a6aa

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-19 18:19

Reported

2024-04-19 18:23

Platform

win10v2004-20240412-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe"

Signatures

Phobos

ransomware phobos

Deletes shadow copies

ransomware

Modifies boot configuration data using bcdedit

ransomware evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A
N/A N/A C:\Windows\system32\bcdedit.exe N/A

Renames multiple (518) files with added filename extension

ransomware

Deletes backup catalog

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\wbadmin.exe N/A
N/A N/A C:\Windows\system32\wbadmin.exe N/A

Modifies Windows Firewall

evasion
Description Indicator Process Target
N/A N/A C:\Windows\system32\netsh.exe N/A
N/A N/A C:\Windows\system32\netsh.exe N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6 = "C:\\Users\\Admin\\AppData\\Local\\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe" C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
Set value (str) \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6 = "C:\\Users\\Admin\\AppData\\Local\\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe" C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Drops desktop.ini file(s)

Description Indicator Process Target
File opened for modification C:\Users\Admin\Favorites\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Searches\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\AccountPictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification F:\$RECYCLE.BIN\S-1-5-21-1132431369-515282257-1998160155-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Music\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\3D Objects\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Contacts\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Documents\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\OneDrive\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Desktop\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Downloads\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\$Recycle.Bin\S-1-5-21-1132431369-515282257-1998160155-1000\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\Links\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Public\Videos\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\fr-fr\ui-strings.js.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\VideoLAN\VLC\locale\tt\LC_MESSAGES\vlc.mo.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libwin_hotkeys_plugin.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\GamesXboxHubAppList.targetsize-80.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagement\ja-JP\MSFT_PackageManagement.schema.mfl.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\hr-hr\ui-strings.js.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-64_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_filter-default_32.svg C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\msader15.dll.mui C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Java\jre-1.8\bin\gstreamer-lite.dll.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Java\jre-1.8\legal\jdk\bcel.md C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\BORDERS\MSART1.BDR C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libmotionblur_plugin.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.contrast-black_scale-200.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Google\Update\1.3.36.151\goopdateres_hu.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\GlobalMock-B.Tests.ps1 C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp2-ul-phn.xrm-ms C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.VCLibs.140.00_14.0.27323.0_x64__8wekyb3d8bbwe\vcruntime140_app.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_filetype_xd.svg.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-si\ui-strings.js C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\System.Xaml.resources.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_OEM_Perp5-pl.xrm-ms.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\InsiderHubWideTile.scale-100_contrast-black.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\MapsAppList.targetsize-40_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\adobe_spinner_mini.gif.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\plugins\rhp\createpdfupsell-app-selector.js C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxA-Generic-Light.scale-100.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_agreement_filetype.svg C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_proxy\identity_helper.Sparse.Internal.msix.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProPlusVL_MAK-ul-phn.xrm-ms.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\PAGESIZE\PGLBL077.XML C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\vccorlib140.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\Microsoft.DiaSymReader.Native.amd64.dll.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\LogoImages\OneNoteLogoSmall.contrast-white_scale-140.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\sql2000.xsl.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\Microsoft.Build.Conversion.v3.5.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\move.svg.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\ro-ro\ui-strings.js.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\System.Windows.Forms.resources.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Java\jdk-1.8\bin\api-ms-win-core-heap-l1-1-0.dll.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail-ul-phn.xrm-ms.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\MSIPC\ko\msipc.dll.mui C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\pages-app\js\nls\da-dk\ui-strings.js.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\images\splashscreen.scale-200.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteAppList.targetsize-48.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-40_altform-unplated.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxCalendarBadge.scale-200.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\images\themes\dark\checkmark.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Office16\ONBttnOL.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\en\DatabaseCompare_col.hxc C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\it\UIAutomationTypes.resources.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\ko-kr\ui-strings.js.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\it-IT\InkObj.dll.mui C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeStudentR_OEM_Perp-pl.xrm-ms C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EQUATION\api-ms-win-crt-environment-l1-1-0.dll C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\vi_get.svg.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\ko\WindowsBase.resources.dll.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\MondoR_BypassTrial180-ppd.xrm-ms C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\PROOF\MSLID.DLL C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-16_altform-lightunplated.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Wide310x150Logo.scale-150.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\EmptyView.scale-200.png C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\ui-strings.js.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
File created C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\stdole.dll.id[8ADA7399-3398].[[email protected]].Elbie C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Enumerates physical storage devices

Checks SCSI registry key(s)

