Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23/01/2025, 23:22
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe
-
Size
624KB
-
MD5
0fbd035c4b9dc78592741178965bb929
-
SHA1
b7f9af55daa054b26a69a829ec01017cc62fb0d7
-
SHA256
44d615a792f73ed5620217ed02b0ee085c3ae5f12112abdb3b4bc3fcc64702be
-
SHA512
3b4fef22bf1038dbad86d5625f00480b1ff11e6992de5283607f22566ef40d53b72e66b4e30ae42099211b5711cdfdd2ae9156421d04c8c2fdaf4353f228f1e4
-
SSDEEP
12288:ro4G6SXpb0D1eZc8nr7nHytNZSNIxBwUiFuY+0MFgFCUpsmIptTiREdwOI0cBpWE:R2+YJmVSvGWEUnvvqw4jBRsLWPx2g
Malware Config
Extracted
F:\!!!READ_ME_MEDUSA!!!.txt
https://t.me/+lyskiDn9KiYxZjlh
http://xfv4jzckytb4g3ckwemcny3ihv4i5p4lqzdpi624cxisu35my5fwi5qd.onion/
http://s7lmmhlt3iwnwirxvgjidl6omcblvw2rg75txjfduy73kx5brlmiulad.onion/
http://uyku4o2yg34ekvjtszg6gu7cvjzm6hyszhtu7c55iyuzhpr4k5knewyd.onion/dbac476f3e0567a12197769669cc2a1b
http://5ar4vuckm3k7osdlzskqkaqmqr4jjpmdikuotmlpkrbsxx7ard3xetyd.onion/dbac476f3e0567a12197769669cc2a1b
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Deletes shadow copies 3 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (8827) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\Videos\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\DataServices\DESKTOP.INI 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Tablet PC\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\INNMDE1C\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Music\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Stationery\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Ringtones\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\FP29B0EC\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows Mail\Stationery\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L1J27TKW\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Mahjong\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Recorded TV\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\Links for United States\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Videos\Sample Videos\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\TN6BGAW3\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\History.IE5\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Pictures\Sample Pictures\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Music\Sample Music\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Chess\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Accessibility\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Hearts\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\Purble Place\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Feeds Cache\U9KKHJMH\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B8BOMT1Q\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\Desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3533259084-2542256011-65585152-1000\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\FreeCell\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\VideoLAN\VLC\locale\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\ja-JP\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN081.XML 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\js\settings.js 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0086432.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0216516.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Noronha 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\es-ES\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\AN04235_.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198377.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\MSOUC_COL.HXT 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Google\Chrome\Application\106.0.5249.119\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\calendars.properties 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\THEMES14\LEVEL\LEVEL.INF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0105710.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\graph_over.png 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Windows Sidebar\Gadgets\RSSFeeds.Gadget\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Common Files\System\ado\es-ES\msader15.dll.mui 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\WMPDMC.exe.mui 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Microsoft Office\Office14\1033\Bibliography\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\ReviewRouting_Init.xsn 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\DVD Maker\soniccolorconverter.ax 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\North_Dakota\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Copenhagen 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107148.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.sun.el_2.2.0.v201303151357.jar 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01585_.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\ACCWIZ\ACWZUSR12.ACCDU 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\es-ES\ShapeCollector.exe.mui 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\OUTLACCT.DLL 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\PicturePuzzle.Gadget\en-US\css\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0198022.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\DGSIDEBR.DPV 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Currency.Gadget\images\base-undocked-2.png 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Weather.Gadget\images\grayStateIcon.png 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\Antarctica\Rothera 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-openide-modules.xml 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\bg_Earthy.gif 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Windows Sidebar\Gadgets\Calendar.Gadget\images\corner.png 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.property_1.4.200.v20140214-0004.jar 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ecf_3.4.0.v20140827-1444.jar 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD01196_.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGLBL002.XML 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Microsoft Office\Office14\PROOF\1033\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBCONV.DLL 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Games\SpiderSolitaire\en-US\SpiderSolitaire.exe.mui 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\DESIGNER\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\microsoft shared\VSTA\AppInfoDocument\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BD19563_.GIF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\SL01565_.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Distinctive.dotx 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Vancouver 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\visualvm\update_tracking\com-sun-tools-visualvm-profiling.xml 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\microsoft shared\TRANSLAT\FREN\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0382966.JPG 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sao_Paulo 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090777.WMF 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\CommonData\CommsIncomingImageMask.bmp 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FieldTypePreview\TEXTBOX.JPG 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\update_tracking\org-netbeans-modules-keyring.xml 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsStyles\BrightYellow\!!!READ_ME_MEDUSA!!!.txt 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6040 2868 WerFault.exe 27 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5564 cmd.exe 6048 PING.EXE -
Interacts with shadow copies 3 TTPs 6 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4460 vssadmin.exe 4140 vssadmin.exe 4204 vssadmin.exe 4300 vssadmin.exe 4324 vssadmin.exe 4400 vssadmin.exe -
Kills process with taskkill 44 IoCs
pid Process 4876 taskkill.exe 3920 taskkill.exe 4148 taskkill.exe 4188 taskkill.exe 4716 taskkill.exe 4796 taskkill.exe 3368 taskkill.exe 3696 taskkill.exe 4596 taskkill.exe 4836 taskkill.exe 4388 taskkill.exe 4636 taskkill.exe 4756 taskkill.exe 3448 taskkill.exe 3788 taskkill.exe 3868 taskkill.exe 4020 taskkill.exe 4228 taskkill.exe 4956 taskkill.exe 5036 taskkill.exe 4916 taskkill.exe 3928 taskkill.exe 3472 taskkill.exe 3560 taskkill.exe 4348 taskkill.exe 4556 taskkill.exe 3644 taskkill.exe 4036 taskkill.exe 4308 taskkill.exe 5116 taskkill.exe 3672 taskkill.exe 3320 taskkill.exe 4432 taskkill.exe 4996 taskkill.exe 5076 taskkill.exe 3908 taskkill.exe 3840 taskkill.exe 4268 taskkill.exe 4512 taskkill.exe 4676 taskkill.exe 4040 taskkill.exe 3504 taskkill.exe 4108 taskkill.exe 4472 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6048 PING.EXE -
