Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2025, 13:27
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe
-
Size
624KB
-
MD5
bdf6ac02664baea655b103d50bdfd6ec
-
SHA1
6613e813d28527f905e23ead7ed66c43d85f5894
-
SHA256
df0f05469702bd70c49045dcbbefc65e735f4116bdb12526cd16110472a51dc8
-
SHA512
c1fd604fbb20b8950d2b9e05fa1c3329c3c13684002750a3ec67c2ac15ce22f52a4296afb962140d057b1e340afc01174a0d7bfa298d57259f01c6fb908ea1bc
-
SSDEEP
12288:mS926SXIb0z9GjskXErHDoBEA8xQJfIGIB6SKYvd+JCexsE2Nts6hElgE0sFwEjV:9nhAJkJmVSvGWEc3v/KwkoaRshWP3et5
Malware Config
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Renames multiple (8904) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Public\Desktop\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Videos\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Links\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-3227495264-2217614367-4027411560-1000\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Music\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Music\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Public\Documents\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\winsdkfb\Images\fb_blank_profile_portrait.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\sl-sl\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Microsoft\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.DesktopAppInstaller_1.0.30251.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-black\AppPackageSplashScreen.scale-100_contrast-black.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-black\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\193.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebpImageExtension_1.0.22753.0_x64__8wekyb3d8bbwe\Assets\WideTile.scale-150.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraAppList.targetsize-40.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\libs\jquery.ui.touch-punch\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\ru-ru\ui-strings.js 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Colors\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\bn\LC_MESSAGES\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ru-ru\ui-strings.js 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\SaslPrep\SaslPrepProfile_norm_bidi.spp 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\de\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\js\nls\nb-no\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\en-gb\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\Adobe\ARM\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.scale-125_contrast-white.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\Square44x44Logo.targetsize-24_altform-lightunplated.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\turnOffNotificationInAcrobat.gif 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\xboxservices.config 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-40_contrast-black.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\Programmer.targetsize-32_contrast-black.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\images\themes\dark\illustrations.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\sl-si\ui-strings.js 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\images\cursors\invalid32x32.gif 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Smart Tag\LISTS\1033\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_neutral_split.scale-125_8wekyb3d8bbwe\images\Square310x310Logo.scale-125.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\Triedit\en-US\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-white\SmallTile.scale-100_contrast-white.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraSmallTile.contrast-black_scale-100.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-60.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-black\AppIcon.targetsize-16_contrast-black.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\eu-es\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ExcelR_Retail-ul-phn.xrm-ms 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\kn-IN\View3d\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinStickyNotes.xml 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\da-dk\ui-strings.js 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\Assertions\BeGreaterThan.Tests.ps1 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Microsoft.Xbox.SmartGlass.Controls\MsaAuthenticatorView.xaml 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.XboxApp_48.49.31001.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\GamesXboxHubWideTile.scale-125.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxSignature.p7x 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteMediumTile.scale-100.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\s_gridview-hover.svg 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\hu-hu\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\EURO\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\194.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Voices\beeps\beeps\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_2019.430.2026.0_neutral_~_8wekyb3d8bbwe\AppxSignature.p7x 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\comment.svg 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\S_IlluNoInternetConnection_120x80.svg 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\uk.pak 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\modules\!!!READ_ME_MEDUSA!!!.txt 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\manifests\BuiltinResearcher.xml 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\OperationValidationResources.psd1 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\hu-HU\tipresx.dll.mui 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\175.png 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftEdge.Stable_92.0.902.67_neutral__8wekyb3d8bbwe\AppxManifest.xml 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 6764 2620 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 5928 cmd.exe 5192 PING.EXE -
Kills process with taskkill 44 IoCs
pid Process 5480 taskkill.exe 6156 taskkill.exe 6464 taskkill.exe 6248 taskkill.exe 6048 taskkill.exe 5840 taskkill.exe 6280 taskkill.exe 6340 taskkill.exe 6120 taskkill.exe 6756 taskkill.exe 5156 taskkill.exe 5668 taskkill.exe 5964 taskkill.exe 5256 taskkill.exe 6000 taskkill.exe 5900 taskkill.exe 4532 taskkill.exe 5952 taskkill.exe 6064 taskkill.exe 5276 taskkill.exe 5456 taskkill.exe 6216 taskkill.exe 7092 taskkill.exe 5884 taskkill.exe 5920 taskkill.exe 6524 taskkill.exe 6580 taskkill.exe 6912 taskkill.exe 7040 taskkill.exe 6008 taskkill.exe 5872 taskkill.exe 5948 taskkill.exe 6640 taskkill.exe 7148 taskkill.exe 6140 taskkill.exe 5536 taskkill.exe 6400 taskkill.exe 1896 taskkill.exe 5772 taskkill.exe 5628 taskkill.exe 6700 taskkill.exe 6808 taskkill.exe 6860 taskkill.exe 6976 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-3227495264-2217614367-4027411560-1000\{8A730F81-FA02-4F3B-B546-419256594C76} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 5192 PING.EXE -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 5884 taskkill.exe Token: SeDebugPrivilege 6008 taskkill.exe Token: SeDebugPrivilege 6140 taskkill.exe Token: SeDebugPrivilege 5156 taskkill.exe Token: SeDebugPrivilege 5668 taskkill.exe Token: SeDebugPrivilege 5964 taskkill.exe Token: SeDebugPrivilege 5872 taskkill.exe Token: SeDebugPrivilege 6048 taskkill.exe Token: SeDebugPrivilege 5480 taskkill.exe Token: SeDebugPrivilege 5840 taskkill.exe Token: SeDebugPrivilege 5952 taskkill.exe Token: SeDebugPrivilege 5256 taskkill.exe Token: SeDebugPrivilege 5772 taskkill.exe Token: SeDebugPrivilege 5628 taskkill.exe Token: SeDebugPrivilege 6064 taskkill.exe Token: SeDebugPrivilege 5536 taskkill.exe Token: SeDebugPrivilege 5276 taskkill.exe Token: SeDebugPrivilege 5456 taskkill.exe Token: SeDebugPrivilege 6000 taskkill.exe Token: SeDebugPrivilege 5900 taskkill.exe Token: SeDebugPrivilege 5920 taskkill.exe Token: SeDebugPrivilege 5948 taskkill.exe Token: SeDebugPrivilege 6156 taskkill.exe Token: SeDebugPrivilege 6216 taskkill.exe Token: SeDebugPrivilege 6280 taskkill.exe Token: SeDebugPrivilege 6340 taskkill.exe Token: SeDebugPrivilege 6400 taskkill.exe Token: SeDebugPrivilege 6464 taskkill.exe Token: SeDebugPrivilege 6524 taskkill.exe Token: SeDebugPrivilege 6580 taskkill.exe Token: SeDebugPrivilege 6640 taskkill.exe Token: SeDebugPrivilege 6700 taskkill.exe Token: SeDebugPrivilege 6756 taskkill.exe Token: SeDebugPrivilege 6808 taskkill.exe Token: SeDebugPrivilege 6860 taskkill.exe Token: SeDebugPrivilege 6912 taskkill.exe Token: SeDebugPrivilege 