Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2025, 03:20
Static task
static1
Behavioral task
behavioral1
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win10v2004-20241007-en
General
-
Target
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
-
Size
624KB
-
MD5
a6980e543efa40771ed1dcf84b29d732
-
SHA1
6586b2155afa5d7cda5cd3f8a7af37c4fe126a1d
-
SHA256
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da
-
SHA512
d1ca8724c8879442907b7e45b59b954100ada37e036aa17496920a9783eb0738ff51831854acc8cafd805c116bfea47a903270fec74949f10b36eddf971ac06f
-
SSDEEP
12288:/ktG6SXJb0DdQ0k0HGzZbkh0wchQ5HYaIhadnR/t256S5AA2Ltyaxn1gUEEkfTSX:kS9JmVSvGWEAng/qwnYPRslWPLu1
Malware Config
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Renames multiple (8802) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Music\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Videos\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Links\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Documents\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Music\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2437139445-1151884604-3026847218-1000\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\sl-sl\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\7-Zip\Lang\hi.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MEDIA\LASER.WAV 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\EssentialResume.dotx 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.YourPhone_0.19051.7.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-white\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.BingWeather_4.25.20211.0_x64__8wekyb3d8bbwe\Assets\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\CircularProgressBar.xbf 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-24_altform-unplated_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\pt-br\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\rsod\office32mui.msi.16.en-us.tree.dat 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CASCADE\THMBNAIL.PNG 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-400.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\s_sortedby_up_selected_18.svg 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\js\nls\de-de\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\images\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsFeedbackHub_1.1907.3152.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\InsiderHubSplashWideTile.scale-125.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsSoundRecorder_10.1906.1972.0_x64__8wekyb3d8bbwe\Assets\VoiceRecorderAppList.contrast-black_targetsize-20.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\StandardVL_MAK-ppd.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Fonts\Georgia.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OutlookR_OEM_Perp-ul-phn.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft.NET\ADOMD.NET\130\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Config\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionGroupWideTile.scale-125.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-black\ExchangeWideTile.scale-150.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\SupplementalDictionaries\en_US\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.Windows.Photos_2019.19071.12548.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\PhotosLargeTile.contrast-black_scale-125.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxManifest.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Windows Media Player\de-DE\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-125_8wekyb3d8bbwe\AppxBlockMap.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-96_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_x64__8wekyb3d8bbwe\Assets\AppTiles\StoreMedTile.scale-200.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\desktop-connector-files\js\nls\zh-cn\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sample-files\js\nls\nl-nl\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\O365SmallBusPremR_SubTrial4-ul-oob.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlusR_OEM_Perp6-ul-oob.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\DESIGNER\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\cue.luac 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\RTL\contrast-black\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\aicuc\images\warning_2x.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\home\images\themes\dark\new_icons.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ExcelCtxUICellLayoutModel.bin 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\mobile_browse.html 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Windows Media Player\de-DE\wmlaunch.exe.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.VP9VideoExtensions_1.0.22681.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-256_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\HxMailLargeTile.scale-400.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\hi_contrast\core_icons_hiContrast_wob.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\ro-ro\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\de-de\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.man 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Personal2019R_Retail-ul-phn.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ka\LC_MESSAGES\vlc.mo 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Home\LTR\contrast-white\LargeTile.scale-125.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ZuneVideo_10.19071.19011.0_neutral_split.scale-100_8wekyb3d8bbwe\AppxBlockMap.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\1.0.1\Test\Modules\Example3.Diagnostics\2.0.1\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Windows Defender\it-IT\shellext.dll.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\SmallTile.scale-100_contrast-black.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-black\OneNoteSmallTile.scale-200.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\Assets\AppTiles\AppIcon.targetsize-40_altform-unplated.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\de-de\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\MLModels\autofill_labeling.ort 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MixedReality.Portal_2000.19081.1301.0_neutral_split.scale-100_8wekyb3d8bbwe\resources.pri 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 9544 448 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 9400 cmd.exe 9492 PING.EXE -
Kills process with taskkill 44 IoCs
pid Process 5608 taskkill.exe 5328 taskkill.exe 6040 taskkill.exe 5164 taskkill.exe 5684 taskkill.exe 5444 taskkill.exe 5800 taskkill.exe 5636 taskkill.exe 6184 taskkill.exe 5796 taskkill.exe 5212 taskkill.exe 5704 taskkill.exe 5168 taskkill.exe 5596 taskkill.exe 6264 taskkill.exe 5552 taskkill.exe 5948 taskkill.exe 5312 taskkill.exe 5308 taskkill.exe 5788 taskkill.exe 6112 taskkill.exe 6064 taskkill.exe 6400 taskkill.exe 5252 taskkill.exe 5656 taskkill.exe 5812 taskkill.exe 1400 taskkill.exe 5892 taskkill.exe 5924 taskkill.exe 5920 taskkill.exe 2688 taskkill.exe 5224 taskkill.exe 5248 taskkill.exe 5200 taskkill.exe 5640 taskkill.exe 5644 taskkill.exe 5152 taskkill.exe 5336 taskkill.exe 5360 taskkill.exe 6456 taskkill.exe 5592 taskkill.exe 6024 taskkill.exe 6128 taskkill.exe 6332 taskkill.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2437139445-1151884604-3026847218-1000\{4AD2BBD1-1E34-4E36-836E-8A1BFC0229FF} explorer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 9492 PING.EXE -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 5252 taskkill.exe Token: SeDebugPrivilege 5552 taskkill.exe Token: SeDebugPrivilege 5644 taskkill.exe Token: SeDebugPrivilege 5656 taskkill.exe Token: SeDebugPrivilege 5796 taskkill.exe Token: SeDebugPrivilege 5812 taskkill.exe Token: SeDebugPrivilege 5948 taskkill.exe Token: SeDebugPrivilege 5152 taskkill.exe Token: SeDebugPrivilege 5312 taskkill.exe Token: SeDebugPrivilege 5608 taskkill.exe Token: SeDebugPrivilege 5328 taskkill.exe Token: SeDebugPrivilege 5592 taskkill.exe Token: SeDebugPrivilege 5800 taskkill.exe Token: SeDebugPrivilege 6024 taskkill.exe Token: SeDebugPrivilege 1400 taskkill.exe Token: SeDebugPrivilege 5212 taskkill.exe Token: SeDebugPrivilege 5200 taskkill.exe Token: SeDebugPrivilege 5704 taskkill.exe Token: SeDebugPrivilege 5892 taskkill.exe Token: SeDebugPrivilege 5308 taskkill.exe Token: SeDebugPrivilege 6040 taskkill.exe Token: SeDebugPrivilege 5164 taskkill.exe Token: SeDebugPrivilege 5640 taskkill.exe Token: SeDebugPrivilege 5684 taskkill.exe Token: SeDebugPrivilege 5924 taskkill.exe Token: SeDebugPrivilege 5920 taskkill.exe Token: SeDebugPrivilege 6128 taskkill.exe Token: SeDebugPrivilege 5168 taskkill.exe Token: SeDebugPrivilege 5636 taskkill.exe Token: SeDebugPrivilege 5596 taskkill.exe Token: SeDebugPrivilege 5788 taskkill.exe Token: SeDebugPrivilege 2688 taskkill.exe Token: SeDebugPrivilege 5336 taskkill.exe Token: SeDebugPrivilege 5224 taskkill.exe Token: SeDebugPrivilege 6112 taskkill.exe Token: SeDebugPrivilege 5248 taskkill.exe Token: SeDebugPrivilege 5444 taskkill.exe Token: SeDebugPrivilege 6064 taskkill.exe Token: SeDebugPrivilege 5360 taskkill.exe Token: SeDebugPrivilege 6184 taskkill.exe Token: SeDebugPrivilege 6264 taskkill.exe Token: SeDebugPrivilege 6332 taskkill.exe Token: SeDebugPrivilege 6400 taskkill.exe Token: SeDebugPrivilege 6456 taskkill.