File name:

firefox.exe

Full analysis: https://app.any.run/tasks/60df06ec-6bf1-41f8-958e-4cd56d732ce6
Verdict: Malicious activity
Threats:

Ransomware is a type of malicious software that locks users out of their system or data using different methods to force them to pay a ransom. Most often, such programs encrypt files on an infected machine and demand a fee to be paid in exchange for the decryption key. Additionally, such programs can be used to steal sensitive information from the compromised computer and even conduct DDoS attacks against affected organizations to pressure them into paying.

Analysis date: June 23, 2024, 17:39:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
conti
ransomware
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

42E106FD843B0E3585057C30424F695A

SHA1:

7B7F0C029A3DCB34A7A448F05B43C5657DD0C471

SHA256:

1EF1FF8B1E81815D13BDD293554DDF8B3E57490DD3EF4ADD7C2837DDC67F9C24

SSDEEP:

1536:D1aX5GCxvwvzLwEnGq6QlEZ3RMVPWtExHWybC2+IVkIb6GGyL:D1abxvwvzLwE2kaMMtgX+AkIb6GGy

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • firefox.exe (PID: 3416)
    • Deletes shadow copies

      • cmd.exe (PID: 1680)
      • cmd.exe (PID: 3700)
    • Starts NET.EXE for service management

