File name:

0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe

Full analysis: https://app.any.run/tasks/ea176b6f-2868-44df-a3b0-104edc00aaeb
Verdict: Malicious activity
Threats:

Medusa is a ransomware malware family targeting businesses and institutions. Medusa encrypts crucial data, rendering it inaccessible, and attempts to pressure users to pay to regain control of their information. The group behind this malicious software hosts a TOR website where it shares the list of the organizations whose infrastructure has been compromised. This malware utilizes various tactics, including exploiting vulnerabilities and employs a unique file extension (".MEDUSA") to mark encrypted files.

Analysis date: April 29, 2025, 16:06:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
xor-url
generic
medusa
ransomware
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

983A20479A281A182D33B75C0945E447

SHA1:

0D16A8891CA0662CF43F4A87CF2769BBDC39B279

SHA256:

0065B818525D8A364F5D9E4B801E3408DAD6576CE6D8CA5C01B19C3857A08D64

SSDEEP:

12288:YC//8v+VvS7o0NMG7IrkuXlLg9gOWE6nCfotSoM3xgYK4HRfVZmH5:jcv+VvS7o0NMG7IrnOWEoCfotMgkV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Starts NET.EXE for service management

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
      • net.exe (PID: 7664)
      • net.exe (PID: 7568)
      • net.exe (PID: 7480)
      • net.exe (PID: 7752)
      • net.exe (PID: 7840)
      • net.exe (PID: 7928)
      • net.exe (PID: 8016)
      • net.exe (PID: 8104)
      • net.exe (PID: 5588)
      • net.exe (PID: 6700)
      • net.exe (PID: 5960)
      • net.exe (PID: 7552)
      • net.exe (PID: 7724)
      • net.exe (PID: 7800)
      • net.exe (PID: 7920)
      • net.exe (PID: 7284)
      • net.exe (PID: 5968)
      • net.exe (PID: 8128)
      • net.exe (PID: 5988)
      • net.exe (PID: 4408)
      • net.exe (PID: 3240)
      • net.exe (PID: 4208)
      • net.exe (PID: 8132)
      • net.exe (PID: 6944)
      • net.exe (PID: 8044)
      • net.exe (PID: 7792)
      • net.exe (PID: 7956)
      • net.exe (PID: 7228)
      • net.exe (PID: 1184)
      • net.exe (PID: 4448)
      • net.exe (PID: 4880)
      • net.exe (PID: 5800)
      • net.exe (PID: 8000)
      • net.exe (PID: 7912)
      • net.exe (PID: 7804)
      • net.exe (PID: 7836)
      • net.exe (PID: 5956)
      • net.exe (PID: 7612)
      • net.exe (PID: 8188)
      • net.exe (PID: 7524)
      • net.exe (PID: 7236)
      • net.exe (PID: 864)
      • net.exe (PID: 7936)
      • net.exe (PID: 7244)
      • net.exe (PID: 7496)
      • net.exe (PID: 4652)
      • net.exe (PID: 8080)
      • net.exe (PID: 6044)
      • net.exe (PID: 7544)
      • net.exe (PID: 8148)
      • net.exe (PID: 7872)
      • net.exe (PID: 7148)
      • net.exe (PID: 7296)
      • net.exe (PID: 5720)
      • net.exe (PID: 7884)
      • net.exe (PID: 7692)
      • net.exe (PID: 6620)
      • net.exe (PID: 7848)
      • net.exe (PID: 7996)
      • net.exe (PID: 5048)
      • net.exe (PID: 7904)
      • net.exe (PID: 6640)
      • net.exe (PID: 7748)
      • net.exe (PID: 3888)
      • net.exe (PID: 1764)
      • net.exe (PID: 7172)
      • net.exe (PID: 7648)
      • net.exe (PID: 7960)
      • net.exe (PID: 7212)
      • net.exe (PID: 7352)
      • net.exe (PID: 7640)
      • net.exe (PID: 8160)
      • net.exe (PID: 7320)
      • net.exe (PID: 5512)
      • net.exe (PID: 7776)
      • net.exe (PID: 5408)
      • net.exe (PID: 1616)
      • net.exe (PID: 6184)
      • net.exe (PID: 7652)
      • net.exe (PID: 7152)
      • net.exe (PID: 7336)
      • net.exe (PID: 8096)
      • net.exe (PID: 6540)
