File name:

0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe

Full analysis: https://app.any.run/tasks/ea176b6f-2868-44df-a3b0-104edc00aaeb
Verdict: Malicious activity
Threats:

Medusa is a ransomware malware family targeting businesses and institutions. Medusa encrypts crucial data, rendering it inaccessible, and attempts to pressure users to pay to regain control of their information. The group behind this malicious software hosts a TOR website where it shares the list of the organizations whose infrastructure has been compromised. This malware utilizes various tactics, including exploiting vulnerabilities and employs a unique file extension (".MEDUSA") to mark encrypted files.

Analysis date: April 29, 2025, 16:06:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
xor-url
generic
medusa
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

983A20479A281A182D33B75C0945E447

SHA1:

0D16A8891CA0662CF43F4A87CF2769BBDC39B279

SHA256:

0065B818525D8A364F5D9E4B801E3408DAD6576CE6D8CA5C01B19C3857A08D64

SSDEEP:

12288:YC//8v+VvS7o0NMG7IrkuXlLg9gOWE6nCfotSoM3xgYK4HRfVZmH5:jcv+VvS7o0NMG7IrnOWEoCfotMgkV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • net.exe (PID: 7840)
      • net.exe (PID: 7480)
      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
      • net.exe (PID: 7928)
      • net.exe (PID: 7752)
      • net.exe (PID: 7664)
      • net.exe (PID: 7568)
      • net.exe (PID: 7648)
      • net.exe (PID: 5960)
      • net.exe (PID: 7552)
      • net.exe (PID: 6700)
      • net.exe (PID: 7800)
      • net.exe (PID: 7724)
      • net.exe (PID: 7960)
      • net.exe (PID: 7920)
      • net.exe (PID: 8016)
      • net.exe (PID: 8104)
      • net.exe (PID: 5588)
      • net.exe (PID: 8128)
      • net.exe (PID: 4408)
      • net.exe (PID: 7284)
      • net.exe (PID: 5968)
      • net.exe (PID: 3240)
      • net.exe (PID: 7212)
      • net.exe (PID: 4208)
      • net.exe (PID: 5988)
      • net.exe (PID: 8044)
      • net.exe (PID: 7352)
      • net.exe (PID: 7956)
      • net.exe (PID: 6944)
      • net.exe (PID: 4448)
      • net.exe (PID: 7640)
      • net.exe (PID: 7792)
      • net.exe (PID: 7228)
      • net.exe (PID: 4880)
      • net.exe (PID: 1184)
      • net.exe (PID: 5800)
      • net.exe (PID: 7612)
      • net.exe (PID: 7804)
      • net.exe (PID: 7836)
      • net.exe (PID: 7236)
      • net.exe (PID: 8000)
      • net.exe (PID: 8132)
      • net.exe (PID: 7912)
      • net.exe (PID: 7936)
      • net.exe (PID: 8188)
      • net.exe (PID: 5956)
      • net.exe (PID: 7244)
      • net.exe (PID: 7524)
      • net.exe (PID: 7496)
      • net.exe (PID: 7872)
      • net.exe (PID: 864)
      • net.exe (PID: 8080)
      • net.exe (PID: 6044)
      • net.exe (PID: 7544)
      • net.exe (PID: 4652)
      • net.exe (PID: 7884)
      • net.exe (PID: 8148)
      • net.exe (PID: 7692)
      • net.exe (PID: 7148)
      • net.exe (PID: 7996)
      • net.exe (PID: 7848)
      • net.exe (PID: 5720)
      • net.exe (PID: 7296)
      • net.exe (PID: 6640)
      • net.exe (PID: 5048)
      • net.exe (PID: 6620)
      • net.exe (PID: 3888)
      • net.exe (PID: 7904)
      • net.exe (PID: 7916)
      • net.exe (PID: 2392)
