Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win10v2004-20241007-en
General
-
Target
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
-
Size
624KB
-
MD5
a6980e543efa40771ed1dcf84b29d732
-
SHA1
6586b2155afa5d7cda5cd3f8a7af37c4fe126a1d
-
SHA256
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da
-
SHA512
d1ca8724c8879442907b7e45b59b954100ada37e036aa17496920a9783eb0738ff51831854acc8cafd805c116bfea47a903270fec74949f10b36eddf971ac06f
-
SSDEEP
12288:/ktG6SXJb0DdQ0k0HGzZbkh0wchQ5HYaIhadnR/t256S5AA2Ltyaxn1gUEEkfTSX:kS9JmVSvGWEAng/qwnYPRslWPLu1
Malware Config
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Renames multiple (8860) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Public\Libraries\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2878641211-696417878-3864914810-1000\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Documents\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Music\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Videos\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Links\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Music\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\LargeTile.scale-100.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGameOverlay_1.46.11001.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\GamesXboxHubStoreLogo.scale-100.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\nls\en-gb\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\images\themeless\Playstore\tr_get.svg 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusiness2019R_OEM_Perp-ppd.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdVL_KMS_Client-ul.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherImages\423x173\19.jpg 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_neutral_~_8wekyb3d8bbwe\AppxMetadata\AppxBundleManifest.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WebMediaExtensions_1.0.20875.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppList.targetsize-32_altform-unplated_contrast-white.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\SecondaryTiles\Work\contrast-white\SmallTile.scale-100.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxGamingOverlay_2.34.28001.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxSignature.p7x 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\ECHO\ECHO.ELM 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsCamera_2018.826.98.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WindowsIcons\WindowsCameraWideTile.contrast-white_scale-125.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\contrast-white\MixedRealityPortalSplashScreen.scale-100_contrast-white.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\New-Fixture.ps1 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\tr-tr\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files-select\js\plugin.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\hr-hr\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\ko-kr\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Locales\lb.pak 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\HomeBusinessR_Trial2-pl.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.targetsize-16.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\SplashScreen.scale-200.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\WindowsPowerShell\Modules\Pester\3.4.0\Functions\TestResults.Tests.ps1 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\nl.pak 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ko\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteNotebookLargeTile.scale-400.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\tools\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\AppTiles\WeatherIcons\30x30\196.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxCalendarAppList.targetsize-64_altform-unplated.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_x64__8wekyb3d8bbwe\PointerIndicatorPixelShader.cso 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\core\dev\nls\tr-tr\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\el.pak 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionWideTile.scale-150.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_~_8wekyb3d8bbwe\AppxBlockMap.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxManifest.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\mobile_fillsign_logo.svg 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\VideoFrameExtractor\UserControls\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\Assets\WindowsIcons\StoreLogo.contrast-black_scale-100.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ru\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\lg\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.GetHelp_10.1706.13331.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\WideTile.scale-125_contrast-white.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-80_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\fi-fi\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\ext\jaccess.jar 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-40_altform-unplated_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.XboxApp_48.49.31001.0_x64__8wekyb3d8bbwe\Assets\LiveTiles\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\back-arrow-focus.svg 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\Functions\TestResults.ps1 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectStd2019VL_MAK_AE-ul-oob.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\osfFPA\addins.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-36_altform-unplated_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\ReactAssets\assets\RNApp\app\uwp\images\typing\bubble\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\plugin.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\dotnet\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Common.View.UWP\Strings\fr-CA\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\it-it\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\ja-jp\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\MoviesAnywhereLogoWithTextLight.scale-125.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7880 5100 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 7764 cmd.exe 6628 PING.EXE -
Kills process with taskkill 44 IoCs
pid Process 5144 taskkill.exe 6016 taskkill.exe 6068 taskkill.exe 6548 taskkill.exe 4488 taskkill.exe 6440 taskkill.exe 5344 taskkill.exe 5740 taskkill.exe 6492 taskkill.exe 7004 taskkill.exe 6632 taskkill.exe 6736 taskkill.exe 5416 taskkill.exe 6104 taskkill.exe 6256 taskkill.exe 6376 taskkill.exe 6432 taskkill.exe 6088 taskkill.exe 6164 taskkill.exe 6792 taskkill.exe 7116 taskkill.exe 6404 taskkill.exe 6816 taskkill.exe 5984 taskkill.exe 5388 taskkill.exe 6316 taskkill.exe 6620 taskkill.exe 6680 taskkill.exe 5220 taskkill.exe 5968 taskkill.exe 6880 taskkill.exe 6940 taskkill.exe 6172 taskkill.exe 6372 taskkill.exe 6500 taskkill.exe 6060 taskkill.exe 5688 taskkill.exe 6116 taskkill.exe 5684 taskkill.exe 6740 taskkill.exe 7064 taskkill.exe 5780 taskkill.exe 6192 taskkill.exe 6788 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2878641211-696417878-3864914810-1000\{D5E4B40A-F04A-48A7-A87B-1EFD89B656FF} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6628 PING.EXE -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 5968 taskkill.exe Token: SeDebugPrivilege 6088 taskkill.exe Token: SeDebugPrivilege 5416 taskkill.exe Token: SeDebugPrivilege 5780 taskkill.exe Token: SeDebugPrivilege 6060 taskkill.exe Token: SeDebugPrivilege 5984 taskkill.exe Token: SeDebugPrivilege 6104 taskkill.exe Token: SeDebugPrivilege 5344 taskkill.exe Token: SeDebugPrivilege 5688 taskkill.exe Token: SeDebugPrivilege 5144 taskkill.exe Token: SeDebugPrivilege 6116 taskkill.exe Token: SeDebugPrivilege 5684 taskkill.exe Token: SeDebugPrivilege 5388 taskkill.exe Token: SeDebugPrivilege 6016 taskkill.exe Token: SeDebugPrivilege 5740 taskkill.exe Token: SeDebugPrivilege 6068 taskkill.exe Token: SeDebugPrivilege 6164 taskkill.exe Token: SeDebugPrivilege 6256 taskkill.exe Token: SeDebugPrivilege 6316 taskkill.exe Token: SeDebugPrivilege 6376 taskkill.exe Token: SeDebugPrivilege 6432 taskkill.exe Token: SeDebugPrivilege 6492 taskkill.exe Token: SeDebugPrivilege 6548 taskkill.exe Token: SeDebugPrivilege 6620 taskkill.exe Token: SeDebugPrivilege 6680 taskkill.exe Token: SeDebugPrivilege 6740 taskkill.exe Token: SeDebugPrivilege 6792 taskkill.exe Token: SeDebugPrivilege 6880 taskkill.exe Token: SeDebugPrivilege 6940 taskkill.exe Token: SeDebugPrivilege 7004 taskkill.exe Token: SeDebugPrivilege 7064 taskkill.exe Token: SeDebugPrivilege 7116 taskkill.exe Token: SeDebugPrivilege 4488 taskkill.exe Token: SeDebugPrivilege 5220 taskkill.exe