      • net.exe (PID: 7868)
      • net.exe (PID: 7708)
      • net.exe (PID: 7812)
      • net.exe (PID: 4776)
      • net.exe (PID: 6112)
      • net.exe (PID: 7196)
      • net.exe (PID: 7980)
      • net.exe (PID: 7192)
      • net.exe (PID: 1532)
      • net.exe (PID: 8040)
      • net.exe (PID: 5548)
      • net.exe (PID: 4756)
      • net.exe (PID: 4244)
      • net.exe (PID: 6652)
      • net.exe (PID: 7992)
      • net.exe (PID: 8568)
      • net.exe (PID: 7988)
      • net.exe (PID: 8304)
      • net.exe (PID: 8744)
      • net.exe (PID: 8480)
      • net.exe (PID: 8212)
      • net.exe (PID: 8392)
      • net.exe (PID: 8832)
      • net.exe (PID: 8656)
      • net.exe (PID: 8920)
      • net.exe (PID: 9008)
      • net.exe (PID: 9096)
      • net.exe (PID: 2600)
      • net.exe (PID: 9184)
      • net.exe (PID: 8320)
      • net.exe (PID: 9164)
      • net.exe (PID: 8460)
      • net.exe (PID: 8540)
      • net.exe (PID: 7784)
      • net.exe (PID: 8620)
      • net.exe (PID: 8684)
      • net.exe (PID: 9032)
      • net.exe (PID: 4920)
      • net.exe (PID: 8784)
      • net.exe (PID: 8532)
      • net.exe (PID: 8840)
      • net.exe (PID: 8264)
      • net.exe (PID: 8596)
      • net.exe (PID: 8404)
      • net.exe (PID: 8908)
      • net.exe (PID: 7916)
      • net.exe (PID: 2392)
      • net.exe (PID: 1020)
      • net.exe (PID: 8652)
      • net.exe (PID: 8268)
      • net.exe (PID: 8756)
      • net.exe (PID: 8932)
      • net.exe (PID: 8376)
      • net.exe (PID: 8512)
      • net.exe (PID: 9212)
      • net.exe (PID: 9148)
      • net.exe (PID: 8468)
      • net.exe (PID: 8348)
      • net.exe (PID: 8588)
      • net.exe (PID: 9132)
      • net.exe (PID: 9156)
      • net.exe (PID: 8388)
      • net.exe (PID: 8720)
      • net.exe (PID: 8552)
      • net.exe (PID: 9028)
      • net.exe (PID: 8760)
      • net.exe (PID: 9208)
      • net.exe (PID: 8648)
      • net.exe (PID: 8764)
      • net.exe (PID: 8792)
      • net.exe (PID: 8928)
      • net.exe (PID: 8640)
      • net.exe (PID: 8688)
      • net.exe (PID: 9036)
      • net.exe (PID: 8156)
      • net.exe (PID: 8848)
      • net.exe (PID: 8356)
      • net.exe (PID: 8988)
      • net.exe (PID: 9140)
      • net.exe (PID: 1676)
      • net.exe (PID: 8220)
      • net.exe (PID: 8608)
      • net.exe (PID: 8972)
      • net.exe (PID: 8284)
      • net.exe (PID: 9116)
      • net.exe (PID: 8664)
      • net.exe (PID: 7604)
      • net.exe (PID: 8516)
      • net.exe (PID: 8864)
      • net.exe (PID: 8780)
      • net.exe (PID: 9112)
      • net.exe (PID: 8632)
      • net.exe (PID: 8636)
      • net.exe (PID: 8796)
      • net.exe (PID: 9108)
      • net.exe (PID: 8984)
    • XORed URL has been found (YARA)

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Antivirus name has been found in the command line (generic signature)

      • taskkill.exe (PID: 9916)
    • MEDUSA has been detected

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • MEDUSA note has been found

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Uses TASKKILL.EXE to kill antiviruses

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • RANSOMWARE has been detected

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
  • SUSPICIOUS

    • Uses TASKKILL.EXE to kill Browsers

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Uses TASKKILL.EXE to kill process

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Uses TASKKILL.EXE to kill Office Apps

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
    • Write to the desktop.ini file (may be used to cloak folders)