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe Token: SeShutdownPrivilege 3400 explorer.exe Token: SeCreatePagefilePrivilege 3400 explorer.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe 3400 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 448 wrote to memory of 3588 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 448 wrote to memory of 3588 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 448 wrote to memory of 3588 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 3588 wrote to memory of 4424 3588 net.exe 86 PID 3588 wrote to memory of 4424 3588 net.exe 86 PID 3588 wrote to memory of 4424 3588 net.exe 86 PID 448 wrote to memory of 2368 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 448 wrote to memory of 2368 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 448 wrote to memory of 2368 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 2368 wrote to memory of 4912 2368 net.exe 89 PID 2368 wrote to memory of 4912 2368 net.exe 89 PID 2368 wrote to memory of 4912 2368 net.exe 89 PID 448 wrote to memory of 2504 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 448 wrote to memory of 2504 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 448 wrote to memory of 2504 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 2504 wrote to memory of 4668 2504 net.exe 92 PID 2504 wrote to memory of 4668 2504 net.exe 92 PID 2504 wrote to memory of 4668 2504 net.exe 92 PID 448 wrote to memory of 4556 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 448 wrote to memory of 4556 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 448 wrote to memory of 4556 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 4556 wrote to memory of 2316 4556 net.exe 95 PID 4556 wrote to memory of 2316 4556 net.exe 95 PID 4556 wrote to memory of 2316 4556 net.exe 95 PID 448 wrote to memory of 5016 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 448 wrote to memory of 5016 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 448 wrote to memory of 5016 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 5016 wrote to memory of 748 5016 net.exe 98 PID 5016 wrote to memory of 748 5016 net.exe 98 PID 5016 wrote to memory of 748 5016 net.exe 98 PID 448 wrote to memory of 2848 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 448 wrote to memory of 2848 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 448 wrote to memory of 2848 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 2848 wrote to memory of 3036 2848 net.exe 101 PID 2848 wrote to memory of 3036 2848 net.exe 101 PID 2848 wrote to memory of 3036 2848 net.exe 101 PID 448 wrote to memory of 1016 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 448 wrote to memory of 1016 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 448 wrote to memory of 1016 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 1016 wrote to memory of 912 1016 net.exe 104 PID 1016 wrote to memory of 912 1016 net.exe 104 PID 1016 wrote to memory of 912 1016 net.exe 104 PID 448 wrote to memory of 4056 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 448 wrote to memory of 4056 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 448 wrote to memory of 4056 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 4056 wrote to memory of 4832 4056 net.exe 107 PID 4056 wrote to memory of 4832 4056 net.exe 107 PID 4056 wrote to memory of 4832 4056 net.exe 107 PID 448 wrote to memory of 3704 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 448 wrote to memory of 3704 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 448 wrote to memory of 3704 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 3704 wrote to memory of 4340 3704 net.exe 110 PID 3704 wrote to memory of 4340 3704 net.exe 110 PID 3704 wrote to memory of 4340 3704 net.exe 110 PID 448 wrote to memory of 4168 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 448 wrote to memory of 4168 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 448 wrote to memory of 4168 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 4168 wrote to memory of 2096 4168 net.exe 113 PID 4168 wrote to memory of 2096 4168 net.exe 113 PID 4168 wrote to memory of 2096 4168 net.exe 113 PID 448 wrote to memory of 4060 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 448 wrote to memory of 4060 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 448 wrote to memory of 4060 448 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 4060 wrote to memory of 4120 4060 net.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe"C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:4424
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:4912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵
- System Location Discovery: System Language Discovery
PID:4668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:2316
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:4832
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:4340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵PID:2096
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:4120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:1220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:1440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:3308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:4700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:2648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:1100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:3632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:4024
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:5060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵PID:2084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵PID:5044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:4628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:1704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:3452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:4944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:2440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:4484
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:2888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵PID:2112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:3708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:4180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:4116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:4684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:3144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:4000
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:2524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:3384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵
- System Location Discovery: System Language Discovery
PID:2884
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵
- System Location Discovery: System Language Discovery
PID:2008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵PID:3972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:4840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:5068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:1960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:4844
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:3768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:2252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:3200
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵PID:4504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:5064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:4172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:3228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:4916
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:1680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:4496
