Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20250128-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250128-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
03/02/2025, 08:39
Static task
static1
Behavioral task
behavioral1
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral2
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win10ltsc2021-20250128-en
Behavioral task
behavioral3
Sample
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
Resource
win11-20241007-en
General
-
Target
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe
-
Size
624KB
-
MD5
a6980e543efa40771ed1dcf84b29d732
-
SHA1
6586b2155afa5d7cda5cd3f8a7af37c4fe126a1d
-
SHA256
3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da
-
SHA512
d1ca8724c8879442907b7e45b59b954100ada37e036aa17496920a9783eb0738ff51831854acc8cafd805c116bfea47a903270fec74949f10b36eddf971ac06f
-
SSDEEP
12288:/ktG6SXJb0DdQ0k0HGzZbkh0wchQ5HYaIhadnR/t256S5AA2Ltyaxn1gUEEkfTSX:kS9JmVSvGWEAng/qwnYPRslWPLu1
Malware Config
Signatures
-
Medusa Ransomware
Ransomware first identified in 2022 that is distinct from the similarly named ransomware family MedusaLocker.
-
Medusaransomware family
-
Renames multiple (8610) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2839013668-2276131261-2828740280-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 5 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\System Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\History\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Application Shortcuts\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Administrative Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Windows PowerShell\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Documents\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group3\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Libraries\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Links\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\System Tools\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\3D Objects\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Music\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Music\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Accessories\System Tools\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\AccountPictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\$Recycle.Bin\S-1-5-21-2839013668-2276131261-2828740280-1000\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group1\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\SendTo\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification F:\$RECYCLE.BIN\S-1-5-21-2839013668-2276131261-2828740280-1000\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\1033\DataServices\DESKTOP.INI 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Local\Microsoft\Windows\Burn\Burn2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Videos\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessibility\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Accessories\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Default\AppData\Local\Microsoft\Windows\WinX\Group2\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Maintenance\Desktop.ini 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\ink\hu-HU\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\PublisherR_Retail-ul-oob.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\Microsoft Office\root\Office16\FPA_f14\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\themes\dark\illustrations_retina.png 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fr-ma\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Internet Explorer\images\bing.ico 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019R_Trial2-ul-oob.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\GRPHFLT\JPEGIM32.FLT 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\Font\MinionPro-Bold.otf 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Common Files\System\en-US\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\zh-Hant\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\Access2019VL_KMS_Client_AE-ppd.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Common Files\System\msadc\ja-JP\msadcor.dll.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Locales\id.pak 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\AFTRNOON\AFTRNOON.INF 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\si\LC_MESSAGES\vlc.mo 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Windows Defender\de-DE\MsMpRes.dll.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Document Themes 16\Theme Effects\Banded Edge.eftx 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Mozilla Firefox\browser\VisualElements\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\dailymotion.luac 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Windows Defender\it-IT\OfflineScannerShell.exe.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\cs-cz\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Java\jdk-1.8\include\jni.h 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\VideoLAN\VLC\plugins\control\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\images\file_types\s_filetype_xd.svg 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\sk-sk\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Trust Protection Lists\Mu\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\OneNoteVL_MAK-ul-phn.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProjectProR_Retail2-ppd.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\nb-no\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\pl-pl\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\ja-jp\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\ResiliencyLinks\Locales\bs.pak.DATA 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\iexplore.exe.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Java\jre-1.8\lib\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\cs-cz\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\images\themeless\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\ar-ae\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\fr-fr\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\uk-ua\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\gstreamer.md 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Integration\C2RManifest.OSM.OSM.x-none.msi.16.x-none.xml 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\gd\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\zh-tw\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\images\themeless\Localized_images\ja-jp\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Resource\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\ob-preview\js\nls\uk-ua\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Common Files\System\msadc\it-IT\msaddsr.dll.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\Microsoft Office\root\Office16\MSIPC\ja\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\UCRTBASE.DLL 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files\VideoLAN\VLC\locale\sm\LC_MESSAGES\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Updater.api 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\zh-cn\ui-strings.js 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-recent-files\js\nls\pl-pl\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Reader\DC\Linguistics\Providers\Plugins2\AdobeHunspellPlugin\Dictionaries\en_GB\README.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\client-issuance-ul-oob.xrm-ms 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\MANIFEST.XML 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Tracker\pdf.gif 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\walk-through\js\nls\nl-nl\!!!READ_ME_MEDUSA!!!.txt 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Common Files\System\ado\it-IT\msader15.dll.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe File opened for modification C:\Program Files (x86)\Windows Media Player\it-IT\wmpnssci.dll.mui 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 7148 1628 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4144 cmd.exe 6820 PING.EXE -
Kills process with taskkill 44 IoCs
