Malware Analysis Report

2025-01-18 18:21

Sample ID 241216-veze7awngk
Target bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe
SHA256 5202c8d4e62fa1f8f0c31bbd8bf0c78cda1fe8048fdf9c5542aec932c5738142
Tags
5 367 sodinokibi defense_evasion discovery execution impact ransomware spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

5202c8d4e62fa1f8f0c31bbd8bf0c78cda1fe8048fdf9c5542aec932c5738142

Threat Level: Known bad

The file bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe was found to be: Known bad.

Malicious Activity Summary

5 367 sodinokibi defense_evasion discovery execution impact ransomware spyware stealer

Sodinokibi/Revil sample

Sodin,Sodinokibi,REvil

Sodinokibi family

Deletes shadow copies

Checks computer location settings

Reads user/profile data of web browsers

Enumerates connected drives

Sets desktop wallpaper using registry

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

System Location Discovery: System Language Discovery

Unsigned PE

Interacts with shadow copies

Suspicious behavior: EnumeratesProcesses

Enumerates system info in registry

Modifies system certificate store

Suspicious use of AdjustPrivilegeToken

Suspicious use of WriteProcessMemory

Uses Volume Shadow Copy service COM API

Suspicious behavior: AddClipboardFormatListener

Suspicious use of SetWindowsHookEx

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-12-16 16:54

Signatures

Sodinokibi family

sodinokibi

Sodinokibi/Revil sample

Description Indicator Process Target
N/A N/A N/A N/A

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-12-16 16:54

Reported

2024-12-16 16:57

Platform

win7-20240903-en

Max time kernel

142s

Max time network

145s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe"