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:3240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:4644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵PID:5072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:4488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:3080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:4800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:2960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:1684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:2136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:1384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵PID:2220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵PID:4680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵
- System Location Discovery: System Language Discovery
PID:2208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:3880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:3248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:4948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵
- System Location Discovery: System Language Discovery
PID:2668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:4072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:4336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:2528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵
- System Location Discovery: System Language Discovery
PID:4020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵PID:3172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:4816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:2204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:1676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:2972
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:4012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:4460
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:2020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:4448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:5088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:2028
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:1776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:3076
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:3440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵PID:4232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:1568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵PID:536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵PID:3952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵PID:2476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:3644
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:1052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:2756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵PID:4920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵
- System Location Discovery: System Language Discovery
PID:1036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:2736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵PID:1224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:1972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:4272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:5056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:1692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:3988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵PID:1344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:2916
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:4436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:4900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:4044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵
- System Location Discovery: System Language Discovery
PID:4632 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:1216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:3572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:316
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:4652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:636
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:3044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:1252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵PID:2432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵
- System Location Discovery: System Language Discovery
PID:1360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:4768
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:3912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵PID:3316
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:4028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:3088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:4872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:2284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:3184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:2324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:232
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:4264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵PID:68
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:2552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:4788
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:1320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:1860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:4112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵PID:1484
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:1192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:3532
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:3260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:4964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:3548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:2796
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:2192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵PID:2424
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:1584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:4204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:4468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:1140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:4052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:3128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:2176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:4568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:1548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵PID:2900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:4220
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:4080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:3600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:1944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:4276
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵PID:1088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:4984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:3180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:1072
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:4704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:1724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:3220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:1908
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:2172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:1228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:2948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:2760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:4896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:4624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵
- System Location Discovery: System Language Discovery
PID:384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵PID:4384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:4708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:3756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵PID:392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:4064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:3484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:380
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:2052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:3720
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:3784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:2124
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:2408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵
- System Location Discovery: System Language Discovery
PID:4320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:3476
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:4880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:3444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:1328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:2784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:4184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:1840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:5020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵PID:3188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵
- System Location Discovery: System Language Discovery