      • cmd.exe (PID: 4016)
      • cmd.exe (PID: 1180)
      • net.exe (PID: 4052)
      • net.exe (PID: 2316)
      • cmd.exe (PID: 3324)
      • net.exe (PID: 2588)
      • cmd.exe (PID: 4024)
      • net.exe (PID: 2328)
      • cmd.exe (PID: 3328)
      • cmd.exe (PID: 4040)
      • net.exe (PID: 2740)
      • net.exe (PID: 2764)
      • net.exe (PID: 3940)
      • cmd.exe (PID: 1756)
      • cmd.exe (PID: 1168)
      • net.exe (PID: 3820)
      • cmd.exe (PID: 900)
      • net.exe (PID: 3792)
      • net.exe (PID: 2916)
      • cmd.exe (PID: 1284)
      • net.exe (PID: 1820)
      • cmd.exe (PID: 1804)
      • cmd.exe (PID: 3816)
      • net.exe (PID: 1100)
      • cmd.exe (PID: 448)
      • net.exe (PID: 1384)
      • net.exe (PID: 2988)
      • cmd.exe (PID: 3620)
      • net.exe (PID: 2480)
      • net.exe (PID: 1944)
      • cmd.exe (PID: 3764)
      • cmd.exe (PID: 3100)
      • net.exe (PID: 3288)
      • cmd.exe (PID: 2200)
      • net.exe (PID: 3252)
      • cmd.exe (PID: 3428)
      • cmd.exe (PID: 3220)
      • net.exe (PID: 3172)
      • net.exe (PID: 3192)
      • cmd.exe (PID: 2396)
      • net.exe (PID: 328)
      • cmd.exe (PID: 2256)
      • net.exe (PID: 1080)
      • cmd.exe (PID: 2364)
      • cmd.exe (PID: 3560)
      • net.exe (PID: 3728)
      • cmd.exe (PID: 400)
      • net.exe (PID: 540)
      • cmd.exe (PID: 3496)
      • net.exe (PID: 2408)
      • net.exe (PID: 980)
      • net.exe (PID: 3692)
      • cmd.exe (PID: 2900)
      • net.exe (PID: 740)
      • cmd.exe (PID: 3360)
      • net.exe (PID: 3612)
      • cmd.exe (PID: 3676)
      • net.exe (PID: 3992)
      • cmd.exe (PID: 3716)
      • cmd.exe (PID: 3116)
      • cmd.exe (PID: 3132)
      • net.exe (PID: 3084)
      • cmd.exe (PID: 268)
      • net.exe (PID: 2496)
      • cmd.exe (PID: 764)
      • net.exe (PID: 2008)
      • net.exe (PID: 3512)
      • cmd.exe (PID: 1788)
      • cmd.exe (PID: 1608)
      • net.exe (PID: 2424)
      • cmd.exe (PID: 240)
      • net.exe (PID: 2832)
      • cmd.exe (PID: 3312)
      • net.exe (PID: 2620)
      • cmd.exe (PID: 4044)
      • net.exe (PID: 1648)
      • cmd.exe (PID: 4020)
      • cmd.exe (PID: 3924)
      • net.exe (PID: 1196)
      • cmd.exe (PID: 2068)
      • net.exe (PID: 3632)
      • net.exe (PID: 2860)
      • cmd.exe (PID: 2908)
      • net.exe (PID: 2532)
      • cmd.exe (PID: 2904)
      • cmd.exe (PID: 2884)
      • net.exe (PID: 3828)
      • net.exe (PID: 2828)
      • cmd.exe (PID: 2812)
      • cmd.exe (PID: 1228)
      • net.exe (PID: 2644)
      • net.exe (PID: 580)
      • cmd.exe (PID: 2400)
      • net.exe (PID: 2676)
      • cmd.exe (PID: 3812)
      • net.exe (PID: 2780)
      • net.exe (PID: 2872)
      • cmd.exe (PID: 2712)
      • cmd.exe (PID: 3452)
      • net.exe (PID: 3576)
      • net.exe (PID: 3004)
      • cmd.exe (PID: 3020)
      • cmd.exe (PID: 3656)
      • net.exe (PID: 2680)
      • cmd.exe (PID: 648)
      • net.exe (PID: 3400)
      • cmd.exe (PID: 2660)
      • net.exe (PID: 3280)
      • net.exe (PID: 2732)
      • cmd.exe (PID: 3216)
      • cmd.exe (PID: 2960)
      • net.exe (PID: 2940)
      • cmd.exe (PID: 3372)
      • cmd.exe (PID: 3488)
      • net.exe (PID: 3508)
      • cmd.exe (PID: 3176)
      • net.exe (PID: 2580)
      • net.exe (PID: 2416)
      • cmd.exe (PID: 3292)
      • net.exe (PID: 3984)
      • cmd.exe (PID: 3476)
      • net.exe (PID: 3856)
      • cmd.exe (PID: 3584)
      • net.exe (PID: 2492)
      • cmd.exe (PID: 2540)
      • cmd.exe (PID: 3580)
      • cmd.exe (PID: 2652)
      • net.exe (PID: 3112)
      • cmd.exe (PID: 3976)
      • net.exe (PID: 1616)
      • net.exe (PID: 4052)
      • cmd.exe (PID: 2536)
      • net.exe (PID: 1044)
      • net.exe (PID: 3884)
      • net.exe (PID: 2316)
      • cmd.exe (PID: 2320)
      • cmd.exe (PID: 568)
      • cmd.exe (PID: 2308)
      • cmd.exe (PID: 3608)
      • net.exe (PID: 2916)
      • cmd.exe (PID: 2856)
      • net.exe (PID: 1820)
      • cmd.exe (PID: 2284)
      • cmd.exe (PID: 3824)
      • net.exe (PID: 2720)
      • net.exe (PID: 2588)
      • net.exe (PID: 2764)