Signatures

Sodin,Sodinokibi,REvil

ransomware sodinokibi

Sodinokibi family

sodinokibi

Deletes shadow copies

ransomware defense_evasion impact execution

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\79873b.bmp" C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File created \??\c:\program files\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\CompressUnpublish.TTS C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\DisconnectComplete.mp4 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\ExitSwitch.vbe C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\RedoMount.iso C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\6y576-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\6y576-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\6y576-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files\6y576-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\GroupExpand.m4a C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\LockEnable.rmi C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\RegisterResolve.vstx C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\ResetSubmit.m4a C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\UnprotectWait.sql C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\DisableUndo.gif C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\EnterHide.wma C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\PushPop.ppsx C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\6y576-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\winsxs\Backup\amd64_hid-user.resources_31bf3856ad364e35_6.1.7600.16385_de-de_18a6abaa160568df.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-bitmap-small_31bf3856ad364e35_6.1.7600.16385_none_d7839341959a2de0_smae1255.fon_bf98786c C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-kernel32.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_3b92880831ee8845.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasbase-raspptp_31bf3856ad364e35_6.1.7601.17514_none_f8152447fe76675d_raspptp.sys_25e89db1 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-security-spp.resources_31bf3856ad364e35_6.1.7600.16385_en-us_0311930b84ec63f1.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..y-biometrics-client_31bf3856ad364e35_6.1.7600.16385_none_b1ef16c2e61bf0ef_winbio.dll_7228629e C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..tional-codepage-852_31bf3856ad364e35_6.1.7600.16385_none_2add00d6b4e2da5c.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ditevtlog.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0d09bfa184af61af_msaudite.dll.mui_dc90ce41 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-time-service.resources_31bf3856ad364e35_6.1.7600.16385_en-us_aefabe79adcea8c7.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-i..i_initiator_service_31bf3856ad364e35_6.1.7601.17514_none_42ee5aff60183c81_iscsiwmi.dll_272dd9e6 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-v..skservice.resources_31bf3856ad364e35_6.1.7600.16385_es-es_a1b28f7a4df93e20_vds.exe.mui_2268d934 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-vssapi.resources_31bf3856ad364e35_6.1.7600.16385_de-de_9894314efe077185_vsstrace.dll.mui_3a1fe238 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-htmlhelp.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_4a682ad78c5fa6ab_hh.exe.mui_2744e397 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-c..ermodepnp.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_764da6e9e903db65_umpnpmgr.dll.mui_d66aed17 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-dns-client.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_bb763253eb8e2ed8.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-eventlog-api.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ae9bda912e7a71a5.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ditevtlog.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b5fa959a738d6d74.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rasauto-mui.resources_31bf3856ad364e35_6.1.7600.16385_en-us_23268e5d5ff07ea1_rasauto.dll.mui_12fa2c50 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..temclient.resources_31bf3856ad364e35_6.1.7600.16385_es-es_2dfecca11d70a2c0_winscard.dll.mui_4a82d97e C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-u..em-config.resources_31bf3856ad364e35_6.1.7600.16385_en-us_edb61e94e4562781_uicom.dll.mui_4fdc61f8 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_6.1.7600.16385_de-de_9220543b26dc7c09_mofcomp.exe.mui_35badf56 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-c..integrity.resources_31bf3856ad364e35_6.1.7600.16385_de-de_ac389c4f782d818f.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..truetype-couriernew_31bf3856ad364e35_6.1.7600.16385_none_32383eb7c6ebfd9b_courbi.ttf_7ee31c80 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-legacyhwui.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_4f8ceabc4666dfe3_hdwwiz.exe.mui_b4acc7bc C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..unterinfrastructure_31bf3856ad364e35_6.1.7601.17514_none_da00ad1949e715ad.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-commonlog.resources_31bf3856ad364e35_6.1.7600.16385_it-it_faf875fbde5d30aa_clfs.sys.mui_1310ba12 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-font-vector_31bf3856ad364e35_6.1.7600.16385_none_91899a68016a48be_script.fon_0c43f9ec C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-gdi32_31bf3856ad364e35_6.1.7601.17514_none_c1f959bd9451d7a7.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-f..libraries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_d63ded3632fdfecd_ulib.dll.mui_bb7d4db5 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_el-gr_48ceb193bd39ded0_msimsg.dll.mui_72e8994f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-rpc-local.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_ca623cf7dc24c5d3.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-legacyhwui.resources_31bf3856ad364e35_6.1.7600.16385_es-es_acd574bd5394c981_hdwwiz.cpl.mui_cdafedff C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..temclient.resources_31bf3856ad364e35_6.1.7600.16385_de-de_854299c42e6ba556.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-com-base.resources_31bf3856ad364e35_6.1.7600.16385_it-it_4500db6c6927212c_ole32.dll.mui_5035d60a C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-t..-msctfime.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_eb06c896b1e71881.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..etype-sakkalmajalla_31bf3856ad364e35_6.1.7600.16385_none_fb8092e2c0173c39_majalla.ttf_5a048cf2 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-lua.resources_31bf3856ad364e35_6.1.7600.16385_en-us_4a7fbba98600197c_consent.exe.mui_2eb3b9db C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..ck-legacy.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_4a338035a6b605bd_wsock32.dll.mui_18b23987 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-comdlg32.resources_31bf3856ad364e35_6.1.7601.17514_da-dk_46e12cf1dd7ba188_comdlg32.dll.mui_ac8e62f4 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-advapi32.resources_31bf3856ad364e35_6.1.7600.16385_it-it_0129330494b0e3c3.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-f..uetype-malgungothic_31bf3856ad364e35_6.1.7600.16385_none_6144d01edfdac19c_malgun.ttf_166813d8 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-msxml60.resources_31bf3856ad364e35_6.1.7600.16385_it-it_be330d1f6b36cea6.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-t..libraries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_7aec48ea1bde353f_iphlpapi.dll.mui_9531144c C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-tcpip.resources_31bf3856ad364e35_6.1.7600.16385_de-de_2327f9833f998849_tcpip.sys.mui_5885771c C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..vironment-os-loader_31bf3856ad364e35_6.1.7601.17514_none_b94cbfa183466a89_winresume.exe_85cd1215 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-lsa.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_116d0e2f6d925d2e.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-tabletpc-softkeyboard_31bf3856ad364e35_6.1.7601.17514_none_2fd7b56967fc5c76_ko-kr.xml_d27c4771 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-w..e-ws2ifsl.resources_31bf3856ad364e35_6.1.7600.16385_de-de_dcb97024f9925cb8_ws2ifsl.sys.mui_b672c7b4 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-i..er-engine.resources_31bf3856ad364e35_6.1.7601.17514_sr-..-cs_2c1fb02935715739_msimsg.dll.mui_72e8994f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-mfc42x.resources_31bf3856ad364e35_6.1.7600.16385_es-es_1e62076fa8dcca99.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-security-netlogon_31bf3856ad364e35_6.1.7601.17514_none_5bddbcb24e997298_nlsvc.mof_c4f094c8 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-bootvid_31bf3856ad364e35_6.1.7600.16385_none_384fd19ce787f20c_bootvid.dll_c188118d C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-s..temclient.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_d0b642a01042b922_winscard.dll.mui_4a82d97e C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-s..subsystem.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_961efb4172b82af7_sccls.dll.mui_f104be47 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-b..os-loader.resources_31bf3856ad364e35_6.1.7600.16385_en-us_d28dabacfdb4dd1a_winload.efi.mui_35ee487d C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-m..ntmanager.resources_31bf3856ad364e35_6.1.7600.16385_en-us_9902227058f81032.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-security-spp.resources_31bf3856ad364e35_6.1.7600.16385_en-us_f8bce8b9508ba1f6.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\x86_microsoft-windows-mssign32-dll.resources_31bf3856ad364e35_6.1.7600.16385_en-us_bdcd9cc255349b63.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-smartcardsubsystem_31bf3856ad364e35_6.1.7601.17514_none_76234513809272a3_scardsvr.dll_b84d047c C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..structure.resources_31bf3856ad364e35_6.1.7601.17514_en-us_cd970b6106ea9e70_unlodctr.exe.mui_53acc4d0 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-rpc-local.resources_31bf3856ad364e35_6.1.7600.16385_es-es_f77bed28d763294e.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft.windows.winhttp.resources_31bf3856ad364e35_6.0.7600.16385_en-us_996035be5f5e2c15_winhttp.dll.mui_f661192f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\wow64_microsoft-windows-p..installerandprintui_31bf3856ad364e35_6.1.7601.17514_none_3eceef6140ec9728.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\winsxs\Backup\amd64_microsoft-windows-d..memanager.resources_31bf3856ad364e35_6.1.7600.16385_de-de_5797a7f9b2be5a11.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\vssadmin.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Interacts with shadow copies

ransomware
Description Indicator Process Target
N/A N/A C:\Windows\SysWOW64\vssadmin.exe N/A

