Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13/12/2024, 02:45
Static task
static1
Behavioral task
behavioral1
Sample
91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe
Resource
win10v2004-20241007-en
General
-
Target
91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe
-
Size
624KB
-
MD5
ec5b1a6de3564c26c4e0e804e6bc2ecb
-
SHA1
a8b0861e4596d21d1a2903dc3add32e1989ce723
-
SHA256
91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d
-
SHA512
886550e2ec4a75ac15557d0a286bbfbdf00983c52458b3db6e4977b4a77d15992c0bf873da5986f0c838dc672890b3e0942bbbdd405a8a349a3d9769ba1993b2
-
SSDEEP
12288:vRdW6SXZbE3ZoBUMv+bFDYBJQsZwhHQWIZ6+aAvtKJCO1Mw2BhgWpndg80EIwbSe:bmpThJmVSvGWEcXvvKw4IRRs3WPOFqp
Malware Config
Extracted
F:\!!!READ_ME_MEDUSA!!!.txt
https://t.me/+yXOcSjVjI9tjM2E0
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/
http://cx5u7zxbvrfyoj6ughw76oa264ucuuizmmzypwum6ear7pct4yc723qd.onion/
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/4dce4667d34fe86d6cc8e24a5ada38a0
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/4dce4667d34fe86d6cc8e24a5ada38a0
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8840) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\JMFEWY8E\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Microsoft Games\Solitaire\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Music\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\3K0NZPWJ\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\RTJA0BV0\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Games\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\386UAANV\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\25UY7HZX\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Music\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\CBCNU6WZ\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Links\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Public\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\FXDUII3O\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2703099537-420551529-3771253338-1000\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-views.xml 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\PhotoViewer.dll.mui 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\it-IT\js\slideShow.js 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\hr-HR\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\DVD Maker\Shared\DvdStyles\Pets\Pets_btn-back-over-select.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VBA\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jre7\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\FORMS\1033\SCDRESPL.ICO 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_over.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Anadyr 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\Center 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BS01636_.WMF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUBSPAPR\ZPDIR27F.GIF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Thatch.dotx 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\undocked_black_moon-last-quarter_partly-cloudy.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\+NewSQLServerConnection.odc 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\CONVERT\OLNOTE.FAE 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\de-DE\js\currency.js 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\META-INF\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Currency.Gadget\it-IT\css\currency.css 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\TypeSupport\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\BULLETS\BD21314_.GIF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Los_Angeles 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows NT\Accessories\en-US\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\css\settings.css 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18200_.WMF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\WINWORD.DEV_COL.HXT 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\7-Zip\Lang\ku-ckb.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Belem 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\3082\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Pushpin.eftx 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Web Server Extensions\14\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\120DPI\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files\Java\jre7\lib\amd64\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\SlideShow.Gadget\en-US\js\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Gaza 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099178.WMF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\Office Setup Controller\Office.en-us\PSCONFIG.CHM 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01236U.BMP 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGPQUOT.XML 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\icon.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Asia\Kamchatka 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files\VideoLAN\VLC\locale\wa\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files\Windows Sidebar\Gadgets\SlideShow.Gadget\fr-FR\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\images\37.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\CAGCAT10.DLL 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-coredump.xml 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ACCESS12.ACC 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Clock.Gadget\images\square_settings.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\EXPEDITN\THMBNAIL.PNG 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LAYERS\PREVIEW.GIF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\en-US\css\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\Images\settings_corner_top_right.png 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File created C:\Program Files (x86)\Common Files\microsoft shared\Help\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jre7\lib\deploy.jar 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe AIR\Versions\1.0\digest.s 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\mset7ge.kic 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\com.jrockit.mc.feature.flightrecorder_5.5.0.165303\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Visual Studio 8\Common7\IDE\VSTA\ItemTemplates\VisualBasic\1033\!!!READ_ME_MEDUSA!!!.txt 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SY01006_.WMF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\Publisher\Backgrounds\WB02074_.GIF 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4168 2136 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 6136 cmd.exe 4844 PING.EXE -
Interacts with shadow copies 3 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4744 vssadmin.exe 4820 vssadmin.exe 4884 vssadmin.exe 4944 vssadmin.exe 4960 vssadmin.exe 5020 vssadmin.exe -
Kills process with taskkill 44 IoCs
pid Process 3184 taskkill.exe 4312 taskkill.exe 4392 taskkill.exe 4432 taskkill.exe 4832 taskkill.exe 5076 taskkill.exe 4140 taskkill.exe 4164 taskkill.exe 4148 taskkill.exe 4188 taskkill.exe 4228 taskkill.exe 4512 taskkill.exe 4992 taskkill.exe 5036 taskkill.exe 4612 taskkill.exe 4052 taskkill.exe 3948 taskkill.exe 4084 taskkill.exe 4360 taskkill.exe 4560 taskkill.exe 4684 taskkill.exe 4108 taskkill.exe 4552 taskkill.exe 4712 taskkill.exe 4752 taskkill.exe 4952 taskkill.exe 4284 taskkill.exe 4408 taskkill.exe 3296 taskkill.exe 4012 taskkill.exe 4352 taskkill.exe 4472 taskkill.exe 4204 taskkill.exe 4592 taskkill.exe 4672 taskkill.exe 4340 taskkill.exe 4272 taskkill.exe 5116 taskkill.exe 4484 taskkill.exe 4632 taskkill.exe 4792 taskkill.exe 4872 taskkill.exe 4912 taskkill.exe 4544 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4844 PING.EXE -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 3948 taskkill.exe Token: SeDebugPrivilege 3296 taskkill.exe Token: SeDebugPrivilege 4084 taskkill.exe Token: SeDebugPrivilege 4012 taskkill.exe Token: SeDebugPrivilege 3184 taskkill.exe Token: SeDebugPrivilege 4108 taskkill.exe Token: SeDebugPrivilege 4148 taskkill.exe Token: SeDebugPrivilege 4188 taskkill.exe Token: SeDebugPrivilege 4228 taskkill.exe Token: SeDebugPrivilege 4272 taskkill.exe Token: SeDebugPrivilege 4312 taskkill.exe Token: SeDebugPrivilege 4352 taskkill.exe Token: SeDebugPrivilege 4392 taskkill.exe Token: SeDebugPrivilege 4432 taskkill.exe Token: SeDebugPrivilege 4472 taskkill.exe Token: SeDebugPrivilege 4512 taskkill.exe Token: SeDebugPrivilege 4552 taskkill.exe Token: SeDebugPrivilege 4592 taskkill.exe Token: SeDebugPrivilege 