PID:4868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:4208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:3272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:3996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:3560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:2620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:2116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:3212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:1788
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:2388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:1352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:5112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:5032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵
- System Location Discovery: System Language Discovery
PID:5100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:5004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:2540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:4676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:3232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:1348
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:3256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:4808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵
- System Location Discovery: System Language Discovery
PID:588 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:1560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:1248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:3760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:2792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2904
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:5128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:5176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:5192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:5240
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:5256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:5304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:5320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:5368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:5384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:5436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:5452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:5500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:5520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:5568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:5584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:5632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:5648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:5696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:5712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:5760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵PID:5776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:5824
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:5840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:5888
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
PID:5904 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵
- System Location Discovery: System Language Discovery
PID:5968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:6016
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:6032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:6080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:6096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:2872
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:5172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:5228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵PID:5272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:5340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:5376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:5448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:5428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:5504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:5484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:5528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:5612
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:5660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵
- System Location Discovery: System Language Discovery
PID:5728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵
- System Location Discovery: System Language Discovery
PID:5768 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:5828
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:5816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵
- System Location Discovery: System Language Discovery
PID:5880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:5868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:5940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:5984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵PID:6048
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:6092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:6108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:6140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:5160
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵PID:5180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:5216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵PID:5208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:5344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵PID:5420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:5496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:5556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:5580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵PID:5616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:5628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:5676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5744
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5860
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:5864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:5988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:5936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵PID:6008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵PID:5996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:6060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵PID:6132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:6120
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5252
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5608
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5328
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5800
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6024
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5200
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5704
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5308
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5164
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5640
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5684
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5924
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5920
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6128
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5168
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5636
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5360
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6456
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe2⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:9400 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:9492
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 448 -s 3642⤵
- Program crash
PID:9544
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3400
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 508 -p 448 -ip 4481⤵PID:9448
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD55be240a21583a000097bb33c3587b628
SHA1aa61cda5d31e008857ab901c3bbfd831f8c67213
SHA256a127193fc64578303d579dc546375e2f194055f19adfe6a9f434b237fd3061e5
SHA512c6b2a44da1d9dd9dfdef9b864352dd6f8acb34315397da3e7f533eeef6cdf880a31074ec8d8292fbfb8ea0a6479691a981df6c550bff310b0309161606060a71
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.MEDUSA
Filesize623KB
MD5ea944b08d2cb6c9491add3dbc267db82
SHA129567b335b30c60820bf1f6b7cc94ba78d4f9966
SHA25601688093d52077cb8b01000d7383a7e39e3ab24f40cf8a88d0d480c2074d3f71
SHA512c9d25c53b36ee630b7287f1d524bd2b73fb225e3caa2445f7cf0d93805afb379ae8c369742ff3d1eaa6dc5f1c5b2fea388add0183e36fce2ac2b38704ed715e3
-
Filesize
3KB
MD55403d641e60c7d266a7070be82dba163
SHA14362f925483128ee3fc65d1612309c0475b5cd59
SHA256b60a2235cf8d69a222692ac19230be187e062ab208dbe7ff24027ef47ce0634d
SHA512a013d8462fe8e039150356ef9773b20114d6ae21d21331bb05db200710f1d3b699234ce51cbade7f3caeec577f520cdcc145d149bebdb552e0ebd90fcc41147d