Modifies system certificate store

evasion spyware trojan
Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeBackupPrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeRestorePrivilege N/A C:\Windows\system32\vssvc.exe N/A
Token: SeAuditPrivilege N/A C:\Windows\system32\vssvc.exe N/A

Uses Volume Shadow Copy service COM API

ransomware

Processes

C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe

"C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures

C:\Windows\SysWOW64\vssadmin.exe

vssadmin.exe Delete Shadows /All /Quiet

C:\Windows\system32\vssvc.exe

C:\Windows\system32\vssvc.exe

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde

Network

Country Destination Domain Proto
US 8.8.8.8:53 craftingalegacy.com udp
US 50.87.137.113:443 craftingalegacy.com tcp
US 50.87.137.113:443 craftingalegacy.com tcp
US 8.8.8.8:53 g2mediainc.com udp
DE 78.46.1.42:443 g2mediainc.com tcp
US 8.8.8.8:53 brinkdoepke.eu udp
DE 92.205.192.141:443 brinkdoepke.eu tcp
DE 92.205.192.141:443 brinkdoepke.eu tcp
US 8.8.8.8:53 vipcarrental.ae udp
US 172.67.153.12:443 vipcarrental.ae tcp
US 8.8.8.8:53 autoteamlast.de udp
DE 37.202.7.169:443 autoteamlast.de tcp
DE 37.202.7.169:443 autoteamlast.de tcp
US 8.8.8.8:53 hostastay.com udp
SG 13.229.198.152:443 hostastay.com tcp
US 8.8.8.8:53 gavelmasters.com udp
US 8.8.8.8:53 ronaldhendriks.nl udp
NL 185.103.16.188:443 ronaldhendriks.nl tcp
NL 185.103.16.188:443 ronaldhendriks.nl tcp
US 8.8.8.8:53 successcolony.com.ng udp
US 8.8.8.8:53 medicalsupportco.com udp
US 15.197.225.128:443 medicalsupportco.com tcp
US 15.197.225.128:443 medicalsupportco.com tcp
US 8.8.8.8:53 kompresory-opravy.com udp
SK 37.9.175.133:443 kompresory-opravy.com tcp
SK 37.9.175.133:443 kompresory-opravy.com tcp
US 8.8.8.8:53 sveneulberg.de udp
DE 89.110.179.179:443 sveneulberg.de tcp
DE 89.110.179.179:443 sveneulberg.de tcp
US 8.8.8.8:53 oththukaruva.com udp
US 8.8.8.8:53 voetbalhoogeveen.nl udp
US 8.8.8.8:53 selected-minds.de udp
DE 217.160.0.92:443 selected-minds.de tcp
DE 217.160.0.92:443 selected-minds.de tcp
US 8.8.8.8:53 log-barn.co.uk udp
GB 213.175.208.90:443 log-barn.co.uk tcp
GB 213.175.208.90:443 log-barn.co.uk tcp
US 8.8.8.8:53 fsbforsale.com udp
US 8.8.8.8:53 jobkiwi.com.ng udp
US 8.8.8.8:53 ivancacu.com udp
DE 217.160.0.237:443 ivancacu.com tcp
DE 217.160.0.237:443 ivancacu.com tcp
US 8.8.8.8:53 11.in.ua udp
UA 91.225.81.9:443 11.in.ua tcp
US 8.8.8.8:53 irizar.com udp
ES 194.30.99.95:443 irizar.com tcp
ES 194.30.99.95:443 irizar.com tcp
US 8.8.8.8:53 colored-shelves.com udp
US 8.8.8.8:53 soundseeing.net udp
DE 85.13.155.183:443 soundseeing.net tcp
DE 85.13.155.183:443 soundseeing.net tcp
US 8.8.8.8:53 scotlandsroute66.co.uk udp
US 172.67.204.127:443 scotlandsroute66.co.uk tcp
US 8.8.8.8:53 hawaiisteelbuilding.com udp
US 199.16.172.213:443 hawaiisteelbuilding.com tcp
US 199.16.172.213:443 hawaiisteelbuilding.com tcp
US 8.8.8.8:53 mindfuelers.com udp
US 104.21.96.155:443 mindfuelers.com tcp
US 104.21.96.155:443 mindfuelers.com tcp
US 8.8.8.8:53 dentourage.com udp
US 8.8.8.8:53 hekecrm.com udp
CN 38.14.23.10:443 hekecrm.com tcp
US 8.8.8.8:53 finsahome.co.uk udp
DE 217.160.0.87:443 finsahome.co.uk tcp
DE 217.160.0.87:443 finsahome.co.uk tcp
US 8.8.8.8:53 cormanmarketing.com udp
US 34.174.215.122:443 cormanmarketing.com tcp
US 34.174.215.122:443 cormanmarketing.com tcp
US 8.8.8.8:53 morgansconsult.com udp