      • cmd.exe (PID: 2028)
      • cmd.exe (PID: 2312)
      • net.exe (PID: 3816)
      • net.exe (PID: 2328)
      • cmd.exe (PID: 1144)
      • net.exe (PID: 1876)
      • net.exe (PID: 1756)
      • cmd.exe (PID: 2164)
      • cmd.exe (PID: 2276)
      • net.exe (PID: 3784)
      • net.exe (PID: 1488)
      • cmd.exe (PID: 2444)
      • cmd.exe (PID: 2260)
      • net.exe (PID: 3764)
      • net.exe (PID: 1080)
      • cmd.exe (PID: 2792)
      • net.exe (PID: 3756)
      • net.exe (PID: 3560)
      • net.exe (PID: 3620)
      • cmd.exe (PID: 3564)
      • cmd.exe (PID: 2060)
      • cmd.exe (PID: 2468)
      • cmd.exe (PID: 3268)
      • net.exe (PID: 328)
      • cmd.exe (PID: 3736)
      • cmd.exe (PID: 3160)
      • net.exe (PID: 3652)
      • net.exe (PID: 2300)
      • net.exe (PID: 2348)
      • net.exe (PID: 3528)
      • cmd.exe (PID: 2440)
      • net.exe (PID: 980)
      • cmd.exe (PID: 2840)
      • cmd.exe (PID: 940)
      • net.exe (PID: 3696)
      • cmd.exe (PID: 3156)
      • net.exe (PID: 3852)
      • cmd.exe (PID: 3072)
      • net.exe (PID: 3432)
      • net.exe (PID: 3288)
      • cmd.exe (PID: 2248)
      • net.exe (PID: 680)
      • cmd.exe (PID: 3196)
      • net.exe (PID: 3324)
      • net.exe (PID: 656)
      • cmd.exe (PID: 1856)
      • net.exe (PID: 3512)
      • cmd.exe (PID: 3116)
      • net.exe (PID: 2556)
      • cmd.exe (PID: 3988)
      • cmd.exe (PID: 4068)
      • net.exe (PID: 3316)
      • cmd.exe (PID: 3648)
      • cmd.exe (PID: 4036)
      • net.exe (PID: 2620)
      • net.exe (PID: 3408)
      • cmd.exe (PID: 936)
      • net.exe (PID: 3068)
      • cmd.exe (PID: 2524)
      • net.exe (PID: 2012)
      • cmd.exe (PID: 1516)
      • cmd.exe (PID: 3832)
      • cmd.exe (PID: 2924)
      • net.exe (PID: 1196)
      • cmd.exe (PID: 3140)
      • cmd.exe (PID: 3940)
      • net.exe (PID: 3632)
      • net.exe (PID: 2860)
      • net.exe (PID: 2896)
      • cmd.exe (PID: 2856)
      • net.exe (PID: 3828)
      • net.exe (PID: 1000)
      • cmd.exe (PID: 2736)
      • cmd.exe (PID: 1468)
      • net.exe (PID: 580)
      • cmd.exe (PID: 3824)
      • cmd.exe (PID: 2308)
      • net.exe (PID: 1648)
      • net.exe (PID: 2644)
      • cmd.exe (PID: 3628)
      • cmd.exe (PID: 3720)
      • net.exe (PID: 3008)
      • net.exe (PID: 3644)
      • net.exe (PID: 828)
      • cmd.exe (PID: 3016)
      • cmd.exe (PID: 1912)
      • net.exe (PID: 3400)
      • net.exe (PID: 3568)
      • cmd.exe (PID: 3412)
      • cmd.exe (PID: 3520)
      • net.exe (PID: 3212)
      • net.exe (PID: 2936)
      • cmd.exe (PID: 3204)
      • net.exe (PID: 3100)
      • cmd.exe (PID: 2992)
      • net.exe (PID: 2256)
      • cmd.exe (PID: 3028)
      • net.exe (PID: 3724)
      • cmd.exe (PID: 540)
      • cmd.exe (PID: 740)
      • net.exe (PID: 2428)
      • net.exe (PID: 2416)
      • cmd.exe (PID: 2432)
      • net.exe (PID: 3856)
      • net.exe (PID: 2492)
      • cmd.exe (PID: 3692)
      • net.exe (PID: 3672)
      • cmd.exe (PID: 3072)
      • cmd.exe (PID: 1428)
      • cmd.exe (PID: 936)
      • net.exe (PID: 3112)
      • cmd.exe (PID: 3196)
      • net.exe (PID: 3496)
      • cmd.exe (PID: 3740)
      • cmd.exe (PID: 1828)
      • net.exe (PID: 2128)
      • net.exe (PID: 2316)
      • net.exe (PID: 2740)
      • net.exe (PID: 4008)
      • cmd.exe (PID: 4068)
      • cmd.exe (PID: 3404)
      • cmd.exe (PID: 4028)
      • net.exe (PID: 4044)
      • cmd.exe (PID: 2120)
      • cmd.exe (PID: 2164)
      • net.exe (PID: 2016)
      • cmd.exe (PID: 2544)
      • net.exe (PID: 3844)
      • net.exe (PID: 1616)
      • cmd.exe (PID: 764)
      • net.exe (PID: 1788)
      • net.exe (PID: 1216)
      • cmd.exe (PID: 3608)
      • net.exe (PID: 1820)
      • cmd.exe (PID: 1580)
      • net.exe (PID: 1488)
      • cmd.exe (PID: 2716)
      • cmd.exe (PID: 2312)
      • net.exe (PID: 2708)
      • cmd.exe (PID: 1468)
      • cmd.exe (PID: 1832)
      • net.exe (PID: 1876)
      • cmd.exe (PID: 2028)
      • net.exe (PID: 3784)
      • net.exe (PID: 832)
    • CONTI mutex has been found