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 C:\Windows\System32\vds.exe N/A
Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\FriendlyName C:\Windows\System32\vds.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 C:\Windows\System32\vds.exe N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\system32\vssadmin.exe N/A
N/A N/A C:\Windows\system32\vssadmin.exe N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeUndockPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeManageVolumePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 33 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 34 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 35 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: 36 N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\system32\wbengine.exe N/A
Token: SeIncreaseQuotaPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSecurityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeTakeOwnershipPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeLoadDriverPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemProfilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemtimePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeProfSingleProcessPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeIncBasePriorityPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeCreatePagefilePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeBackupPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeDebugPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeSystemEnvironmentPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A
Token: SeRemoteShutdownPrivilege N/A C:\Windows\System32\Wbem\WMIC.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4720 wrote to memory of 4336 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 4720 wrote to memory of 4336 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 4720 wrote to memory of 4480 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 4720 wrote to memory of 4480 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 4336 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4336 wrote to memory of 1624 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4480 wrote to memory of 2156 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4480 wrote to memory of 2156 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4336 wrote to memory of 2344 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4336 wrote to memory of 2344 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4480 wrote to memory of 2576 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4480 wrote to memory of 2576 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\netsh.exe
PID 4336 wrote to memory of 3172 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4336 wrote to memory of 3172 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4336 wrote to memory of 4368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4336 wrote to memory of 4368 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4336 wrote to memory of 2784 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 4336 wrote to memory of 2784 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 4720 wrote to memory of 4428 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 4428 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 4428 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 4412 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 5920 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 5920 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 5920 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 1784 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\SysWOW64\mshta.exe
PID 4720 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 4720 wrote to memory of 4076 N/A C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe C:\Windows\system32\cmd.exe
PID 4076 wrote to memory of 3484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4076 wrote to memory of 3484 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\vssadmin.exe
PID 4076 wrote to memory of 5144 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4076 wrote to memory of 5144 N/A C:\Windows\system32\cmd.exe C:\Windows\System32\Wbem\WMIC.exe
PID 4076 wrote to memory of 2292 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4076 wrote to memory of 2292 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4076 wrote to memory of 5124 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4076 wrote to memory of 5124 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\bcdedit.exe
PID 4076 wrote to memory of 5088 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe
PID 4076 wrote to memory of 5088 N/A C:\Windows\system32\cmd.exe C:\Windows\system32\wbadmin.exe

Uses Task Scheduler COM API

persistence

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe

"C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe"

C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe

"C:\Users\Admin\AppData\Local\Temp\58626a9bfb48cd30acd0d95debcaefd188ae794e1e0072c5bde8adae9bccafa6.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\system32\netsh.exe

netsh advfirewall set currentprofile state off

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\netsh.exe

netsh firewall set opmode mode=disable

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

C:\Windows\system32\wbengine.exe

"C:\Windows\system32\wbengine.exe"

C:\Windows\System32\vdsldr.exe

C:\Windows\System32\vdsldr.exe -Embedding

C:\Windows\System32\vds.exe

C:\Windows\System32\vds.exe

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\users\public\desktop\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "C:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\SysWOW64\mshta.exe

"C:\Windows\SysWOW64\mshta.exe" "F:\info.hta" {1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}{1E460BD7-F1C3-4B2E-88BF-4E770A288AF5}

C:\Windows\system32\cmd.exe

"C:\Windows\system32\cmd.exe"

C:\Windows\system32\vssadmin.exe

vssadmin delete shadows /all /quiet

C:\Windows\System32\Wbem\WMIC.exe

wmic shadowcopy delete

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\system32\bcdedit.exe

bcdedit /set {default} recoveryenabled no

C:\Windows\system32\wbadmin.exe

wbadmin delete catalog -quiet

Network

Country Destination Domain Proto
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 g.bing.com udp
US 204.79.197.237:443 g.bing.com tcp
US 8.8.8.8:53 237.197.79.204.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 58.99.105.20.in-addr.arpa udp
US 8.8.8.8:53 132.46.30.184.in-addr.arpa udp
US 8.8.8.8:53 103.169.127.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 130.118.77.104.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 13.227.111.52.in-addr.arpa udp

Files

C:\Program Files\Common Files\microsoft shared\ClickToRun\C2R32.dll.id[8ADA7399-3398].[[email protected]].Elbie

MD5 4c4961dea47750dba1016762196612b8
SHA1 029a8b088826cd7786644a3807c576323348167c
SHA256 1a8d6df6ba564aed45635a7cd025759377e141662332e7b4ee250e96895ebae4
SHA512 3a53bfbfa18a9e6fe9e1b1a787f5bf65f62aa16d83977e57229884bcb3b500143c7deb17963fd549e416f03f2d41550f627f74bb1dff9cbcfa170d0485d928fd

C:\info.hta

MD5 539d6e130b597fee1bfeb8953a4c46f3
SHA1 bb70fd04bb3089323afadd507aca38b2fc2c1dce
SHA256 afff7229e13c10d712b4b8b6328745d0983d8e4022eb62fa560c9ec407997300
SHA512 126e7f17328a7794497093dc176c003bf85436f5b8f0b6b107d953a6941afd0f6bb7354771d5d5500123c324722bc52ad0ba50d4c3f110ac8c24e553053dbd10