GB 35.214.25.158:443 morgansconsult.com tcp
GB 35.214.25.158:443 morgansconsult.com tcp
US 8.8.8.8:53 dnqa.co.uk udp
US 104.155.138.21:443 dnqa.co.uk tcp
US 8.8.8.8:53 frimec-international.es udp
FR 188.165.33.133:443 frimec-international.es tcp
US 8.8.8.8:53 worldproskitour.com udp
US 143.198.7.126:443 worldproskitour.com tcp
US 8.8.8.8:53 csaballoons.com udp
CA 149.56.43.78:443 csaballoons.com tcp
CA 149.56.43.78:443 csaballoons.com tcp
US 8.8.8.8:53 krishnabrawijaya.com udp
US 8.8.8.8:53 tatyanakopieva.ru udp
RU 77.222.40.195:443 tatyanakopieva.ru tcp
RU 77.222.40.195:443 tatyanakopieva.ru tcp
US 8.8.8.8:53 silkeight.com udp
RO 188.213.19.166:443 silkeight.com tcp
RO 188.213.19.166:443 silkeight.com tcp
US 8.8.8.8:53 publicompserver.de udp
DE 195.3.195.201:443 publicompserver.de tcp
DE 195.3.195.201:443 publicompserver.de tcp
US 8.8.8.8:53 letsstopsmoking.co.uk udp
GB 62.182.18.149:443 letsstopsmoking.co.uk tcp
GB 62.182.18.149:443 letsstopsmoking.co.uk tcp
US 8.8.8.8:53 anleggsregisteret.no udp
NO 185.157.56.11:443 anleggsregisteret.no tcp
NO 185.157.56.11:443 anleggsregisteret.no tcp
US 8.8.8.8:53 arearugcleaningnyc.com udp
US 108.178.17.142:443 arearugcleaningnyc.com tcp
US 108.178.17.142:443 arearugcleaningnyc.com tcp
US 8.8.8.8:53 diverfiestas.com.es udp
FR 176.31.163.21:443 diverfiestas.com.es tcp
US 8.8.8.8:53 lovcase.com udp
US 8.8.8.8:53 alltagsrassismus-entknoten.de udp
DE 91.210.225.23:443 alltagsrassismus-entknoten.de tcp
DE 91.210.225.23:443 alltagsrassismus-entknoten.de tcp
US 8.8.8.8:53 lassocrm.com udp
US 209.87.149.78:443 lassocrm.com tcp
US 209.87.149.78:443 lassocrm.com tcp
US 8.8.8.8:53 boyfriendsgoal.site udp
US 8.8.8.8:53 mbuildinghomes.com udp
US 104.21.16.1:443 mbuildinghomes.com tcp
US 8.8.8.8:53 santastoy.store udp
US 8.8.8.8:53 citiscapes-art.com udp
US 104.21.21.241:443 citiscapes-art.com tcp
US 8.8.8.8:53 unislaw-narty.pl udp
PL 91.185.184.170:443 unislaw-narty.pl tcp
US 8.8.8.8:53 envomask.com udp
US 172.81.116.97:443 envomask.com tcp
US 172.81.116.97:443 envomask.com tcp
US 8.8.8.8:53 patassociation.com udp
FR 109.234.160.199:443 patassociation.com tcp
FR 109.234.160.199:443 patassociation.com tcp
US 8.8.8.8:53 luvbec.com udp
US 172.232.25.148:443 luvbec.com tcp
US 172.232.25.148:443 luvbec.com tcp
US 8.8.8.8:53 keuken-prijs.nl udp
US 8.8.8.8:53 therapybusinessacademy.com udp
DE 217.160.0.95:443 therapybusinessacademy.com tcp
DE 217.160.0.95:443 therapybusinessacademy.com tcp
US 8.8.8.8:53 baikalflot.ru udp
US 8.8.8.8:53 piestar.com udp
US 35.170.173.134:443 piestar.com tcp
US 35.170.173.134:443 piestar.com tcp
US 8.8.8.8:53 diakonie-weitramsdorf-sesslach.de udp
DE 78.46.133.97:443 diakonie-weitramsdorf-sesslach.de tcp
DE 78.46.133.97:443 diakonie-weitramsdorf-sesslach.de tcp
US 8.8.8.8:53 klapanvent.ru udp
RU 77.222.40.14:443 klapanvent.ru tcp
RU 77.222.40.14:443 klapanvent.ru tcp
US 8.8.8.8:53 fysiotherapierijnmond.nl udp
NL 178.128.138.113:443 fysiotherapierijnmond.nl tcp
NL 178.128.138.113:443 fysiotherapierijnmond.nl tcp
US 8.8.8.8:53 avis.mantova.it udp
IT 217.64.195.176:443 avis.mantova.it tcp
IT 217.64.195.176:443 avis.mantova.it tcp
US 8.8.8.8:53 fla.se udp
SE 91.201.63.7:443 fla.se tcp
US 8.8.8.8:53 sjtpo.org udp
US 65.60.10.226:443 sjtpo.org tcp
US 65.60.10.226:443 sjtpo.org tcp
US 8.8.8.8:53 kroophold-sjaelland.dk udp
DK 178.20.216.245:443 kroophold-sjaelland.dk tcp