pid Process 5444 taskkill.exe 6088 taskkill.exe 2392 taskkill.exe 5808 taskkill.exe 568 taskkill.exe 5248 taskkill.exe 5400 taskkill.exe 5580 taskkill.exe 5296 taskkill.exe 5140 taskkill.exe 5796 taskkill.exe 6032 taskkill.exe 3952 taskkill.exe 5340 taskkill.exe 5464 taskkill.exe 5724 taskkill.exe 6060 taskkill.exe 5632 taskkill.exe 5720 taskkill.exe 5560 taskkill.exe 5584 taskkill.exe 5656 taskkill.exe 5648 taskkill.exe 5900 taskkill.exe 5320 taskkill.exe 5448 taskkill.exe 5672 taskkill.exe 6120 taskkill.exe 5148 taskkill.exe 5376 taskkill.exe 5772 taskkill.exe 5380 taskkill.exe 5912 taskkill.exe 5356 taskkill.exe 5508 taskkill.exe 5712 taskkill.exe 5532 taskkill.exe 6028 taskkill.exe 3972 taskkill.exe 5204 taskkill.exe 5344 taskkill.exe 5856 taskkill.exe 5756 taskkill.exe 5484 taskkill.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-2839013668-2276131261-2828740280-1000\{8056AD25-7D00-4785-95F4-5486F93E5BFA} explorer.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 6820 PING.EXE -
Suspicious use of AdjustPrivilegeToken 56 IoCs
description pid Process Token: SeDebugPrivilege 6120 taskkill.exe Token: SeDebugPrivilege 5140 taskkill.exe Token: SeDebugPrivilege 5344 taskkill.exe Token: SeDebugPrivilege 5464 taskkill.exe Token: SeDebugPrivilege 5560 taskkill.exe Token: SeDebugPrivilege 5584 taskkill.exe Token: SeDebugPrivilege 5656 taskkill.exe Token: SeDebugPrivilege 5724 taskkill.exe Token: SeDebugPrivilege 5796 taskkill.exe Token: SeDebugPrivilege 568 taskkill.exe Token: SeDebugPrivilege 6060 taskkill.exe Token: SeDebugPrivilege 5148 taskkill.exe Token: SeDebugPrivilege 5248 taskkill.exe Token: SeDebugPrivilege 5376 taskkill.exe Token: SeDebugPrivilege 5400 taskkill.exe Token: SeDebugPrivilege 5508 taskkill.exe Token: SeDebugPrivilege 5648 taskkill.exe Token: SeDebugPrivilege 5772 taskkill.exe Token: SeDebugPrivilege 5856 taskkill.exe Token: SeDebugPrivilege 5900 taskkill.exe Token: SeDebugPrivilege 6032 taskkill.exe Token: SeDebugPrivilege 5320 taskkill.exe Token: SeDebugPrivilege 5448 taskkill.exe Token: SeDebugPrivilege 5632 taskkill.exe Token: SeDebugPrivilege 5672 taskkill.exe Token: SeDebugPrivilege 5444 taskkill.exe Token: SeDebugPrivilege 5756 taskkill.exe Token: SeDebugPrivilege 3952 taskkill.exe Token: SeDebugPrivilege 5712 taskkill.exe Token: SeDebugPrivilege 5296 taskkill.exe Token: SeDebugPrivilege 5380 taskkill.exe Token: SeDebugPrivilege 5532 taskkill.exe Token: SeDebugPrivilege 5484 taskkill.exe Token: SeDebugPrivilege 5912 taskkill.exe Token: SeDebugPrivilege 6028 taskkill.exe Token: SeDebugPrivilege 6088 taskkill.exe Token: SeDebugPrivilege 5356 taskkill.exe Token: SeDebugPrivilege 5340 taskkill.exe Token: SeDebugPrivilege 5580 taskkill.exe Token: SeDebugPrivilege 5720 taskkill.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 3972 taskkill.exe Token: SeDebugPrivilege 5204 taskkill.exe Token: SeDebugPrivilege 5808 taskkill.exe Token: SeShutdownPrivilege 6216 explorer.exe Token: SeCreatePagefilePrivilege 6216 explorer.exe Token: SeShutdownPrivilege 6216 explorer.exe Token: SeCreatePagefilePrivilege 6216 explorer.exe Token: SeShutdownPrivilege 6216 explorer.exe Token: SeCreatePagefilePrivilege 6216 explorer.exe Token: SeShutdownPrivilege 6216 explorer.exe Token: SeCreatePagefilePrivilege 6216 explorer.exe Token: SeShutdownPrivilege 6216 explorer.exe Token: SeCreatePagefilePrivilege 6216 explorer.exe Token: SeShutdownPrivilege 6216 explorer.exe Token: SeCreatePagefilePrivilege 6216 explorer.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe 6216 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2012 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 1628 wrote to memory of 2012 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 1628 wrote to memory of 2012 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 84 PID 2012 wrote to memory of 3576 2012 net.exe 86 PID 2012 wrote to memory of 3576 2012 net.exe 86 PID 2012 wrote to memory of 3576 2012 net.exe 86 PID 1628 wrote to memory of 476 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 1628 wrote to memory of 476 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 1628 wrote to memory of 476 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 87 PID 476 wrote to memory of 2936 476 net.exe 89 PID 476 wrote to memory of 2936 476 net.exe 89 PID 476 wrote to memory of 2936 476 net.exe 89 PID 1628 wrote to memory of 1180 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 1628 wrote to memory of 1180 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 1628 wrote to memory of 1180 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 90 PID 1180 wrote to memory of 2020 1180 net.exe 92 PID 1180 wrote to memory of 2020 1180 net.exe 92 PID 1180 wrote to memory of 2020 1180 net.exe 92 PID 1628 wrote to memory of 2520 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 1628 wrote to memory of 2520 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 1628 wrote to memory of 2520 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 93 PID 2520 wrote to memory of 780 2520 net.exe 95 PID 2520 wrote to memory of 780 2520 net.exe 95 PID 2520 wrote to memory of 780 2520 net.exe 95 PID 1628 wrote to memory of 4640 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 1628 wrote to memory of 4640 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 1628 wrote to memory of 4640 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 96 PID 4640 wrote to memory of 3216 4640 net.exe 98 PID 4640 wrote to memory of 3216 4640 net.exe 98 PID 4640 wrote to memory of 3216 4640 net.exe 98 PID 1628 wrote to memory of 4988 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 1628 wrote to memory of 4988 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 1628 wrote to memory of 4988 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 99 PID 4988 wrote to memory of 4316 4988 net.exe 101 PID 4988 wrote to memory of 4316 4988 net.exe 101 PID 4988 wrote to memory of 4316 4988 net.exe 101 PID 1628 wrote to memory of 332 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 1628 wrote to memory of 332 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 1628 wrote to memory of 332 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 102 PID 332 wrote to memory of 1540 332 net.exe 104 PID 332 wrote to memory of 1540 332 net.exe 104 PID 332 wrote to memory of 1540 332 net.exe 104 PID 1628 wrote to memory of 3940 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 1628 wrote to memory of 3940 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 1628 wrote to memory of 3940 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 105 PID 3940 wrote to memory of 5068 3940 net.exe 107 PID 3940 wrote to memory of 5068 3940 net.exe 107 PID 3940 wrote to memory of 5068 3940 net.exe 107 PID 1628 wrote to memory of 4840 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 1628 wrote to memory of 4840 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 1628 wrote to memory of 4840 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 108 PID 4840 wrote to memory of 4536 4840 net.exe 110 PID 4840 wrote to memory of 4536 4840 net.exe 110 PID 4840 wrote to memory of 4536 4840 net.exe 110 PID 1628 wrote to memory of 4764 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 1628 wrote to memory of 4764 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 1628 wrote to memory of 4764 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 111 PID 4764 wrote to memory of 4348 4764 net.exe 113 PID 4764 wrote to memory of 4348 4764 net.exe 113 PID 4764 wrote to memory of 4348 4764 net.exe 113 PID 1628 wrote to memory of 1456 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 1628 wrote to memory of 1456 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 1628 wrote to memory of 1456 1628 3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe 114 PID 1456 wrote to memory of 1552 1456 net.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe"C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe"1⤵
- Drops startup file
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:3576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:2020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:780
