Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 09:53
Static task
static1
Behavioral task
behavioral1
Sample
2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe
Resource
win10v2004-20240802-en
General
-
Target
2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe
-
Size
624KB
-
MD5
ec5b1a6de3564c26c4e0e804e6bc2ecb
-
SHA1
a8b0861e4596d21d1a2903dc3add32e1989ce723
-
SHA256
91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d
-
SHA512
886550e2ec4a75ac15557d0a286bbfbdf00983c52458b3db6e4977b4a77d15992c0bf873da5986f0c838dc672890b3e0942bbbdd405a8a349a3d9769ba1993b2
-
SSDEEP
12288:vRdW6SXZbE3ZoBUMv+bFDYBJQsZwhHQWIZ6+aAvtKJCO1Mw2BhgWpndg80EIwbSe:bmpThJmVSvGWEcXvvKw4IRRs3WPOFqp
Malware Config
Extracted
F:\!!!READ_ME_MEDUSA!!!.txt
https://t.me/+yXOcSjVjI9tjM2E0
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/
http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion/
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/4dce4667d34fe86d6cc8e24a5ada38a0
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/4dce4667d34fe86d6cc8e24a5ada38a0
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Renames multiple (8853) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-1194130065-3471212556-1656947724-1000\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Public\Music\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-30_altform-lightunplated.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.targetsize-48_altform-lightunplated.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\next-arrow-disabled.svg 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\activity-badge\js\nls\es-es\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\digsig_icons_2x.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\win32_CopyNoDrop32x32.gif 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\AppxManifest.xml 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Windows Media Player\mpvis.DLL 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\images\s_opencarat_18.svg 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\root\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\ink\it-IT\mshwLatin.dll.mui 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AXIS\AXIS.ELM 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\NETWORK\THMBNAIL.PNG 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\MapsAppList.targetsize-32.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\sl-sl\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\onboarding\landing_page_whats_new_v1.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\tr-TR\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\AppList.targetsize-60_altform-unplated.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Car\LTR\contrast-black\SmallTile.scale-100.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\nb-no\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\editvideoimage.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdXC2RVL_MAKC2R-ul-oob.xrm-ms 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\TypeSupport\Unicode\Mappings\Mac\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\ContemporaryPhotoAlbum.potx 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CAPSULES\CAPSULES.INF 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\images\themes\dark\rhp_world_icon.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\nl-nl\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\Microsoft.NETCore.App.runtimeconfig.json 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStdO365R_Subscription-ppd.xrm-ms 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\af\LC_MESSAGES\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Diagnostics\Simple\Simple.Tests.ps1 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\ms_get.svg 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\ui-strings.js 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Century Gothic-Palatino Linotype.xml 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File created C:\Program Files\Microsoft Office\root\Office16\ODBC Drivers\Salesforce\lib\LibCurl64.DllA\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Web Server Extensions\16\BIN\FPSRVUTL.DLL 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-36_contrast-white.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxA-Generic-Dark.scale-250.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-32_altform-lightunplated.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\css\main.css 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\en-gb\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\legal\jdk\jopt-simple.md 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\sk-sk\ui-strings.js 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_x64__8wekyb3d8bbwe\Assets\Background_RoomTracing_04.jpg 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\LargeTile.scale-100.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\offsymb.ttf 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\da-dk\ui-strings.js 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.NetFX40.exe.config 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\AppPackageSplashScreen.scale-100_contrast-white.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\da-dk\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\Glyph_0xee27.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\editpdf\js\nls\uk-ua\ui-strings.js 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxIdentityProvider_12.50.6001.0_x64__8wekyb3d8bbwe\resources.pri 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\LargeTile.scale-200_contrast-black.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\ro-ro\!!!READ_ME_MEDUSA!!!.txt 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\reviews\js\nls\sl-si\ui-strings.js 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\SkypeforBusinessEntryR_PrepidBypass-ul-oob.xrm-ms 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\HxCalendarWideTile.scale-400.png 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7084 2444 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 3504 cmd.exe 6928 PING.EXE -
Kills process with taskkill 44 IoCs
pid Process 7092 taskkill.exe 5240 taskkill.exe 5736 taskkill.exe 6048 taskkill.exe 5660 taskkill.exe 5180 taskkill.exe 6124 taskkill.exe 7040 taskkill.exe 6248 taskkill.exe 5504 taskkill.exe 5688 taskkill.exe 6396 taskkill.exe 6568 taskkill.exe 5860 taskkill.exe 5360 taskkill.exe 6692 taskkill.exe 7152 taskkill.exe 6508 taskkill.exe 6636 taskkill.exe 6872 taskkill.exe 6932 taskkill.exe 5928 taskkill.exe 5804 taskkill.exe 6288 taskkill.exe 6340 taskkill.exe 6164 taskkill.exe 5548 taskkill.exe 5684 taskkill.exe 6984 taskkill.exe 5672 taskkill.exe 5908 taskkill.exe 5416 taskkill.exe 5232 taskkill.exe 5864 taskkill.exe 6456 taskkill.exe 6752 taskkill.exe 6808 taskkill.exe 6052 taskkill.exe 5692 taskkill.exe 3424 taskkill.exe 5336 taskkill.exe 5340 taskkill.exe 6152 taskkill.exe 6204 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1194130065-3471212556-1656947724-1000\{9F06BF64-6C01-4271-A290-406D6544EEB5} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6928 PING.EXE -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 6052 taskkill.exe Token: SeDebugPrivilege 5240 taskkill.exe Token: SeDebugPrivilege 5340 taskkill.exe Token: SeDebugPrivilege 5672 taskkill.exe Token: SeDebugPrivilege 5692 taskkill.exe Token: SeDebugPrivilege 5908 taskkill.exe Token: SeDebugPrivilege 5928 taskkill.exe Token: SeDebugPrivilege 3424 taskkill.exe Token: SeDebugPrivilege 5504 taskkill.exe Token: SeDebugPrivilege 5336 taskkill.exe Token: SeDebugPrivilege 5736 taskkill.exe Token: SeDebugPrivilege 5860 taskkill.exe Token: SeDebugPrivilege 5416 taskkill.exe Token: SeDebugPrivilege 5688 taskkill.exe Token: SeDebugPrivilege 5180 taskkill.exe Token: SeDebugPrivilege 5232 taskkill.exe Token: SeDebugPrivilege 5548 taskkill.exe Token: SeDebugPrivilege 6048 taskkill.exe Token: SeDebugPrivilege 5660 taskkill.exe Token: SeDebugPrivilege 6124 taskkill.exe Token: SeDebugPrivilege 5684 taskkill.exe Token: SeDebugPrivilege 5864 taskkill.exe Token: SeDebugPrivilege 5804 taskkill.exe Token: SeDebugPrivilege 5360 taskkill.exe Token: SeDebugPrivilege 6152 taskkill.exe Token: SeDebugPrivilege 6204 taskkill.exe Token: SeDebugPrivilege 6288 taskkill.exe Token: SeDebugPrivilege 6340 taskkill.exe Token: SeDebugPrivilege 6396 taskkill.exe Token: SeDebugPrivilege 6456 taskkill.exe Token: SeDebugPrivilege 6508 taskkill.exe Token: SeDebugPrivilege 6568 taskkill.exe Token: SeDebugPrivilege 6636 taskkill.exe Token: SeDebugPrivilege 6692 taskkill.exe Token: SeDebugPrivilege 6752 taskkill.exe Token: SeDebugPrivilege 6808 taskkill.exe Token: SeDebugPrivilege 6872 taskkill.exe Token: SeDebugPrivilege 6932 taskkill.exe Token: SeDebugPrivilege 6984 taskkill.exe Token: SeDebugPrivilege 7040 taskkill.exe Token: SeDebugPrivilege 7092 taskkill.exe Token: SeDebugPrivilege 7152 taskkill.exe Token: SeDebugPrivilege 6164 taskkill.exe Token: SeDebugPrivilege 6248 taskkill.exe Token: SeShutdownPrivilege 6828 explorer.exe Token: SeCreatePagefilePrivilege 6828 explorer.exe Token: SeShutdownPrivilege 6828 explorer.exe Token: SeCreatePagefilePrivilege 6828 explorer.exe Token: SeShutdownPrivilege 6828 explorer.exe Token: SeCreatePagefilePrivilege 6828 explorer.exe Token: SeShutdownPrivilege 6828 explorer.exe Token: SeCreatePagefilePrivilege 6828 explorer.exe Token: SeShutdownPrivilege 6828 explorer.exe Token: SeCreatePagefilePrivilege 6828 explorer.exe Token: SeShutdownPrivilege 6828 explorer.exe Token: SeCreatePagefilePrivilege 6828 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe 6828 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2444 wrote to memory of 3688 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 83 PID 2444 wrote to memory of 3688 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 83 PID 2444 wrote to memory of 3688 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 83 PID 3688 wrote to memory of 556 3688 net.exe 85 PID 3688 wrote to memory of 556 3688 net.exe 85 PID 3688 wrote to memory of 556 3688 net.exe 85 PID 2444 wrote to memory of 2728 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 86 PID 2444 wrote to memory of 2728 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 86 PID 2444 wrote to memory of 2728 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 86 PID 2728 wrote to memory of 4688 2728 net.exe 88 PID 2728 wrote to memory of 4688 2728 net.exe 88 PID 2728 wrote to memory of 4688 2728 net.exe 88 PID 2444 wrote to memory of 4848 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 89 PID 2444 wrote to memory of 4848 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 89 PID 2444 wrote to memory of 4848 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 89 PID 4848 wrote to memory of 3764 4848 net.exe 91 PID 4848 wrote to memory of 3764 4848 net.exe 91 PID 4848 wrote to memory of 3764 4848 net.exe 91 PID 2444 wrote to memory of 3708 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 92 PID 2444 wrote to memory of 3708 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 92 PID 2444 wrote to memory of 3708 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 92 PID 3708 wrote to memory of 4608 3708 net.exe 94 PID 3708 wrote to memory of 4608 3708 net.exe 94 PID 3708 wrote to memory of 4608 3708 net.exe 94 PID 2444 wrote to memory of 1348 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 95 PID 2444 wrote to memory of 1348 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 95 PID 2444 wrote to memory of 1348 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 95 PID 1348 wrote to memory of 1132 1348 net.exe 97 PID 1348 wrote to memory of 1132 1348 net.exe 97 PID 1348 wrote to memory of 1132 1348 net.exe 97 PID 2444 wrote to memory of 2856 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 98 PID 2444 wrote to memory of 2856 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 98 PID 2444 wrote to memory of 2856 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 98 PID 2856 wrote to memory of 1432 2856 net.exe 100 PID 2856 wrote to memory of 1432 2856 net.exe 100 PID 2856 wrote to memory of 1432 2856 net.exe 100 PID 2444 wrote to memory of 1960 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 101 PID 2444 wrote to memory of 1960 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 101 PID 2444 wrote to memory of 1960 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 101 PID 1960 wrote to memory of 4116 1960 net.exe 103 PID 1960 wrote to memory of 4116 1960 net.exe 103 PID 1960 wrote to memory of 4116 1960 net.exe 103 PID 2444 wrote to memory of 2848 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 104 PID 2444 wrote to memory of 2848 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 104 PID 2444 wrote to memory of 2848 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 104 PID 2848 wrote to memory of 3028 2848 net.exe 106 PID 2848 wrote to memory of 3028 2848 net.exe 106 PID 2848 wrote to memory of 3028 2848 net.exe 106 PID 2444 wrote to memory of 5116 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 107 PID 2444 wrote to memory of 5116 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 107 PID 2444 wrote to memory of 5116 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 107 PID 5116 wrote to memory of 3600 5116 net.exe 109 PID 5116 wrote to memory of 3600 5116 net.exe 109 PID 5116 wrote to memory of 3600 5116 net.exe 109 PID 2444 wrote to memory of 3652 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 110 PID 2444 wrote to memory of 3652 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 110 PID 2444 wrote to memory of 3652 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 110 PID 3652 wrote to memory of 1104 3652 net.exe 112 PID 3652 wrote to memory of 1104 3652 net.exe 112 PID 3652 wrote to memory of 1104 3652 net.exe 112 PID 2444 wrote to memory of 3956 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 113 PID 2444 wrote to memory of 3956 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 113 PID 2444 wrote to memory of 3956 2444 2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe 113 PID 3956 wrote to memory of 3068 3956 net.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe"C:\Users\Admin\AppData\Local\Temp\2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:4688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:3764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:4608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:1132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵PID:1432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:4116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:3600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:3068
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:1520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:4004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:3452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:4236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:4976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:2288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:4212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:3768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:3376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵PID:1860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:4592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵PID:2784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:4552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵PID:2852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵PID:1404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:4224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:4868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:3820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:2780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:3360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:3868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:4228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:1244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:4020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:3700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:5056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:5096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:3052
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:1380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:3648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:3140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:3856
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵
- System Location Discovery: System Language Discovery