4632 taskkill.exe Token: SeDebugPrivilege 4672 taskkill.exe Token: SeDebugPrivilege 4712 taskkill.exe Token: SeDebugPrivilege 4752 taskkill.exe Token: SeDebugPrivilege 4792 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 4872 taskkill.exe Token: SeDebugPrivilege 4912 taskkill.exe Token: SeDebugPrivilege 4952 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 5036 taskkill.exe Token: SeDebugPrivilege 5076 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeDebugPrivilege 4140 taskkill.exe Token: SeDebugPrivilege 4164 taskkill.exe Token: SeDebugPrivilege 4204 taskkill.exe Token: SeDebugPrivilege 4284 taskkill.exe Token: SeDebugPrivilege 4340 taskkill.exe Token: SeDebugPrivilege 4360 taskkill.exe Token: SeDebugPrivilege 4408 taskkill.exe Token: SeDebugPrivilege 4484 taskkill.exe Token: SeDebugPrivilege 4544 taskkill.exe Token: SeDebugPrivilege 4560 taskkill.exe Token: SeDebugPrivilege 4612 taskkill.exe Token: SeDebugPrivilege 4684 taskkill.exe Token: SeBackupPrivilege 4772 vssvc.exe Token: SeRestorePrivilege 4772 vssvc.exe Token: SeAuditPrivilege 4772 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2460 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 31 PID 2136 wrote to memory of 2460 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 31 PID 2136 wrote to memory of 2460 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 31 PID 2136 wrote to memory of 2460 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 31 PID 2460 wrote to memory of 2192 2460 net.exe 33 PID 2460 wrote to memory of 2192 2460 net.exe 33 PID 2460 wrote to memory of 2192 2460 net.exe 33 PID 2460 wrote to memory of 2192 2460 net.exe 33 PID 2136 wrote to memory of 1376 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 34 PID 2136 wrote to memory of 1376 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 34 PID 2136 wrote to memory of 1376 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 34 PID 2136 wrote to memory of 1376 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 34 PID 1376 wrote to memory of 2812 1376 net.exe 36 PID 1376 wrote to memory of 2812 1376 net.exe 36 PID 1376 wrote to memory of 2812 1376 net.exe 36 PID 1376 wrote to memory of 2812 1376 net.exe 36 PID 2136 wrote to memory of 2720 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 37 PID 2136 wrote to memory of 2720 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 37 PID 2136 wrote to memory of 2720 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 37 PID 2136 wrote to memory of 2720 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 37 PID 2720 wrote to memory of 948 2720 net.exe 39 PID 2720 wrote to memory of 948 2720 net.exe 39 PID 2720 wrote to memory of 948 2720 net.exe 39 PID 2720 wrote to memory of 948 2720 net.exe 39 PID 2136 wrote to memory of 880 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 40 PID 2136 wrote to memory of 880 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 40 PID 2136 wrote to memory of 880 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 40 PID 2136 wrote to memory of 880 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 40 PID 880 wrote to memory of 2448 880 net.exe 42 PID 880 wrote to memory of 2448 880 net.exe 42 PID 880 wrote to memory of 2448 880 net.exe 42 PID 880 wrote to memory of 2448 880 net.exe 42 PID 2136 wrote to memory of 2824 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 43 PID 2136 wrote to memory of 2824 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 43 PID 2136 wrote to memory of 2824 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 43 PID 2136 wrote to memory of 2824 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 43 PID 2824 wrote to memory of 2888 2824 net.exe 45 PID 2824 wrote to memory of 2888 2824 net.exe 45 PID 2824 wrote to memory of 2888 2824 net.exe 45 PID 2824 wrote to memory of 2888 2824 net.exe 45 PID 2136 wrote to memory of 2828 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 46 PID 2136 wrote to memory of 2828 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 46 PID 2136 wrote to memory of 2828 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 46 PID 2136 wrote to memory of 2828 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 46 PID 2828 wrote to memory of 2768 2828 net.exe 48 PID 2828 wrote to memory of 2768 2828 net.exe 48 PID 2828 wrote to memory of 2768 2828 net.exe 48 PID 2828 wrote to memory of 2768 2828 net.exe 48 PID 2136 wrote to memory of 2760 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 49 PID 2136 wrote to memory of 2760 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 49 PID 2136 wrote to memory of 2760 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 49 PID 2136 wrote to memory of 2760 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 49 PID 2760 wrote to memory of 2200 2760 net.exe 51 PID 2760 wrote to memory of 2200 2760 net.exe 51 PID 2760 wrote to memory of 2200 2760 net.exe 51 PID 2760 wrote to memory of 2200 2760 net.exe 51 PID 2136 wrote to memory of 2896 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 52 PID 2136 wrote to memory of 2896 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 52 PID 2136 wrote to memory of 2896 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 52 PID 2136 wrote to memory of 2896 2136 91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe 52 PID 2896 wrote to memory of 2660 2896 net.exe 54 PID 2896 wrote to memory of 2660 2896 net.exe 54 PID 2896 wrote to memory of 2660 2896 net.exe 54 PID 2896 wrote to memory of 2660 2896 net.exe 54 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe"C:\Users\Admin\AppData\Local\Temp\91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:2192
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:2812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:2448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵PID:2768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:2200
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵PID:2900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:2964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵PID:2648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵
- System Location Discovery: System Language Discovery
PID:2764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵PID:2792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:2892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:2624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:2668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:1044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:1680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:2924
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:2380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:1520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:2612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:2920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵PID:2936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:2996
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵PID:2976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:1100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵PID:2588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:3020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:1068
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:2544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:1756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:1596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:1784
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:1512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:1772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:1660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:3068
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:3052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:2480
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:1876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:2060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:1884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:2556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:1448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:2288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵PID:2208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:2572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:1684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:1924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵PID:1236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:1628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:1824