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:3216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵PID:4316
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:1540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:5068
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:4536
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵PID:4348
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:1552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:3644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:3252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:2040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:3320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵PID:2548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:4652
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:3476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵PID:5080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:3976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵PID:1676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:4904
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵PID:4260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:2924
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵PID:2344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵PID:3684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:1116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:4356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:5048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:1864
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:1520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵PID:2912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:4440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵
- System Location Discovery: System Language Discovery
PID:2828
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:2780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:1132
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:4264
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:3208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:3764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:860
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:2136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:3048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵PID:4400
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:4000
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:4608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵PID:1616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:2668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:2212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:4620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:60
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵
- System Location Discovery: System Language Discovery
PID:4888
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵PID:1256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵PID:3992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵PID:4724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:3404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:4868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵
- System Location Discovery: System Language Discovery
PID:2460
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵PID:2884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:3288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:2276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4248
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:4756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵
- System Location Discovery: System Language Discovery
PID:856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:4772
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:1512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:3500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵PID:2156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:5096
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:1604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵PID:960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵PID:1292
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵PID:3260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:2600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:3740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:1208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵PID:2840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵PID:4060
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:1320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:2644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵PID:1088
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:5064
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:4480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵
- System Location Discovery: System Language Discovery
PID:1944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵
- System Location Discovery: System Language Discovery
PID:3900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:888
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:4604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵
- System Location Discovery: System Language Discovery
PID:1716
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:2124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵PID:2112
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:1352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:2568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:1620
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:2364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵PID:1128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:4280 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵PID:3988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:4288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:3880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:3136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:3084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵PID:384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:5092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:824
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:4676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵PID:2256
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵PID:4684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵
- System Location Discovery: System Language Discovery
PID:2868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵PID:3220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:2332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:4712
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:2284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:2000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵
- System Location Discovery: System Language Discovery
PID:4896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:1224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵PID:436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:2940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:3700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:2272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:3592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:3416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:1632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵PID:760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:4960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵PID:932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵PID:4492
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:4076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:4648
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:1816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵PID:1544
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵PID:1028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:3536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
- System Location Discovery: System Language Discovery
PID:4452
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:3100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:2252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵
- System Location Discovery: System Language Discovery
PID:660 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵
- System Location Discovery: System Language Discovery
PID:3512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵PID:2788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:4368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵PID:2844
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:3016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵PID:2408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵PID:2120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:2680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:2296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵PID:4880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵PID:4760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:2688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:4532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:4672
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:2800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵PID:1184
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:3556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:2708
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:2060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵
- System Location Discovery: System Language Discovery
PID:2872
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵PID:2792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:2996
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:1140
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵PID:4692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵PID:3640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:1608
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:936
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:1272
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵
- System Location Discovery: System Language Discovery
PID:3664 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:3308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵PID:2796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵PID:3436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:2236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:2304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:3612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:4032
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:1728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵
- System Location Discovery: System Language Discovery
PID:3340 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵
- System Location Discovery: System Language Discovery
PID:4004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵PID:2784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:5008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:1820
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:3712
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:4116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:2816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:1176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵PID:4352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:4680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:2836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:4008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵PID:4900
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:1920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:980
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵PID:3480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:4596
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:4592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:2420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:4424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:4448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵PID:1172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:2244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:1756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:520
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵PID:4372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:4224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:1696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:2852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:2340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:4624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵PID:656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:3792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:3096
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵
- System Location Discovery: System Language Discovery
PID:2016 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵
- System Location Discovery: System Language Discovery
PID:3236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:4012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵
- System Location Discovery: System Language Discovery
PID:4552 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:1724
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:2492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵PID:1052
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵PID:3968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵
- System Location Discovery: System Language Discovery
PID:3648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:4600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵PID:3948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:3588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:1904
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵PID:3400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:1988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:4244
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:1284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:2092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:4476
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵PID:4660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:4556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:2360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:2988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:1688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:3504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵PID:5052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:3188
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:1612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵PID:3368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:4208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:1252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:1436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:2356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵PID:376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:3748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:1600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:2956
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:3856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:4468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:4876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵PID:3364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:2448
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:4664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:4460
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5180
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵PID:5196
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:5244
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:5264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:5308
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵
- System Location Discovery: System Language Discovery
PID:5324 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵PID:5372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:5388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:5436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵
- System Location Discovery: System Language Discovery