Files

memory/2232-0-0x0000000000EE0000-0x0000000000F0E000-memory.dmp

memory/2232-2-0x00000000000E0000-0x00000000000EA000-memory.dmp

memory/2232-9-0x00000000001D0000-0x00000000001EF000-memory.dmp

memory/2232-11-0x0000000000120000-0x0000000000126000-memory.dmp

memory/2232-10-0x0000000002640000-0x0000000002749000-memory.dmp

memory/2232-8-0x0000000002310000-0x000000000243D000-memory.dmp

memory/2232-5-0x0000000000D30000-0x0000000000DCF000-memory.dmp

memory/2232-7-0x0000000000110000-0x0000000000111000-memory.dmp

memory/2232-6-0x0000000000100000-0x0000000000101000-memory.dmp

memory/2232-4-0x00000000000F0000-0x00000000000F1000-memory.dmp

memory/2232-3-0x0000000000C60000-0x0000000000D29000-memory.dmp

memory/2232-1-0x00000000000E0000-0x00000000000EA000-memory.dmp

memory/2232-12-0x0000000000120000-0x0000000000126000-memory.dmp

memory/2232-14-0x0000000002B10000-0x0000000002B20000-memory.dmp

memory/2232-15-0x0000000000EE0000-0x0000000000F0E000-memory.dmp

memory/2232-16-0x0000000000110000-0x0000000000111000-memory.dmp

memory/2232-17-0x0000000002B10000-0x0000000002B20000-memory.dmp

C:\Users\6y576-readme.txt

MD5 1b15c5ce708d55af75929285f4afe88d
SHA1 252f18e9d4d9c4b624a6ee0b326151b79fc45d20
SHA256 15a5fd33dede895adfcb3de3ed4d025073083c9a2c9821cb6939b2684ecd8353
SHA512 dd24bf9e98fd80c78bf0251965a4dca2c81c2d97e54af47ab7ab0497c184bba8b5754773cc3f6ad62e125c0cb24f81a73e0907cd370dabb6d7fc58c44e7f1174

C:\Users\Admin\AppData\Local\Temp\Cab4636.tmp

MD5 49aebf8cbd62d92ac215b2923fb1b9f5
SHA1 1723be06719828dda65ad804298d0431f6aff976
SHA256 b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512 bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

C:\Users\Admin\AppData\Local\Temp\Tar4649.tmp

MD5 4ea6026cf93ec6338144661bf1202cd1
SHA1 a1dec9044f750ad887935a01430bf49322fbdcb7
SHA256 8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA512 6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

memory/1804-534-0x000000005FFF0000-0x0000000060000000-memory.dmp

memory/1804-535-0x000000005FFF0000-0x0000000060000000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-12-16 16:54

Reported

2024-12-16 16:57

Platform

win10v2004-20241007-en

Max time kernel

149s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe"

Signatures

Sodin,Sodinokibi,REvil

ransomware sodinokibi

Sodinokibi family

sodinokibi

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Reads user/profile data of web browsers

spyware stealer

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\B: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\D: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\A: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Sets desktop wallpaper using registry