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:3028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:2436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:1764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:1744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:1568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵
- System Location Discovery: System Language Discovery
PID:276 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:1812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:1816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:1716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:2360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:1720
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:2240
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:1908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:2444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:1412
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:1136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:1084
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:2104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:2400
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵PID:1588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵
- System Location Discovery: System Language Discovery
PID:1080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:2216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:2248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:2244
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:2204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:2732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:1272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:2276
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:2852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵PID:2640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:1708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:2728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:2696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:2968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:2908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:2988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:2012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:1528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:1092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:1984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:1028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:3044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:3060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵PID:2724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵PID:2064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵PID:2188
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:1516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵PID:952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵
- System Location Discovery: System Language Discovery
PID:2708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵
- System Location Discovery: System Language Discovery
PID:372 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:1500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:1060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2264
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:1572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:2280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:1732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:2424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵
- System Location Discovery: System Language Discovery
PID:1976
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵PID:1284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:1132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:2524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:2328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:2340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:1616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:2084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:2472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:2752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:1948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:2636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:2680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:1896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:2356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵PID:1624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:2484
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:1088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵PID:2076
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:1164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:1276
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:1176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:904
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵PID:1508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:2312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:1676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:1980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:2420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵PID:2156
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:1656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:1608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:2184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:2864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:2688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:2040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:1180
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:1636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:1300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:1456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:2128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:1408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:2952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:1480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:2880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:2912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:3040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:1696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:2532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:3004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵PID:1792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:2840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:3012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:3064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:2332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:2536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:2412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:3080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:3088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:3112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:3120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵PID:3148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵PID:3168
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵
- System Location Discovery: System Language Discovery
PID:3176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:3196
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:3204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:3224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵
- System Location Discovery: System Language Discovery
PID:3232 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵
- System Location Discovery: System Language Discovery
PID:3252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:3260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:3280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:3288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:3308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:3316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:3336
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:3344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵PID:3364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:3372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:3392
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵PID:3400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:3420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:3428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:3476