PID:5004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:1044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:1112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵PID:4960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:2228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:1492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:4092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:2720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:2680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:3540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:1388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:1504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:2556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:4984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:3272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:3448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:3816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:1084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:3628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:1904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:1952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:3812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:1408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:1460
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:4624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵PID:4972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:3804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:4456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:3536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵PID:3948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:4192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:4872
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:1872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:4372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵PID:3984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:2088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:1708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:3508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:3408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:2544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:4176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵
- System Location Discovery: System Language Discovery
PID:3080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:336
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:1716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵PID:1120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:4736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵PID:2152
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵PID:1832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵PID:3964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵PID:4288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:5020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:3892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:4404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:4084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵PID:4616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:3108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵PID:704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:2688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:4352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:3260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵PID:2968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:4584 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:3208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:5048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:1232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:4844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:1712
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:2436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:1228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:4048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:3400
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:4732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:3160
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:2316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:3640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:2964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵PID:1896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:2484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵PID:1800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:4724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:4668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:4956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵PID:2244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵PID:2700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:3420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:3840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:2372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:4704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵PID:4108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:1616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:4880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:1588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:2708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:2236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:3596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵
- System Location Discovery: System Language Discovery
PID:2144
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:3464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:1908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:4336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:1020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:3940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:3644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:3664
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:4232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵
- System Location Discovery: System Language Discovery
PID:4368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:3496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:4260
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:3380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵PID:4216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵PID:1852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:4304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:2248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:1220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:2356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:4564
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵PID:2492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:4792
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵
- System Location Discovery: System Language Discovery
PID:3976
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:2376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:4508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:1776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:4680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:2384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:4600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:1864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:2540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵PID:4436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵PID:640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:4420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:1088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵PID:4796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:516
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:1216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:2776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:3476
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:1720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵PID:2696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:3220 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:5012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:1224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:3936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:4480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:2440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:4924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:4524