PID:5500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵
- System Location Discovery: System Language Discovery
PID:5516 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:5556
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:5572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:5620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:5636
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:5684
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:5700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:5748
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:5764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:5812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:5828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:5876
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:5892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:5932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:5948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵PID:5988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:6004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:6052
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:6068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵PID:6116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:6132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:3632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:5188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:5208
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵PID:5240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5300 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:5404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵PID:5396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:5512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:5568
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:5536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵
- System Location Discovery: System Language Discovery
PID:5628
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5612 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:5676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5664
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5736
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:5776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:5844
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFSGT" /y2⤵PID:5884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFSGT" /y3⤵PID:5940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "KAVFS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5920 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "KAVFS" /y3⤵PID:5976
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfefire" /y2⤵PID:6016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfefire" /y3⤵PID:6084
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM zoolz.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM agntsvc.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5140
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbeng50.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5344
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM dbsnmp.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM encsvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM excel.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5584
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM firefoxconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM infopath.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5724
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM isqlplussvc.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5796
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msaccess.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM msftesql.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6060
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mspub.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5148
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopqos.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mydesktopservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5376
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-nt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mysqld-opt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocautoupds.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocomm.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM ocssd.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5900
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM onenote.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM oracle.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM outlook.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5448
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM powerpnt.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5632
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqbcoreservice.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5672
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlagent.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlbrowser.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlservr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM sqlwriter.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM steam.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5296
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM synctime.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tbirdconfig.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5484
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thebat64.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM thunderbird.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM visio.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:6088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM winword.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM wordpad.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5340
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM xfssvccon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM tmlisten.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5720
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM PccNTMon.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2392
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM CNTAoSMgr.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM Ntrtscan.exe /T2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /IM mbamtray.exe /T2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5808
-
-
C:\Windows\SysWOW64\cmd.execmd /c ping localhost -n 3 > nul & del C:\Users\Admin\AppData\Local\Temp\3a6d5694eec724726efa3327a50fad3efdc623c08d647b51e51cd578bddda3da.exe2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4144 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 33⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:6820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 47122⤵
- Program crash
PID:7148
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:6216
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 560 -p 1628 -ip 16281⤵PID:6528
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488B
MD5dd87d4081870af017d5c5960eb5f69a8
SHA1278281658b8a4db8ba64a77a4b6c3a4ec3c56c62
SHA256b361919d02db813edbc0533d986949bae5be6b4b58d3ff54b1415a3f8a68d7b0
SHA51265a98e51d9a0e7475837825866d2c877edb479a84094c40bc732c6fb4b71247ea949afc2aa4e84cd699ff6b7b5d2fb2eff0ab7b0ac098bc712fcae13d577b11f
-
C:\ProgramData\Microsoft\Windows\Caches\{DDF571F2-BE98-426D-8288-1A9A39C3FDA2}.2.ver0x0000000000000001.db.MEDUSA
Filesize623KB
MD5ad8a3dfa51cbb034aeffc4fffb3eb245
SHA188d588dda8bf8d5218d530185514361e74024162
SHA2563e3bbf130fca1b497e674d309cdc2f37465590d9e85ea4d3398c909b474587ff
SHA51276e47007598ef4fe7af889e2ca7e8248e5c72e796c8f85784ec45307e8222d035db43f85babb93aa556fd86fc5d00d377a850c0ac94bf3d9bb998b5a058ba3e0
-
Filesize
3KB
MD55403d641e60c7d266a7070be82dba163
SHA14362f925483128ee3fc65d1612309c0475b5cd59
SHA256b60a2235cf8d69a222692ac19230be187e062ab208dbe7ff24027ef47ce0634d
SHA512a013d8462fe8e039150356ef9773b20114d6ae21d21331bb05db200710f1d3b699234ce51cbade7f3caeec577f520cdcc145d149bebdb552e0ebd90fcc41147d