Suspicious use of AdjustPrivilegeToken 47 IoCs
description pid Process Token: SeDebugPrivilege 3928 taskkill.exe Token: SeDebugPrivilege 3368 taskkill.exe Token: SeDebugPrivilege 3448 taskkill.exe Token: SeDebugPrivilege 3788 taskkill.exe Token: SeDebugPrivilege 3908 taskkill.exe Token: SeDebugPrivilege 3472 taskkill.exe Token: SeDebugPrivilege 3672 taskkill.exe Token: SeDebugPrivilege 3868 taskkill.exe Token: SeDebugPrivilege 3320 taskkill.exe Token: SeDebugPrivilege 3840 taskkill.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 3644 taskkill.exe Token: SeDebugPrivilege 3920 taskkill.exe Token: SeDebugPrivilege 4036 taskkill.exe Token: SeDebugPrivilege 3504 taskkill.exe Token: SeDebugPrivilege 3560 taskkill.exe Token: SeDebugPrivilege 4020 taskkill.exe Token: SeDebugPrivilege 3696 taskkill.exe Token: SeDebugPrivilege 4108 taskkill.exe Token: SeDebugPrivilege 4148 taskkill.exe Token: SeDebugPrivilege 4188 taskkill.exe Token: SeDebugPrivilege 4228 taskkill.exe Token: SeDebugPrivilege 4268 taskkill.exe Token: SeDebugPrivilege 4308 taskkill.exe Token: SeDebugPrivilege 4348 taskkill.exe Token: SeDebugPrivilege 4388 taskkill.exe Token: SeDebugPrivilege 4432 taskkill.exe Token: SeDebugPrivilege 4472 taskkill.exe Token: SeDebugPrivilege 4512 taskkill.exe Token: SeDebugPrivilege 4556 taskkill.exe Token: SeDebugPrivilege 4596 taskkill.exe Token: SeDebugPrivilege 4636 taskkill.exe Token: SeDebugPrivilege 4676 taskkill.exe Token: SeDebugPrivilege 4716 taskkill.exe Token: SeDebugPrivilege 4756 taskkill.exe Token: SeDebugPrivilege 4796 taskkill.exe Token: SeDebugPrivilege 4836 taskkill.exe Token: SeDebugPrivilege 4876 taskkill.exe Token: SeDebugPrivilege 4916 taskkill.exe Token: SeDebugPrivilege 4956 taskkill.exe Token: SeDebugPrivilege 4996 taskkill.exe Token: SeDebugPrivilege 5036 taskkill.exe Token: SeDebugPrivilege 5076 taskkill.exe Token: SeDebugPrivilege 5116 taskkill.exe Token: SeBackupPrivilege 4180 vssvc.exe Token: SeRestorePrivilege 4180 vssvc.exe Token: SeAuditPrivilege 4180 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2360 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 29 PID 2868 wrote to memory of 2360 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 29 PID 2868 wrote to memory of 2360 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 29 PID 2868 wrote to memory of 2360 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 29 PID 2360 wrote to memory of 2900 2360 net.exe 31 PID 2360 wrote to memory of 2900 2360 net.exe 31 PID 2360 wrote to memory of 2900 2360 net.exe 31 PID 2360 wrote to memory of 2900 2360 net.exe 31 PID 2868 wrote to memory of 2928 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2868 wrote to memory of 2928 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2868 wrote to memory of 2928 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2868 wrote to memory of 2928 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 32 PID 2928 wrote to memory of 2576 2928 net.exe 34 PID 2928 wrote to memory of 2576 2928 net.exe 34 PID 2928 wrote to memory of 2576 2928 net.exe 34 PID 2928 wrote to memory of 2576 2928 net.exe 34 PID 2868 wrote to memory of 2944 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2868 wrote to memory of 2944 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2868 wrote to memory of 2944 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2868 wrote to memory of 2944 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 35 PID 2944 wrote to memory of 2128 2944 net.exe 37 PID 2944 wrote to memory of 2128 2944 net.exe 37 PID 2944 wrote to memory of 2128 2944 net.exe 37 PID 2944 wrote to memory of 2128 2944 net.exe 37 PID 2868 wrote to memory of 1268 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 38 PID 2868 wrote to memory of 1268 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 38 PID 2868 wrote to memory of 1268 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 38 PID 2868 wrote to memory of 1268 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 38 PID 1268 wrote to memory of 1980 1268 net.exe 40 PID 1268 wrote to memory of 1980 1268 net.exe 40 PID 1268 wrote to memory of 1980 1268 net.exe 40 PID 1268 wrote to memory of 1980 1268 net.exe 40 PID 2868 wrote to memory of 2820 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 41 PID 2868 wrote to memory of 2820 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 41 PID 2868 wrote to memory of 2820 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 41 PID 2868 wrote to memory of 2820 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 41 PID 2820 wrote to memory of 2072 2820 net.exe 43 PID 2820 wrote to memory of 2072 2820 net.exe 43 PID 2820 wrote to memory of 2072 2820 net.exe 43 PID 2820 wrote to memory of 2072 2820 net.exe 43 PID 2868 wrote to memory of 2916 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 44 PID 2868 wrote to memory of 2916 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 44 PID 2868 wrote to memory of 2916 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 44 PID 2868 wrote to memory of 2916 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 44 PID 2916 wrote to memory of 2168 2916 net.exe 46 PID 2916 wrote to memory of 2168 2916 net.exe 46 PID 2916 wrote to memory of 2168 2916 net.exe 46 PID 2916 wrote to memory of 2168 2916 net.exe 46 PID 2868 wrote to memory of 3036 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 47 PID 2868 wrote to memory of 3036 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 47 PID 2868 wrote to memory of 3036 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 47 PID 2868 wrote to memory of 3036 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 47 PID 3036 wrote to memory of 2364 3036 net.exe 49 PID 3036 wrote to memory of 2364 3036 net.exe 49 PID 3036 wrote to memory of 2364 3036 net.exe 49 PID 3036 wrote to memory of 2364 3036 net.exe 49 PID 2868 wrote to memory of 2620 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 50 PID 2868 wrote to memory of 2620 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 50 PID 2868 wrote to memory of 2620 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 50 PID 2868 wrote to memory of 2620 2868 2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe 50 PID 2620 wrote to memory of 2708 2620 net.exe 52 PID 2620 wrote to memory of 2708 2620 net.exe 52 PID 2620 wrote to memory of 2708 2620 net.exe 52 PID 2620 wrote to memory of 2708 2620 net.exe 52 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:2900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:2576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:1980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:2072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:2168
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:2364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:2708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵PID:2712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵
- System Location Discovery: System Language Discovery
PID:2844
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵PID:2644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵PID:2624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵PID:1920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:2772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:2652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:2580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:2260
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:2912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:2000
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:1356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:1148
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:1804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵PID:2308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:1760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:1716
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:1704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:1808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:1256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:2248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:1296
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:1372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:1764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:1588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:1636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:1584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:1692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:1892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:2200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵PID:2104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:2156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:1640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵PID:2196