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:2412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:2864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵PID:452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵PID:4968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:1652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:3692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:4904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵PID:1448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:3432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:4016
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:5136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:5184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵
- System Location Discovery: System Language Discovery
PID:5200 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:5248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:5264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:5312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:5328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:5376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:5392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵PID:5440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:5460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵
- System Location Discovery: System Language Discovery
PID:5508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:5524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵
- System Location Discovery: System Language Discovery
PID:5572
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:5588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:5636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:5652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:5700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:5716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:5764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵
- System Location Discovery: System Language Discovery
PID:5780 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:5832
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:5848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵
- System Location Discovery: System Language Discovery
PID:5896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:5912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:5960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:5980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:6024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:6040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:6088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:6104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:5124
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:3096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵PID:5176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:5144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:5228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:5276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:5348
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:5384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:5452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:5436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:5500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:5496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:5564
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:5604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:5596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵PID:5712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:5732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:5772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:5836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵PID:5876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:5952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:6000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:6060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵
- System Location Discovery: System Language Discovery
PID:6092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:3032
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:5132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:5148
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:5224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵PID:5288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:5320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:5448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵
- System Location Discovery: System Language Discovery
PID:5428
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:5472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:5556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:5616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:5632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:5676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:5756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:5868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:5880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:5920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:5956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵PID:5988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:6012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:6064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:1644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵
- System Location Discovery: System Language Discovery
PID:5252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵
- System Location Discovery: System Language Discovery
PID:5272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:5484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:5584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵PID:5540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:5612
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:5744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵
- System Location Discovery: System Language Discovery
PID:5808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:5944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:5936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:6032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵PID:6132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:2816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:5256
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
PID:5216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5292
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:5404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:5520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:5640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵PID:5768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:5680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:5724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵PID:5792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:5820
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3424
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6124
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5804
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6288
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6248
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\2024-10-02_ec5b1a6de3564c26c4e0e804e6bc2ecb_avoslocker_cobalt-strike.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3504 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6928
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 3642⤵
- Program crash
PID:7084
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6828
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2444 -ip 24441⤵PID:6712
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD5a15fb2a3f32cba3359140be653f60259
SHA15279c63a26a9e496cddf7a6d8970cca13cbebab9
SHA256942c9a5f186c926ad67b51470f129b1544d3186edd05bcab5e8e021965926771
SHA5124f1c7a5e17d86830612824cbb23d33ba7cd64bd8c6ad41faed952aa1ae4237e86a3b5d9c6f47dfc21b692dd36a5302bb759226226b0c214b53978750b025e170
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.MEDUSA
Filesize623KB
MD562da2fecc71beba6220fa3d6ed263b28
SHA1be9e267a208b1631623f6404831ca4b3fcc15241
SHA256efe8cd611126ab7651589e8d7459792585e9b05d5571049bce9478372fbf5df0
SHA512d3cccca0f419114649c506fbd241ee92c8869065c76d3f7cbcb1fda93835da3d506529597b1b21ed91911022f2c53d72afc281fe230c76abff9235e678e53dd6
-
Filesize
3KB
MD5ae2ccfb68aaf040e01ec2280b75c4d49
SHA16dd072344d5159e751451ba24624a1e2adbe6e07
SHA256beff87729e2c44475014eb1efd72bb128b33a9b22309339c2332e3f718e8c4cd
SHA51269dc9b2ff371a8f49b2d236e81bcaba33df55d5e96f262b16a2de170c88832fbd8696f00e39ef5ee0d8ee85e988abc2b80b3901a773d9161f0d9dc525f5f1618