6976 taskkill.exe Token: SeDebugPrivilege 7040 taskkill.exe Token: SeDebugPrivilege 7092 taskkill.exe Token: SeDebugPrivilege 7148 taskkill.exe Token: SeDebugPrivilege 6120 taskkill.exe Token: SeDebugPrivilege 1896 taskkill.exe Token: SeDebugPrivilege 6248 taskkill.exe Token: SeDebugPrivilege 4532 taskkill.exe Token: SeShutdownPrivilege 6224 explorer.exe Token: SeCreatePagefilePrivilege 6224 explorer.exe Token: SeShutdownPrivilege 6224 explorer.exe Token: SeCreatePagefilePrivilege 6224 explorer.exe Token: SeShutdownPrivilege 6224 explorer.exe Token: SeCreatePagefilePrivilege 6224 explorer.exe Token: SeShutdownPrivilege 6224 explorer.exe Token: SeCreatePagefilePrivilege 6224 explorer.exe Token: SeShutdownPrivilege 6224 explorer.exe Token: SeCreatePagefilePrivilege 6224 explorer.exe Token: SeShutdownPrivilege 6224 explorer.exe Token: SeCreatePagefilePrivilege 6224 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe 6224 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 3720 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 83 PID 2620 wrote to memory of 3720 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 83 PID 2620 wrote to memory of 3720 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 83 PID 3720 wrote to memory of 3560 3720 net.exe 85 PID 3720 wrote to memory of 3560 3720 net.exe 85 PID 3720 wrote to memory of 3560 3720 net.exe 85 PID 2620 wrote to memory of 3136 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 86 PID 2620 wrote to memory of 3136 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 86 PID 2620 wrote to memory of 3136 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 86 PID 3136 wrote to memory of 3880 3136 net.exe 88 PID 3136 wrote to memory of 3880 3136 net.exe 88 PID 3136 wrote to memory of 3880 3136 net.exe 88 PID 2620 wrote to memory of 4968 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 89 PID 2620 wrote to memory of 4968 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 89 PID 2620 wrote to memory of 4968 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 89 PID 4968 wrote to memory of 3940 4968 net.exe 91 PID 4968 wrote to memory of 3940 4968 net.exe 91 PID 4968 wrote to memory of 3940 4968 net.exe 91 PID 2620 wrote to memory of 2440 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 92 PID 2620 wrote to memory of 2440 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 92 PID 2620 wrote to memory of 2440 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 92 PID 2440 wrote to memory of 1280 2440 net.exe 94 PID 2440 wrote to memory of 1280 2440 net.exe 94 PID 2440 wrote to memory of 1280 2440 net.exe 94 PID 2620 wrote to memory of 1288 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 95 PID 2620 wrote to memory of 1288 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 95 PID 2620 wrote to memory of 1288 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 95 PID 1288 wrote to memory of 1740 1288 net.exe 97 PID 1288 wrote to memory of 1740 1288 net.exe 97 PID 1288 wrote to memory of 1740 1288 net.exe 97 PID 2620 wrote to memory of 3960 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 98 PID 2620 wrote to memory of 3960 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 98 PID 2620 wrote to memory of 3960 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 98 PID 3960 wrote to memory of 4784 3960 net.exe 100 PID 3960 wrote to memory of 4784 3960 net.exe 100 PID 3960 wrote to memory of 4784 3960 net.exe 100 PID 2620 wrote to memory of 3904 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 101 PID 2620 wrote to memory of 3904 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 101 PID 2620 wrote to memory of 3904 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 101 PID 3904 wrote to memory of 100 3904 net.exe 103 PID 3904 wrote to memory of 100 3904 net.exe 103 PID 3904 wrote to memory of 100 3904 net.exe 103 PID 2620 wrote to memory of 3004 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 104 PID 2620 wrote to memory of 3004 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 104 PID 2620 wrote to memory of 3004 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 104 PID 3004 wrote to memory of 1884 3004 net.exe 106 PID 3004 wrote to memory of 1884 3004 net.exe 106 PID 3004 wrote to memory of 1884 3004 net.exe 106 PID 2620 wrote to memory of 5012 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 107 PID 2620 wrote to memory of 5012 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 107 PID 2620 wrote to memory of 5012 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 107 PID 5012 wrote to memory of 4492 5012 net.exe 109 PID 5012 wrote to memory of 4492 5012 net.exe 109 PID 5012 wrote to memory of 4492 5012 net.exe 109 PID 2620 wrote to memory of 4328 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 110 PID 2620 wrote to memory of 4328 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 110 PID 2620 wrote to memory of 4328 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 110 PID 4328 wrote to memory of 116 4328 net.exe 112 PID 4328 wrote to memory of 116 4328 net.exe 112 PID 4328 wrote to memory of 116 4328 net.exe 112 PID 2620 wrote to memory of 2396 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 113 PID 2620 wrote to memory of 2396 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 113 PID 2620 wrote to memory of 2396 2620 2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe 113 PID 2396 wrote to memory of 4600 2396 net.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:3560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:3880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:1280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:1740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵PID:4784
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:1884
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵PID:116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:4600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:2708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:348
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:2472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:4420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:4116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:1580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:1308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:4100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:4716
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵PID:4480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:1556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵
- System Location Discovery: System Language Discovery
PID:4640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:3272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:3432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:1748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵
- System Location Discovery: System Language Discovery
PID:3148
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:5004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:4392
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:2720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:4588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:2276
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:4740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:4760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:1224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵
- System Location Discovery: System Language Discovery
PID:2100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:2232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:1348
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:4500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:3236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:4356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵PID:3036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:4856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:1212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:3264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:3140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:1284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:1444
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:1936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:4240
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:4224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:5044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:3284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:4708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:1016