      • firefox.exe (PID: 3416)
    • CONTI note has been found

      • firefox.exe (PID: 3416)
    • CONTI has been detected

      • firefox.exe (PID: 3416)
  • SUSPICIOUS

    • Starts CMD.EXE for commands execution

      • firefox.exe (PID: 3416)
    • Creates file in the systems drive root

      • firefox.exe (PID: 3416)
    • Uses pipe srvsvc via SMB (transferring data)

      • firefox.exe (PID: 3416)
  • INFO

    • Checks supported languages

      • firefox.exe (PID: 3416)
    • Reads the machine GUID from the registry

      • firefox.exe (PID: 3416)
    • Reads the computer name

      • firefox.exe (PID: 3416)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.dll | Win32 Dynamic Link Library (generic) (43.5)
.exe | Win32 Executable (generic) (29.8)
.exe | Generic Win/DOS Executable (13.2)
.exe | DOS Executable Generic (13.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:06:04 00:02:10+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.24
CodeSize: 94720
InitializedDataSize: 7680
UninitializedDataSize: -
EntryPoint: 0x5350
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
664
Monitored processes
467
Malicious processes
3
Suspicious processes
98

Behavior graph

Click at the process to see the details
start #CONTI firefox.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs vssadmin.exe no specs cmd.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs vssadmin.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net.exe no specs net1.exe no specs cmd.exe no specs net1.exe no specs net.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
240cmd.exe /c net stop MSExchangeIS /yC:\Windows\System32\cmd.exefirefox.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
240C:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2012 /yC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
268cmd.exe /c net stop mozyprobackup /yC:\Windows\System32\cmd.exefirefox.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
312cmd.exe /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unboundedC:\Windows\System32\cmd.exefirefox.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
328net stop BackupExecManagementService /yC:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
328C:\Windows\system32\net1 stop MSSQL$PRACTICEMGT /yC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
328net stop sacsvr /yC:\Windows\System32\net.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\net.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\netutils.dll
c:\windows\system32\browcli.dll
400cmd.exe /c net stop IISAdmin /yC:\Windows\System32\cmd.exefirefox.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
444C:\Windows\system32\net1 stop bedbg /yC:\Windows\System32\net1.exenet.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Net Command
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\net1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\dsrole.dll
c:\windows\system32\netutils.dll
448cmd.exe /c net stop BackupExecJobEngine /yC:\Windows\System32\cmd.exefirefox.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
2
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
13 377
Read events
13 377
Write events
0
Delete events
0

Modification events

No data
Executable files
4
Suspicious files
559
Text files
140
Unknown types
1

Dropped files

PID
Process
Filename
Type
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\CONTI_README.txttext
MD5:CA80A7C49A790A21D1F8265296C0472D
SHA256:D0CACEDFD5E3767948D50A743A4CB96615B688767C65A68CC2C852BB4FC1F1EA
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\Setup.xmlbinary
MD5:3B2B0456DC7A744C2C3FDC7A77A1397D
SHA256:3B643EF0F560D1E6343A7C965F25F102D64926A9E4004EF7C7C0D7239273B413
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-0410-0000-0000000FF1CE}-C\CONTI_README.txttext
MD5:CA80A7C49A790A21D1F8265296C0472D
SHA256:D0CACEDFD5E3767948D50A743A4CB96615B688767C65A68CC2C852BB4FC1F1EA
3416firefox.exeC:\MSOCache\All Users\CONTI_README.txttext
MD5:CA80A7C49A790A21D1F8265296C0472D
SHA256:D0CACEDFD5E3767948D50A743A4CB96615B688767C65A68CC2C852BB4FC1F1EA
3416firefox.exeC:\MSOCache\CONTI_README.txttext
MD5:CA80A7C49A790A21D1F8265296C0472D
SHA256:D0CACEDFD5E3767948D50A743A4CB96615B688767C65A68CC2C852BB4FC1F1EA
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\CONTI_README.txttext
MD5:CA80A7C49A790A21D1F8265296C0472D
SHA256:D0CACEDFD5E3767948D50A743A4CB96615B688767C65A68CC2C852BB4FC1F1EA
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\branding.xmlbinary
MD5:A33EB2400097A3AE3974C544CF635579
SHA256:E2B4AF3132FF45AD51E3CF9F05245F0710BF74551A7A9FED47067B9C7B1B3C87
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\AccessMUI.xml.CONTIbinary
MD5:2E335BE736D96DF2100FCC25BDF95454
SHA256:222E9A7AC84D58D5D7A3B8B3344D287DBA5DE360103C71D3F10E836230A01300
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-0407-0000-0000000FF1CE}-C\branding.xml.CONTIbinary
MD5:DFDD792A8995EDDD3254DC0B35DFDF1C
SHA256:2DE2C0BB0FB6A4AF02A03B63EF762A4FE0548E85A5A54E8A76AAD924955FD127
3416firefox.exeC:\MSOCache\All Users\{90140000-0015-040C-0000-0000000FF1CE}-C\AccessMUI.xmlbinary
MD5:2B0EA223C73CE26CB7060FD723CFEAE7
SHA256:075A6610F55E55AEFDD95C2AA089FBAE4E34AEC97D62B34ABF507F7F9A6ECDDE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
4
TCP/UDP connections
25
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
23.50.131.221:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
unknown
1372
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
unknown
1372
svchost.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
unknown
1060
svchost.exe
GET
304
23.50.131.213:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?a9f83325acc8ca75
unknown
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2564
svchost.exe
239.255.255.250:3702
whitelisted
1060
svchost.exe
224.0.0.252:5355
unknown
1372
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.2:445
whitelisted
192.168.100.54:49236
unknown
4
System
192.168.100.2:139
whitelisted
192.168.100.54:49243
unknown
192.168.100.54:49244
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
ctldl.windowsupdate.com
  • 23.50.131.221
  • 23.50.131.200
  • 23.50.131.213
  • 23.50.131.208
  • 23.50.131.205
  • 23.50.131.196
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted

Threats

No threats detected
No debug info