ransomware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\gb5.bmp" C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification \??\c:\program files\RestartOpen.tmp C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\DisableApprove.xsl C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\FindInitialize.mov C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\RepairCompare.raw C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\734r84p-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files\734r84p-readme.txt C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files (x86)\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\UnlockEnable.xltm C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\ResumeJoin.mov C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\SyncRename.mpeg3 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\TraceRevoke.vsdm C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\UnregisterRestart.3gp C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File created \??\c:\program files\d60dff40.lock C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\FormatTest.vsw C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification \??\c:\program files\ProtectRename.js C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rasserver.resources_31bf3856ad364e35_10.0.19041.1_en-us_313221c95b98e24b_iprtrmgr.dll.mui_eb023b92 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1023_zh-cn_eebdbe6a380cfa05_comctl32.dll.mui_0da4e682 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-lsa-minwin_31bf3856ad364e35_10.0.19041.906_none_25e4da38255df869.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tcpip-driver_31bf3856ad364e35_10.0.19041.1288_none_4cc02c3b6c5e5630_tcpip.sys_3339bd51 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_0f5d37c71d62a4d7.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-h..p-provsvc.resources_31bf3856ad364e35_10.0.19041.1_es-es_29361d4fb963a715.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..ng-client-overrides_31bf3856ad364e35_10.0.19041.1266_none_8e5f726ca832e39d_power.settings.graphics.ppkg_84d8ed15 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-eventlog.resources_31bf3856ad364e35_10.0.19041.1_es-es_53c339fa60537c35_wevtsvc.dll.mui_f41bf7b7 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lddmcore_31bf3856ad364e35_10.0.19041.1288_none_20903f2898bc8195_dxgmms2.sys_9c8fa39d C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-p..ne-client-overrides_31bf3856ad364e35_10.0.19041.1_none_e861ceb4c1ca233e.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-m..ntmanager.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_9581112fd19d980d_mountmgr.sys.mui_71b54a25 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..rservice-extensions_31bf3856ad364e35_10.0.19041.1_none_82800b59c5803dfa.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_zh-cn_d6b579a445ec38dd_memtest.exe.mui_77b8cbcc C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-cryptsp-dll_31bf3856ad364e35_10.0.19041.546_none_11ab5f5f99fc8eda.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_windows-defender-service_31bf3856ad364e35_10.0.19041.746_none_a39f6d9ab59bd8b7_mprtp.dll_0827df93 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-h..p-listsvc.resources_31bf3856ad364e35_10.0.19041.1_it-it_ad9e9ef8adfd68d5_listsvc.dll.mui_27f0fc85 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_hr-hr_62136920e50c8595_bootmgr.exe.mui_c434701f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft-windows-b..ager-pcat.resources_31bf3856ad364e35_10.0.19041.1_sl-si_60a279d553aa108e_bootmgr.exe.mui_c434701f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..-configuration-data_31bf3856ad364e35_10.0.19041.546_none_e065b8727ebe89c3.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-kernel32_31bf3856ad364e35_10.0.19041.1202_none_087e122b0b81e049.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-profsvc.resources_31bf3856ad364e35_10.0.19041.1_de-de_73bc4b6cb4f35f70.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-shcore_31bf3856ad364e35_10.0.19041.1266_none_3b39b089d666f64f.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1_hu-hu_92e52d62550995c1.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lua-onecore.resources_31bf3856ad364e35_10.0.19041.1_de-de_848402175f135dad.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-com-base-qfe-rpcss_31bf3856ad364e35_10.0.19041.207_none_47f05d449c8dfad1.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_de-de_e1c7c5c5782839e2_wmiapres.dll.mui_c1b8803f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_hu-hu_fd01b7045f001002.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-onecore-ras-base-vpn_31bf3856ad364e35_10.0.19041.1_none_d24e62087d8454d4.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-s..ty-kerbclientshared_31bf3856ad364e35_10.0.19041.1288_none_56c05939711f0938_kerbclientshared.dll_1fa7b356 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-duser_31bf3856ad364e35_10.0.19041.1_none_1065bbcc9bd80874.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-e..storage-classdriver_31bf3856ad364e35_10.0.19041.1_none_13e0a2d70bde69d7.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-smartcardsubsystem_31bf3856ad364e35_10.0.19041.844_none_f5f48bc2c8c3f7a0_scdeviceenum.dll_01ce0fa9 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wininit_31bf3856ad364e35_10.0.19041.1202_none_a5b2e5b8b986fe3d.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_ru-ru_c05026eaafcf5a72_memtest.exe.mui_77b8cbcc C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tcpip_31bf3856ad364e35_10.0.19041.746_none_3f7ee0a8ee28ef7d.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tunnel_31bf3856ad364e35_10.0.19041.1_none_595b16922411e0f5_tunnel.sys_90392579 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-d..ndowmanager-effects_31bf3856ad364e35_10.0.19041.546_none_cefcfcd89d8d8a93.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_es-es_8a83f8a2672d374c_wmiapsrv.exe.mui_b1567840 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-pdc-mw_31bf3856ad364e35_10.0.19041.1052_none_97ace0ce224e6958_pdc.sys_dcf04bf8 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-sens-service.resources_31bf3856ad364e35_10.0.19041.1_de-de_22421b8ad284b186_sens.dll.mui_64739194 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..llservice.resources_31bf3856ad364e35_10.0.19041.1_de-de_6ace49ac53b0c2de_axinstsv.dll.mui_be092a2d C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-lsa.resources_31bf3856ad364e35_10.0.19041.1_de-de_93a80bdc471ad1dd_lsasrv.dll.mui_d47f7e1c C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-rpc-endpointmapper_31bf3856ad364e35_10.0.19041.662_none_2872266c417996fa_rpcepmap.dll_f3295d6a C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-v..skservice.resources_31bf3856ad364e35_10.0.19041.1_de-de_af1113fd9cfe31c0.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1023_nl-nl_2fcd1b9b27a6e45b_comctl32.dll.mui_0da4e682 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-a..on-authui-component_31bf3856ad364e35_10.0.19041.906_none_bafbd92e6e868958_authui.dll.mun_19b9291e C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..iagnostic.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_0f5d37c71d62a4d7_memtest.efi.mui_71e15c22 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_es-mx_36cb4cea87054a3a_bootmgr.efi.mui_be5d0075 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-network-qos-pacer_31bf3856ad364e35_10.0.19041.546_none_d55698a60aca383c_wshqos.dll_f1749d15 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-winsock-helper-tcpip_31bf3856ad364e35_10.0.19041.546_none_b400f714c4b791cc_wshtcpip.dll_7ee2ca52 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_5.82.19041.1023_nl-nl_8ff07c31ee6f4500_comctl32.dll.mui_0da4e682 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-netapi32_31bf3856ad364e35_10.0.19041.1_none_43252896a0ed64ad.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-shell32_31bf3856ad364e35_10.0.19041.1266_none_eb43a8b5fb8e05e3_shell32.dll_0d29dca9 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-os-kernel-minwin_31bf3856ad364e35_10.0.19041.1_none_edeab141cae009ac.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-u..istration.resources_31bf3856ad364e35_10.0.19041.1_es-es_197e86f61a60a3c7_dsreg.dll.mui_5d9efc7e C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_c3dd8e4758ad0702_wmiutils.dll.mui_42583eaf C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-b..nager-efi.resources_31bf3856ad364e35_10.0.19041.1_sv-se_19e50489d0787aec.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\wow64_microsoft-windows-gdi32_31bf3856ad364e35_10.0.19041.1_none_19c461d21d0fd3e1.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-tcpip.resources_31bf3856ad364e35_10.0.19041.1_en-us_823386dc6c818518_netiougc.exe.mui_ad7a9e4d C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-winlogon.resources_31bf3856ad364e35_10.0.19041.1_de-de_d7f8c915b495ecf0_winlogon.exe.mui_3280fc46 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-wmi-core.resources_31bf3856ad364e35_10.0.19041.1_es-es_8a83f8a2672d374c_wmiapres.dll.mui_c1b8803f C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_networking-mpssvc-drv.resources_31bf3856ad364e35_10.0.19041.1_de-de_5ac486cc36468b2c_mpsdrv.sys.mui_b2aea3b6 C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\x86_microsoft.windows.c..-controls.resources_6595b64144ccf1df_6.0.19041.1_en-us_130e63d987a738df.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
File opened for modification C:\Windows\WinSxS\Backup\amd64_microsoft-windows-directui-resourcesrs2_31bf3856ad364e35_10.0.19041.1_none_11f3e33d012053e7.manifest C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A