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:1208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:1636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3708 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:1260
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:2184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:4932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:4140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:3636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:1080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:3376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:4144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:1336
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:3192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:4728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:4012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:1344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:1716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵PID:4196
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:2144
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵
- System Location Discovery: System Language Discovery
PID:4128 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:4576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:2984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵PID:376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:4024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:2104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:2080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵PID:3360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:4068
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:2552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:2156
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:2340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:2456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:5028
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:3208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:4836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:4608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:4992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:2132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵PID:2336
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:2588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵PID:4432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵PID:836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵PID:2040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵PID:4004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵PID:3816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:2660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵PID:1432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:2764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:4060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:3252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵PID:4604
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:3200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵PID:1644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:4572
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:5088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:3380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:3232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:3684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:4132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:4788
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:2376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:4400
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:4056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:3112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:2024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:1944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:1064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:2920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵PID:4648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:4296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵PID:1672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:1192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵
- System Location Discovery: System Language Discovery
PID:3352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:2888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:2992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵PID:4212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:1864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:2436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:5108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:5116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵PID:4528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:2056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:4452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:3648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:4120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:1124
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:3220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵
- System Location Discovery: System Language Discovery
PID:372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:3152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:2528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:4504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:2344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:4472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵PID:3332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:876
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:1948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:3744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:2716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵PID:916
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵PID:4496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1200
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:4052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:1820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:3088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵
- System Location Discovery: System Language Discovery
PID:4592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵PID:2816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:3268
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:3188
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:5104
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:4936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:3808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:4340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:2424
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:3532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵PID:436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:4416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:4568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:3800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵PID:4940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:3212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:5008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:5032
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:4900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:1828
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:4488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:2784
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:4864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵PID:1100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:3768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:2512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵PID:1900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:4384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:4408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:1172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:1452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:3844
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:1136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:1404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵PID:3108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵PID:1400
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵
- System Location Discovery: System Language Discovery