      • net.exe (PID: 8160)
      • net.exe (PID: 1764)
      • net.exe (PID: 7748)
      • net.exe (PID: 1020)
      • net.exe (PID: 7172)
      • net.exe (PID: 8156)
      • net.exe (PID: 7320)
      • net.exe (PID: 5408)
      • net.exe (PID: 5512)
      • net.exe (PID: 8096)
      • net.exe (PID: 7776)
      • net.exe (PID: 1616)
      • net.exe (PID: 7868)
      • net.exe (PID: 6540)
      • net.exe (PID: 7152)
      • net.exe (PID: 6184)
      • net.exe (PID: 7980)
      • net.exe (PID: 7812)
      • net.exe (PID: 8040)
      • net.exe (PID: 4776)
      • net.exe (PID: 6112)
      • net.exe (PID: 1532)
      • net.exe (PID: 7192)
      • net.exe (PID: 5548)
      • net.exe (PID: 4756)
      • net.exe (PID: 8568)
      • net.exe (PID: 8656)
      • net.exe (PID: 8480)
      • net.exe (PID: 8304)
      • net.exe (PID: 8212)
      • net.exe (PID: 4244)
      • net.exe (PID: 7988)
      • net.exe (PID: 6652)
      • net.exe (PID: 7992)
      • net.exe (PID: 8920)
      • net.exe (PID: 8832)
      • net.exe (PID: 9008)
      • net.exe (PID: 9096)
      • net.exe (PID: 2600)
      • net.exe (PID: 8392)
      • net.exe (PID: 8744)
      • net.exe (PID: 7784)
      • net.exe (PID: 8320)
      • net.exe (PID: 9184)
      • net.exe (PID: 8540)
      • net.exe (PID: 8784)
      • net.exe (PID: 8684)
      • net.exe (PID: 8840)
      • net.exe (PID: 8460)
      • net.exe (PID: 9032)
      • net.exe (PID: 8620)
      • net.exe (PID: 9164)
      • net.exe (PID: 4920)
      • net.exe (PID: 8264)
      • net.exe (PID: 8532)
      • net.exe (PID: 8404)
      • net.exe (PID: 8984)
      • net.exe (PID: 9108)
      • net.exe (PID: 8376)
      • net.exe (PID: 8268)
      • net.exe (PID: 9156)
      • net.exe (PID: 8756)
      • net.exe (PID: 9148)
      • net.exe (PID: 8512)
      • net.exe (PID: 8652)
      • net.exe (PID: 8932)
      • net.exe (PID: 8596)
      • net.exe (PID: 8908)
      • net.exe (PID: 8796)
      • net.exe (PID: 8468)
      • net.exe (PID: 8588)
      • net.exe (PID: 8348)
      • net.exe (PID: 8720)
      • net.exe (PID: 9132)
      • net.exe (PID: 8388)
      • net.exe (PID: 8648)
      • net.exe (PID: 9028)
      • net.exe (PID: 8552)
      • net.exe (PID: 8764)
      • net.exe (PID: 8760)
      • net.exe (PID: 9212)
      • net.exe (PID: 9208)
      • net.exe (PID: 8688)
      • net.exe (PID: 8928)
      • net.exe (PID: 9036)
      • net.exe (PID: 8848)
      • net.exe (PID: 8356)
      • net.exe (PID: 9140)
      • net.exe (PID: 8988)
      • net.exe (PID: 8220)
      • net.exe (PID: 9116)
      • net.exe (PID: 7336)
      • net.exe (PID: 8608)
      • net.exe (PID: 7652)
      • net.exe (PID: 7604)
      • net.exe (PID: 8640)
      • net.exe (PID: 8792)
      • net.exe (PID: 8864)
      • net.exe (PID: 8516)
      • net.exe (PID: 8972)
      • net.exe (PID: 8284)
      • net.exe (PID: 8780)
      • net.exe (PID: 9112)
      • net.exe (PID: 8636)
      • net.exe (PID: 8632)
      • net.exe (PID: 7708)
      • net.exe (PID: 7196)
      • net.exe (PID: 1676)
      • net.exe (PID: 8664)
    • Antivirus name has been found in the command line (generic signature)

      • taskkill.exe (PID: 9916)
    • XORed URL has been found (YARA)