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:3484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:3504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:3512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:3532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵
- System Location Discovery: System Language Discovery
PID:3560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:3568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:3588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:3596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:3616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:3624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵PID:3644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:3652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:3672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:3680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:3700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵PID:3708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:3728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:3736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵
- System Location Discovery: System Language Discovery
PID:3764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:3784
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵
- System Location Discovery: System Language Discovery
PID:3792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:3820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:3840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:3848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:3868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:3876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:3896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:3904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:3924
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:3932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:3952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:3960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:3980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:3988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:4008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:4016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:4036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:4044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:4092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:3116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:3100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵PID:3172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:3156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:3216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:3220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:3240
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:3304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:3328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:3368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:3352
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:3412
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:3416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:3436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3524 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵
- System Location Discovery: System Language Discovery
PID:3564
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:3548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:3608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵PID:3612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:3632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:3696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:3720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:3760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:3744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:3804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:3808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:3828
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵PID:3872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵
- System Location Discovery: System Language Discovery
PID:3892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:3916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:3956
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:3940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵
- System Location Discovery: System Language Discovery
PID:4000
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:4004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:4024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:4068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:4088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:3096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:3128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:3160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵
- System Location Discovery: System Language Discovery
PID:3256
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:3248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵
- System Location Discovery: System Language Discovery
PID:3268
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:3380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:3452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵PID:3492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:3464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:3584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:3576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:3636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵PID:3688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:3748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵PID:3780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵PID:3860
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:3832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵PID:3912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:3984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:4056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵PID:2172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:1724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:3272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:3312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:3332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:3508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:3528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:3664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵PID:3724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:3660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:3900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵PID:3856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:3976
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4272
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4352
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4408
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4684
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4744
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=C: /on=C: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:4820
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=C: /on=C: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4884
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=F: /on=F: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4944
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=F: /on=F: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4960
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:5020
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\91a3b832564a9b29685b393c8bda9925a7da87fd3958625980da06f80f76109d.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6136 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 1642⤵
- Program crash
PID:4168
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4772
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD57073dc81096f4a791e852647fc5c5584
SHA10fcf650e2aff046bcf335923a41c0aa3dc5053e8
SHA256923f75907afdbdfe4dd3c2176e9740c49ae28c3b7fbf2e790469c51a01607bb1
SHA5120cd08a7447e693c5887e914fb56075035946b7e86bc0d3d818d28a714b211b0ca5bb9f98c680429960232b81f670668c99beea18d7f900d3656cd759f330bbd1
-
Filesize
3KB
MD5ae2ccfb68aaf040e01ec2280b75c4d49
SHA16dd072344d5159e751451ba24624a1e2adbe6e07
SHA256beff87729e2c44475014eb1efd72bb128b33a9b22309339c2332e3f718e8c4cd
SHA51269dc9b2ff371a8f49b2d236e81bcaba33df55d5e96f262b16a2de170c88832fbd8696f00e39ef5ee0d8ee85e988abc2b80b3901a773d9161f0d9dc525f5f1618