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
  • INFO

    • Checks supported languages

      • 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe (PID: 7388)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:01:28 21:45:46+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.27
CodeSize: 488960
InitializedDataSize: 192512
UninitializedDataSize: -
EntryPoint: 0x37bfa
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
758
Monitored processes
631
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #XOR-URL 0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe no specs conhost.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs sppextcomobj.exe no specs net1.exe no specs net.exe no specs slui.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs net.exe no specs conhost.exe no specs net1.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
632taskkill /F /IM steam.exe /TC:\Windows\SysWOW64\taskkill.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
728C:\WINDOWS\system32\net1 stop "POP3Svc" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
732C:\WINDOWS\system32\net1 stop "mozyprobackup" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
736taskkill /F /IM ocomm.exe /TC:\Windows\SysWOW64\taskkill.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
780C:\WINDOWS\system32\net1 stop "ReportServer$TPSAMA" /yC:\Windows\SysWOW64\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\sechost.dll
856taskkill /F /IM sqlagent.exe /TC:\Windows\SysWOW64\taskkill.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
864net stop "MSExchangeES" /yC:\Windows\SysWOW64\net.exe0065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\net.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
10 117
Read events
10 117
Write events
0
Delete events
0

Modification events

No data
Executable files
2
Suspicious files
931
Text files
271
Unknown types
0

Dropped files

PID
Process
Filename
Type
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Mozilla Firefox\omni.ja
MD5:
SHA256:
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\ServiceWatcherSchedule.xmlbinary
MD5:28C5DAB856C340E01723B5CF39BBA122
SHA256:2EF1A56589F19A690AFAD29D3A5F1E19B08C8BB4D79DD43C0FE675A5F837EBDD
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\i640.hashbinary
MD5:71AD63DF2699E3C5C7C06DA6D6F8D03B
SHA256:5A190EAAF4AB0D2DCDF0892D8456BEF571438F13E1BD14C94DAC4AAA178E0406
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\ProgramData\Adobe\ARM\Acrobat_23.001.20093\!!!READ_ME_MEDUSA!!!.txttext
MD5:675C75BFFA6C0565F604B581ACE8CB1C
SHA256:A84C394CB82BD65D85231CC1F74ADE4FD27CBBE3FB696396F17D41FFFF5E80FA
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.ini.MEDUSAbinary
MD5:B090EC86A19CB50E5D64FA5FB499BA2F
SHA256:689B9D63BB30614622212E1925755F7C0F2E075E6A2234A85FE28453C24654E3
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\!!!READ_ME_MEDUSA!!!.txttext
MD5:675C75BFFA6C0565F604B581ACE8CB1C
SHA256:A84C394CB82BD65D85231CC1F74ADE4FD27CBBE3FB696396F17D41FFFF5E80FA
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\C2RHeartbeatConfig.xmlbinary
MD5:502BFB546F844E4C9A019D356D2B979F
SHA256:A5D05F36C2BAA7E87C0AAA3F5FF85A7E3EC85E45F4B9AC13CC5B054E76A3FA0C
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\$Recycle.Bin\S-1-5-21-1693682860-607145093-2874071422-1001\desktop.inibinary
MD5:B090EC86A19CB50E5D64FA5FB499BA2F
SHA256:689B9D63BB30614622212E1925755F7C0F2E075E6A2234A85FE28453C24654E3
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\Program Files\Common Files\microsoft shared\ClickToRun\SubsystemController.manbinary
MD5:80921FA94B36BBC2A1114E8F962B292C
SHA256:DA119D727613ACA499F997C31032E7B06C5592EBD82A22BB0FB5BEA17E7306CD
73880065b818525d8a364f5d9e4b801e3408dad6576ce6d8ca5c01b19c3857a08d64.exeC:\ProgramData\Adobe\ARM\S\388\!!!READ_ME_MEDUSA!!!.txttext
MD5:675C75BFFA6C0565F604B581ACE8CB1C
SHA256:A84C394CB82BD65D85231CC1F74ADE4FD27CBBE3FB696396F17D41FFFF5E80FA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.42:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
10168
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
10168
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.42:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
20.190.159.75:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
10168
SIHClient.exe
4.175.87.197:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.110
whitelisted
crl.microsoft.com
  • 23.216.77.42
  • 23.216.77.36
  • 23.216.77.8
  • 23.216.77.35
  • 23.216.77.37
  • 23.216.77.41
  • 23.216.77.38
  • 23.216.77.31
  • 23.216.77.6
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 20.190.159.75
  • 40.126.31.1
  • 40.126.31.128
  • 20.190.159.73
  • 40.126.31.73
  • 20.190.159.2
  • 20.190.159.71
  • 20.190.159.131
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 52.165.164.15
whitelisted

Threats

No threats detected
No debug info