Enumerates physical storage devices

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\SysWOW64\cmd.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe

"C:\Users\Admin\AppData\Local\Temp\bf7114f025fff7dbc6b7aff8e4edb0dd8a7b53c3766429a3c5f10142609968f9_00920000_dump_SCY.exe"

C:\Windows\SysWOW64\cmd.exe

"C:\Windows\System32\cmd.exe" /c vssadmin.exe Delete Shadows /All /Quiet & bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures

Network

Country Destination Domain Proto
US 8.8.8.8:53 58.55.71.13.in-addr.arpa udp
US 8.8.8.8:53 14.160.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 133.211.185.52.in-addr.arpa udp
US 8.8.8.8:53 13.86.106.20.in-addr.arpa udp
US 8.8.8.8:53 104.219.191.52.in-addr.arpa udp
US 8.8.8.8:53 212.20.149.52.in-addr.arpa udp
US 8.8.8.8:53 69.31.126.40.in-addr.arpa udp
US 8.8.8.8:53 198.187.3.20.in-addr.arpa udp
US 8.8.8.8:53 18.134.221.88.in-addr.arpa udp
US 8.8.8.8:53 craftingalegacy.com udp
US 50.87.137.113:443 craftingalegacy.com tcp
US 8.8.8.8:53 g2mediainc.com udp
DE 78.46.1.42:443 g2mediainc.com tcp
US 8.8.8.8:53 113.137.87.50.in-addr.arpa udp
US 8.8.8.8:53 brinkdoepke.eu udp
DE 92.205.192.141:443 brinkdoepke.eu tcp
US 8.8.8.8:53 vipcarrental.ae udp
US 172.67.153.12:443 vipcarrental.ae tcp
US 8.8.8.8:53 42.1.46.78.in-addr.arpa udp
US 8.8.8.8:53 12.153.67.172.in-addr.arpa udp
US 8.8.8.8:53 141.192.205.92.in-addr.arpa udp
US 8.8.8.8:53 autoteamlast.de udp
DE 37.202.7.169:443 autoteamlast.de tcp
US 8.8.8.8:53 hostastay.com udp
US 8.8.8.8:53 169.7.202.37.in-addr.arpa udp
SG 13.229.198.152:443 hostastay.com tcp
US 8.8.8.8:53 101.210.23.2.in-addr.arpa udp
US 8.8.8.8:53 gavelmasters.com udp
US 8.8.8.8:53 ronaldhendriks.nl udp
NL 185.103.16.188:443 ronaldhendriks.nl tcp
US 8.8.8.8:53 successcolony.com.ng udp
US 8.8.8.8:53 188.16.103.185.in-addr.arpa udp
US 8.8.8.8:53 medicalsupportco.com udp
US 3.33.251.168:443 medicalsupportco.com tcp
US 3.33.251.168:443 medicalsupportco.com tcp
US 3.33.251.168:443 medicalsupportco.com tcp
US 8.8.8.8:53 kompresory-opravy.com udp
SK 37.9.175.133:443 kompresory-opravy.com tcp
US 8.8.8.8:53 sveneulberg.de udp
DE 89.110.179.179:443 sveneulberg.de tcp
US 8.8.8.8:53 133.175.9.37.in-addr.arpa udp
US 8.8.8.8:53 168.251.33.3.in-addr.arpa udp
US 8.8.8.8:53 www.sveneulberg.de udp
DE 89.110.179.179:443 www.sveneulberg.de tcp
US 8.8.8.8:53 oththukaruva.com udp
US 8.8.8.8:53 voetbalhoogeveen.nl udp
US 8.8.8.8:53 selected-minds.de udp
DE 217.160.0.92:443 selected-minds.de tcp
US 8.8.8.8:53 179.179.110.89.in-addr.arpa udp
US 8.8.8.8:53 92.0.160.217.in-addr.arpa udp
US 8.8.8.8:53 log-barn.co.uk udp
GB 213.175.208.90:443 log-barn.co.uk tcp
US 8.8.8.8:53 fsbforsale.com udp
US 8.8.8.8:53 jobkiwi.com.ng udp
US 8.8.8.8:53 ivancacu.com udp
DE 217.160.0.237:443 ivancacu.com tcp
US 8.8.8.8:53 11.in.ua udp
UA 91.225.81.9:443 11.in.ua tcp
US 8.8.8.8:53 237.0.160.217.in-addr.arpa udp
US 8.8.8.8:53 90.208.175.213.in-addr.arpa udp
US 8.8.8.8:53 irizar.com udp
ES 194.30.99.95:443 irizar.com tcp
US 8.8.8.8:53 www.irizar.com udp
ES 194.30.99.95:443 www.irizar.com tcp