PID:4176 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:1940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:3244
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:5020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:1428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:3740
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵PID:5132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:5184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:5200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:5248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:5264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:5312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:5328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵PID:5376
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:5396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:5444
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:5460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:5508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:5524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:5572
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵
- System Location Discovery: System Language Discovery
PID:5588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:5636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:5652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:5700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:5716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵
- System Location Discovery: System Language Discovery
PID:5764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:5780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:5828
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:5848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:5896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:5912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:5960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:5976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:6024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:6040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:6088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:6104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:3612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵
- System Location Discovery: System Language Discovery
PID:5160
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:5140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:5228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:5324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:5348
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:5392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:5452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:5420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:5504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:5488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:5604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:5596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:5712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:5728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵PID:5804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:5892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:5876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:5944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:5992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:6060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:6096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:5180
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵PID:5252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵
- System Location Discovery: System Language Discovery
PID:5380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:5344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵
- System Location Discovery: System Language Discovery
PID:5448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵
- System Location Discovery: System Language Discovery
PID:5416 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:5520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:5432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:5576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:5672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:5776
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:5684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:5824
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:5800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:5864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:5860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵PID:5956
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:6020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:6080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:2700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵PID:5188
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:5152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵
- System Location Discovery: System Language Discovery
PID:5240
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:5304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:5272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵PID:5316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:5532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵PID:5644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵PID:5768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:5620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵PID:5752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:5868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:5832
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:6032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵
- System Location Discovery: System Language Discovery
PID:6056
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:5172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:6068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:5384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:5436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:5484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵
- System Location Discovery: System Language Discovery
PID:5516
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:5692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:5640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵
- System Location Discovery: System Language Discovery
PID:5704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:5808
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5964
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6048
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5480
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5840
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5536
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5276
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5456
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6156
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6808
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6976
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\2025-01-25_bdf6ac02664baea655b103d50bdfd6ec_avoslocker_cobalt-strike_luca-stealer.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5928 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5192
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 49362⤵
- Program crash
PID:6764
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6224
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 2620 -ip 26201⤵PID:6572
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD53a8067a8a03d844f8bfb4d07fc3837ee
SHA15a38e56cae3e23335e864fddc275f594faaf8e1d
SHA256492c7c550ac83c2a50a9e415521f7c47b83caae047aba0c9baf29d8ae6b1fb2e
SHA512c97a8f9a93eec46f2b16b6b275e936d336e09679d3a1456573540fae4569957e935b56542eb13ec8ad96b82d06a353fad020ac590c44c0d4cc17564188dc4374
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.MEDUSA
Filesize623KB
MD5cb9194d1652d1b7adf133a7115bd115b
SHA1544375c044b7539bc40ac7e3d57b151d25c9ffb4
SHA25625dfbf1577f69577316885886ca3fa56888c633c83787a5b3c90c06f6c433098
SHA51282b25ab4d15adbfc45b9d7079f9d0b7aad2f587cb7f75001cdb570d524462c31287ad4bdcadd7c0a923eb7eaae291caf491eb3ad6d3136cd11be5e56c0cd96b8
-
Filesize
3KB
MD5eb325d190d7581289d070d081cb7e7e6
SHA1225bedff90495c4260ec907feddb724b5aafaef7
SHA2566cf8ba92114861b06da7f1d1259c8b5cfe2467dffcf9c22d734cafe0bdb338c5
SHA51223c51b03ff4eaa4d21c44a2292a01d4bc5707268a46feee284813263b96cda501da3d4293abff4cc8e376dd0b7d88e0e1d6ce8ebb1fcebeed3117bc9bb2c297c