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Uses TASKKILL.EXE to kill antiviruses

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • RANSOMWARE has been detected

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • MEDUSA note has been found

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • MEDUSA has been detected

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill process

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Uses TASKKILL.EXE to kill Office Apps

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Uses TASKKILL.EXE to kill Browsers

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
  • INFO

    • Checks supported languages

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:28 21:45:46+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.27
CodeSize: 488960
InitializedDataSize: 192512
UninitializedDataSize: -
EntryPoint: 0x37bfa
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
758
Monitored processes
631
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XOR-URL 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe no specs conhost.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs sppextcomobj.exe no specs net1.exe no specs net.exe no specs slui.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632taskkill /F /IM steam.exe /TC:\Windows\SysWOW64\taskkill.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
728C:\WINDOWS\system32\net1 stop "POP3Svc" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
732C:\WINDOWS\system32\net1 stop "mozyprobackup" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
736taskkill /F /IM ocomm.exe /TC:\Windows\SysWOW64\taskkill.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
780C:\WINDOWS\system32\net1 stop "ReportServer$TPSAMA" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
856taskkill /F /IM sqlagent.exe /TC:\Windows\SysWOW64\taskkill.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
864net stop "MSExchangeES" /yC:\Windows\SysWOW64\net.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
10 117
Read events
10 117
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
931
Text files
271
Unknown types
0

Dropped files

PID
Process
Filename
Type
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Mozilla Firefox\omni.ja
MD5:
SHA256:
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.MEDUSAbinary
MD5:B090EC86A19CB50E5D64FA5FB499BA2F
SHA256:689B9D63BB30614622212E1925755F7C0F2E075E6A2234A85FE28453C24654E3
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.inibinary
MD5:B090EC86A19CB50E5D64FA5FB499BA2F
SHA256:689B9D63BB30614622212E1925755F7C0F2E075E6A2234A85FE28453C24654E3
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\!!!READ_ME_MEDUSA!!!.txttext
MD5:675C75BFFA6C0565F604B581ACE8CB1C
SHA256:A84C394CB82BD65D85231CC1F74ADE4FD27CBBE3FB696396F17D41FFFF5E80FA
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ClientCapabilities.jsonbinary
MD5:311F16F236CBE8787C17642EBAC99EC2
SHA256:73BD239DA60467ECAB6FD37EFADF1C2D881131BAF7C2BEE31745AE11E21A98DB
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xmlbinary
MD5:28C5DAB856C340E01723B5CF39BBA122
SHA256:2EF1A56589F19A690AFAD29D3A5F1E19B08C8BB4D79DD43C0FE675A5F837EBDD
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ClientEventLogMessages.manbinary
MD5:A3F2CDC1E18B353C2C92A6BCC07E66CA
SHA256:06952DBFF880BAF2A7E8EA044063D06BA80E944EBCDDE2E7B7C5E471B28F4F06
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\FrequentOfficeUpdateSchedule.xmlbinary
MD5:EAA4F5DB803F8B04735A3D89F8945BA5
SHA256:ABC9DE69728AE48EE068866BB126AD814B78B1F7B7A5DBD6405CCB232854944F
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\i640.cab.catbinary
MD5:A9E82BE2C50E60A950FDB773512B4CE4
SHA256:1B2128A93D7A08F82A0B86E9F1CDBFE66E7172AD250BD613B9E99A947FECC6DB
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\AppVClientIsv.manbinary
MD5:C240398081B72BBB8C575137CA6B47C9
SHA256:61D08E14F78328EF92A083415B6E062E0A4E2B3CDFAB7EBC48AFB6B169B7F72C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
10168
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
10168
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
10168
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.36
  • 23.216.77.8
  • 23.216.77.35
  • 23.216.77.37
  • 23.216.77.41
  • 23.216.77.38
  • 23.216.77.31
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.1
  • 40.126.31.128
  • 20.190.159.73
  • 40.126.31.73
  • 20.190.159.2
  • 20.190.159.71
  • 20.190.159.131
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info