US 8.8.8.8:53 colored-shelves.com udp
US 8.8.8.8:53 soundseeing.net udp
DE 85.13.155.183:443 soundseeing.net tcp
US 8.8.8.8:53 95.99.30.194.in-addr.arpa udp
US 8.8.8.8:53 9.81.225.91.in-addr.arpa udp
US 8.8.8.8:53 scotlandsroute66.co.uk udp
US 172.67.204.127:443 scotlandsroute66.co.uk tcp
US 8.8.8.8:53 hawaiisteelbuilding.com udp
US 199.16.172.213:443 hawaiisteelbuilding.com tcp
US 8.8.8.8:53 127.204.67.172.in-addr.arpa udp
US 8.8.8.8:53 183.155.13.85.in-addr.arpa udp
US 8.8.8.8:53 mindfuelers.com udp
US 104.21.96.155:443 mindfuelers.com tcp
US 8.8.8.8:53 dentourage.com udp
US 8.8.8.8:53 213.172.16.199.in-addr.arpa udp
US 8.8.8.8:53 155.96.21.104.in-addr.arpa udp
US 8.8.8.8:53 hekecrm.com udp
CN 38.14.23.10:443 hekecrm.com tcp
US 8.8.8.8:53 31.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 finsahome.co.uk udp
DE 217.160.0.87:443 finsahome.co.uk tcp
US 8.8.8.8:53 cormanmarketing.com udp
US 34.174.215.122:443 cormanmarketing.com tcp
US 8.8.8.8:53 87.0.160.217.in-addr.arpa udp
US 8.8.8.8:53 morgansconsult.com udp
GB 35.214.25.158:443 morgansconsult.com tcp
US 8.8.8.8:53 dnqa.co.uk udp
US 107.178.223.183:443 dnqa.co.uk tcp
US 8.8.8.8:53 frimec-international.es udp
FR 188.165.33.133:443 frimec-international.es tcp
US 8.8.8.8:53 122.215.174.34.in-addr.arpa udp
US 8.8.8.8:53 158.25.214.35.in-addr.arpa udp
US 8.8.8.8:53 183.223.178.107.in-addr.arpa udp
US 8.8.8.8:53 www.frimec-international.es udp
FR 188.165.33.133:443 www.frimec-international.es tcp
US 8.8.8.8:53 worldproskitour.com udp
US 143.198.7.126:443 worldproskitour.com tcp
US 8.8.8.8:53 133.33.165.188.in-addr.arpa udp
US 8.8.8.8:53 csaballoons.com udp
CA 149.56.43.78:443 csaballoons.com tcp
US 8.8.8.8:53 krishnabrawijaya.com udp
US 8.8.8.8:53 tatyanakopieva.ru udp
RU 77.222.40.195:443 tatyanakopieva.ru tcp
US 8.8.8.8:53 78.43.56.149.in-addr.arpa udp
US 8.8.8.8:53 195.40.222.77.in-addr.arpa udp
US 8.8.8.8:53 silkeight.com udp
RO 188.213.19.166:443 silkeight.com tcp
US 8.8.8.8:53 publicompserver.de udp
DE 195.3.195.201:443 publicompserver.de tcp
US 8.8.8.8:53 166.19.213.188.in-addr.arpa udp
US 8.8.8.8:53 letsstopsmoking.co.uk udp
GB 62.182.18.149:443 letsstopsmoking.co.uk tcp
US 8.8.8.8:53 201.195.3.195.in-addr.arpa udp
US 8.8.8.8:53 149.18.182.62.in-addr.arpa udp
US 8.8.8.8:53 anleggsregisteret.no udp
NO 185.157.56.11:443 anleggsregisteret.no tcp
US 8.8.8.8:53 arearugcleaningnyc.com udp
US 108.178.17.142:443 arearugcleaningnyc.com tcp
US 8.8.8.8:53 11.56.157.185.in-addr.arpa udp
US 8.8.8.8:53 142.17.178.108.in-addr.arpa udp
US 8.8.8.8:53 diverfiestas.com.es udp
FR 176.31.163.21:443 diverfiestas.com.es tcp

Files

memory/8-0-0x0000000000490000-0x00000000004BE000-memory.dmp

memory/8-1-0x0000000000490000-0x00000000004BE000-memory.dmp

C:\Users\734r84p-readme.txt

MD5 2a68ef019c828c1ec186e602d4ac173d
SHA1 036b679295875d62b8d4ba39c557bc379f27a440
SHA256 0293f4220280948a72546a84e8cfc4dab2711779177237d2768b0d3c0faf64b8
SHA512 60a5f0b055fbfc28855352c48dcdf61147ff2df3d06d565b43ba60e07e99d7d0d8ac8479a02ee29dc8b2ff88f4f50f27ec214dce5594c746a36ef9f8d18074b5