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:2460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵
- System Location Discovery: System Language Discovery
PID:2372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:1932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵
- System Location Discovery: System Language Discovery
PID:1620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵PID:604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:1508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:1788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:1564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:1936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:1908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:1896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:1648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:2672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:3056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:3024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:1752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:2344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:2160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:2120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:2068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵PID:888
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:2452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:1940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:1596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:1128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:1756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:1988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵
- System Location Discovery: System Language Discovery
PID:2392
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵PID:2584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:2232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:2704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵
- System Location Discovery: System Language Discovery
PID:2740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:2836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:2756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:2492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:2904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:2980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:2264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:1816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:1740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵PID:2288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵PID:1632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵PID:1260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵
- System Location Discovery: System Language Discovery
PID:372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵PID:1436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵PID:1196
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:2396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵PID:848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:1708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:2792
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:2080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:2012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵PID:908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:1472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵PID:2560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵PID:1744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:1304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:1076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:1728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:2992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:1916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:3020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:1912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:2340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:1576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:2268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:1052
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:2572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:2600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:2616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵PID:2536
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:2252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:1512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:2276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:2292
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵PID:1792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:2056
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:1536
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:1624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵PID:1628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:2588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:1848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:1876
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:1540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:1660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵PID:1376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:2404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:2172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:2216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:1812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:1724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵PID:1952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:2972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:2636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:2760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:1800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:2180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:1784
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:1560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵PID:2892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵PID:1124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:2220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:3008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:2184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵PID:2948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:2640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:856
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:2592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:1612
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:1280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:2732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:1968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:3060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:2324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:2320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵PID:2420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵PID:2724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵PID:876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:2376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:1084
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:1684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:2188
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:1880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:3092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:3100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:3120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:3128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵PID:3148
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:3156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:3176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵PID:3184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:3204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:3260
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:3268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:3288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:3296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:3316