Token: SeDebugPrivilege 6172 taskkill.exe Token: SeDebugPrivilege 6192 taskkill.exe Token: SeDebugPrivilege 6372 taskkill.exe Token: SeDebugPrivilege 6404 taskkill.exe Token: SeDebugPrivilege 6440 taskkill.exe Token: SeDebugPrivilege 6500 taskkill.exe Token: SeDebugPrivilege 6632 taskkill.exe Token: SeDebugPrivilege 6736 taskkill.exe Token: SeDebugPrivilege 6788 taskkill.exe Token: SeDebugPrivilege 6816 taskkill.exe Token: SeShutdownPrivilege 6780 explorer.exe Token: SeCreatePagefilePrivilege 6780 explorer.exe Token: SeShutdownPrivilege 6780 explorer.exe Token: SeCreatePagefilePrivilege 6780 explorer.exe Token: SeShutdownPrivilege 6780 explorer.exe Token: SeCreatePagefilePrivilege 6780 explorer.exe Token: SeShutdownPrivilege 6780 explorer.exe Token: SeCreatePagefilePrivilege 6780 explorer.exe Token: SeShutdownPrivilege 6780 explorer.exe Token: SeCreatePagefilePrivilege 6780 explorer.exe Token: SeShutdownPrivilege 6780 explorer.exe Token: SeCreatePagefilePrivilege 6780 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe 6780 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5100 wrote to memory of 224 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 5100 wrote to memory of 224 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 5100 wrote to memory of 224 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 224 wrote to memory of 3580 224 net.exe 86 PID 224 wrote to memory of 3580 224 net.exe 86 PID 224 wrote to memory of 3580 224 net.exe 86 PID 5100 wrote to memory of 2384 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 5100 wrote to memory of 2384 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 5100 wrote to memory of 2384 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 2384 wrote to memory of 1384 2384 net.exe 89 PID 2384 wrote to memory of 1384 2384 net.exe 89 PID 2384 wrote to memory of 1384 2384 net.exe 89 PID 5100 wrote to memory of 2080 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 5100 wrote to memory of 2080 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 5100 wrote to memory of 2080 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 2080 wrote to memory of 1140 2080 net.exe 92 PID 2080 wrote to memory of 1140 2080 net.exe 92 PID 2080 wrote to memory of 1140 2080 net.exe 92 PID 5100 wrote to memory of 4284 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 5100 wrote to memory of 4284 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 5100 wrote to memory of 4284 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 4284 wrote to memory of 1656 4284 net.exe 95 PID 4284 wrote to memory of 1656 4284 net.exe 95 PID 4284 wrote to memory of 1656 4284 net.exe 95 PID 5100 wrote to memory of 3608 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 5100 wrote to memory of 3608 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 5100 wrote to memory of 3608 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 3608 wrote to memory of 2100 3608 net.exe 98 PID 3608 wrote to memory of 2100 3608 net.exe 98 PID 3608 wrote to memory of 2100 3608 net.exe 98 PID 5100 wrote to memory of 3316 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 5100 wrote to memory of 3316 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 5100 wrote to memory of 3316 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 3316 wrote to memory of 5004 3316 net.exe 101 PID 3316 wrote to memory of 5004 3316 net.exe 101 PID 3316 wrote to memory of 5004 3316 net.exe 101 PID 5100 wrote to memory of 3236 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 5100 wrote to memory of 3236 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 5100 wrote to memory of 3236 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 3236 wrote to memory of 1156 3236 net.exe 104 PID 3236 wrote to memory of 1156 3236 net.exe 104 PID 3236 wrote to memory of 1156 3236 net.exe 104 PID 5100 wrote to memory of 1904 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 5100 wrote to memory of 1904 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 5100 wrote to memory of 1904 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 1904 wrote to memory of 724 1904 net.exe 107 PID 1904 wrote to memory of 724 1904 net.exe 107 PID 1904 wrote to memory of 724 1904 net.exe 107 PID 5100 wrote to memory of 3676 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 5100 wrote to memory of 3676 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 5100 wrote to memory of 3676 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 3676 wrote to memory of 3472 3676 net.exe 110 PID 3676 wrote to memory of 3472 3676 net.exe 110 PID 3676 wrote to memory of 3472 3676 net.exe 110 PID 5100 wrote to memory of 1096 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 5100 wrote to memory of 1096 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 5100 wrote to memory of 1096 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 1096 wrote to memory of 3504 1096 net.exe 113 PID 1096 wrote to memory of 3504 1096 net.exe 113 PID 1096 wrote to memory of 3504 1096 net.exe 113 PID 5100 wrote to memory of 3412 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 5100 wrote to memory of 3412 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 5100 wrote to memory of 3412 5100 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 3412 wrote to memory of 4700 3412 net.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe"C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵
- System Location Discovery: System Language Discovery
PID:3580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:1384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:1140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:1656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:2100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:1156
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:3472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵PID:3504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:4700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:2692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:3540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:4836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:1736
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:1684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:4496
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:4300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:3328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:3568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:1216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵PID:632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:4816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:3448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵
- System Location Discovery: System Language Discovery
PID:4008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵PID:2768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:2748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:2224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:1160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:2496
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵
- System Location Discovery: System Language Discovery
PID:4792 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:4560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:3620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:1084
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:1236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:4412
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:2696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:4868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:1240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:3632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:4800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:1328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:2980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:3136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:1868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵PID:2356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:5016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:4984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:5060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:4152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:3572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:5092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:4616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵
- System Location Discovery: System Language Discovery
PID:4164 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵PID:3320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵
- System Location Discovery: System Language Discovery
PID:264
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:2380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:1652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:2844
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:2904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:2236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:3604
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:2852
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:1596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:4224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:2400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:4568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵
- System Location Discovery: System Language Discovery
PID:624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:1860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:3628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:2552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵PID:2364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵PID:3996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:1028
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:4440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵
- System Location Discovery: System Language Discovery
PID:4396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:3912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:3056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵
- System Location Discovery: System Language Discovery
PID:468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:2704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:2172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵PID:3688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵PID:2912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:3856
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:4392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:32
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:1356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:3512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:3248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:1796
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:2200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:4928
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:2816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:2780
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:2092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:4388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:1660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵PID:3592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵PID:2536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:1752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵PID:4048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:4296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:4584
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵PID:1940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:4524
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:5056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:536
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:3868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵PID:3968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:5080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:2344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:1968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵PID:4936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:5048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:4948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:1620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:1812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:3984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:1424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:4032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:3368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:2108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:1308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:4220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵PID:2632
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:3660
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵PID:1100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:2832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:5088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵PID:4932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:4360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:4432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵
- System Location Discovery: System Language Discovery
PID:4828
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:1404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
- System Location Discovery: System Language Discovery
PID:3596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:4592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:1572
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:4520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:3372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:1828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵PID:4480
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:4336
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:1932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:1600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:4556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:3404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:4612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:3264
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:4688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:3820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:1876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:1080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:5108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:2480
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵
- System Location Discovery: System Language Discovery
PID:3140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵PID:4428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:1504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:4444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:4712
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:3408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3616 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:3192
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:1388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:2248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:2064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵
- System Location Discovery: System Language Discovery
PID:2408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:1888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:3064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:2756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:1760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:3308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:4852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:2932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵PID:1320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵PID:2452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:3684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:4588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵PID:4844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:2848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:2928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:1648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:1372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:2168
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:1092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:3876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵PID:2428
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:4028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:3892
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵PID:3240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:1528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:1492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:4656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:4456
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:4108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:5000
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:2112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵
- System Location Discovery: System Language Discovery
PID:1232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵PID:2948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵PID:2204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:4280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:4664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:4708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:1592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵PID:4124
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:3416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:1228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:1732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:2812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:4808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:2476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:4532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵PID:1488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:3128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:2660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:4452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:3332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:4040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:1800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:4916
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:5132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵
- System Location Discovery: System Language Discovery
PID:5180
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:5196
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:5236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:5252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:5300
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:5316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:5364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:5380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:5420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:5436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:5500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:5520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:5596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:5640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵PID:5700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:5752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:5832
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:5860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:5920
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:5940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:6008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:6024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:6064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:6080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:6120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:6140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:5112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:5184 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:5244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:5216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:5296
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵
- System Location Discovery: System Language Discovery
PID:5428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:5448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵
- System Location Discovery: System Language Discovery
PID:5496 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵
- System Location Discovery: System Language Discovery
PID:5576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:5548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:5680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:5792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:2432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵
- System Location Discovery: System Language Discovery
PID:5964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵
- System Location Discovery: System Language Discovery
PID:5976 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:6048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:6032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:5148
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:3388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:5248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵
- System Location Discovery: System Language Discovery
PID:5172 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:5264
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:5336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:5404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:5504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:5616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:5676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵
- System Location Discovery: System Language Discovery
PID:5728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵PID:5808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:5888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:5960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:6044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵
- System Location Discovery: System Language Discovery
PID:5988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:5856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:6096
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:5124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:5288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5224 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:5324
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵PID:5552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:5408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵
- System Location Discovery: System Language Discovery
PID:5704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:5656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:5820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵PID:6012
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:5592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:6072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:2464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:5228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:5284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:5360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵PID:5332
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:5788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:5840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵PID:5800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵
- System Location Discovery: System Language Discovery
PID:5892
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6104
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5144
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6432
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6492
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6792
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:7116
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6192
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6440
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6816
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:7764 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6628
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5100 -s 3642⤵
- Program crash
PID:7880
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6780
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 512 -p 5100 -ip 51001⤵PID:7536
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD50e7daf463947b21cecdba0355760b7eb
SHA19924f80773d766f0326798656eef5a0f8a945c0a
SHA256fa081188ba3b753ce42544a1e1dc839463fb5a67b67170dd94138200e40b9d9b
SHA5127d4d6023e4f25595a6c890bda6b6daa101701b08c013eaf3f57d20c94460e78df14abecc6b2ef963b07e977f2b464f749465671a09d3af25d6a5df324e1c480f
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.MEDUSA
Filesize623KB
MD5a2f7596a743fe6b7cb53e90699cad1c7
SHA10172252ca8999f931968c994b2a3b2019c586965
SHA2565e71e38b2566f86e064f738ba97e213ad96abd0f0c1804ec2f4a55126b19d2cb
SHA51237bb4b88879ac80545d43ce9788488ee4c74cc928806ea5401fa44df96e4cea1a452eae42bdf1b6ded3b9e741f28fe926339aeb1111964e79245ed6a8615269c
-
Filesize
3KB
MD55403d641e60c7d266a7070be82dba163
SHA14362f925483128ee3fc65d1612309c0475b5cd59
SHA256b60a2235cf8d69a222692ac19230be187e062ab208dbe7ff24027ef47ce0634d
SHA512a013d8462fe8e039150356ef9773b20114d6ae21d21331bb05db200710f1d3b699234ce51cbade7f3caeec577f520cdcc145d149bebdb552e0ebd90fcc41147d