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵PID:3324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵PID:3344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:3372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:3380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:3400
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:3408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:3428
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵
- System Location Discovery: System Language Discovery
PID:3456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:3464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:3484
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵PID:3492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:3540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:3548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵
- System Location Discovery: System Language Discovery
PID:3568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:3576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:3624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:3632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:3652
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:3660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:3680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:3688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:3708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:3736
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:3744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:3764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:3772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:3792
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:3800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:3820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:3828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:3848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:3856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:3876
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:3884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:3904
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:3940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:3960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:3968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:3988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:3996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:4016
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:4024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:4044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:4052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:4072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:4080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵PID:3096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:3116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:3140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:3180
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:3164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:3224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵PID:3228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:3248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:3312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:3336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:3376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:3360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:3420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:3424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:3444
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵PID:3488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:3508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:3532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:3572
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:3556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:3616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:3620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:3640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:3684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:3704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:3728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:3768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:3752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵
- System Location Discovery: System Language Discovery
PID:3812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:3816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵PID:3836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:3880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:3900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:3924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵PID:3964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:3948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:4008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:4012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:4032
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:480
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵PID:3112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵PID:3172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:3144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵PID:3280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:3252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:3332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:3364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵PID:3404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:3476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:3516
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:3528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
- System Location Discovery: System Language Discovery
PID:3628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:3600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:3700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:3712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵PID:3732
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:3824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵
- System Location Discovery: System Language Discovery
PID:3844
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:3956
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4020
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4228
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4348
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5036
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5116
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4140
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=C: /on=C: /maxsize=401MB2⤵
- Interacts with shadow copies
PID:4204
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=C: /on=C: /maxsize=unbounded2⤵
- Interacts with shadow copies
PID:4300
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=F: /on=F: /maxsize=401MB2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4324
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=F: /on=F: /maxsize=unbounded2⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:4400
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4460
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\2025-01-23_0fbd035c4b9dc78592741178965bb929_avoslocker_cobalt-strike_luca-stealer.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5564 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 1682⤵
- Program crash
PID:6040
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4180
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Discovery
Browser Information Discovery
1Network Share Discovery
1Peripheral Device Discovery
1Query Registry
1Remote System Discovery
1System Information Discovery
1System Location Discovery
1System Language Discovery
1System Network Configuration Discovery
1Internet Connection Discovery
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD52381882ac2461a45e95e856d065acc18
SHA16a6619ea4a611355346d8abafb118b0b5a3ab45a
SHA2566b4a5688e4c2a76ce35326746a3f70071b7ec08a1928160e3c52538accc58611
SHA512255c8f37b03a761cc5ab4a154c34bf1873b35065cfb8b7a54b6a9d92e4bc3fbe9e198475d52a7c0a975c5e9c77f03988786f9c595a178fdac3fd92b808c0f6a1
-
Filesize
3KB
MD57feb555fb491c77104419cfebd3c176f
SHA124c66239a49c4e4e1615e724a7f2eb6de1a7ebd7
SHA25690743535689cc38ccd1c59e0173ea8c442b5fd7b127b696e05b7f280ae2ba80d
SHA5121a5bf9b602b99c94cb1c772333675cd4401508fec8da188938b789a593bdfc22c3f81a6d9fb0957d39bce9eb62e0fb43884997101a5b660a6580424b73d2d51d