Analysis
-
max time kernel
150s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
23-03-2021 18:12
Static task
static1
Behavioral task
behavioral1
Sample
936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe
Resource
win10v20201028
General
-
Target
936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe
-
Size
296KB
-
MD5
6b2c7d5298c7fb8f4c4c3531894a91c1
-
SHA1
d7333af03603b27566ac8ab63d6aa21575e1ebb4
-
SHA256
936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd
-
SHA512
2555a572e9088ce58dce5bcaf1c0fca76727b6a1e1315ec0dbfe588a796faf1d083cb6ff3a6362f7c8075a4f321228c6227db7a3207fa557fff68e9fd4a3e114
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Modifies Windows Firewall 1 TTPs
-
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows Defender\Features 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeCaption = "Внимание Внимание Внимание!!!" 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\LegalNoticeText = "У вас сложности с IT безопасностью?\r\n\r\nНаши специалисты Вам гарантировано помогут.\r\n\r\nДля этого напишите нам на почту - [email protected]" 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Kills process with taskkill 1 IoCs
pid Process 300 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1700 reg.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe Token: SeDebugPrivilege 708 powershell.exe Token: SeDebugPrivilege 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe Token: SeDebugPrivilege 300 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 292 wrote to memory of 708 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 30 PID 292 wrote to memory of 708 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 30 PID 292 wrote to memory of 708 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 30 PID 292 wrote to memory of 300 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 32 PID 292 wrote to memory of 300 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 32 PID 292 wrote to memory of 300 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 32 PID 292 wrote to memory of 432 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 35 PID 292 wrote to memory of 432 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 35 PID 292 wrote to memory of 432 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 35 PID 292 wrote to memory of 1700 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 33 PID 292 wrote to memory of 1700 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 33 PID 292 wrote to memory of 1700 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 33 PID 292 wrote to memory of 1652 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 36 PID 292 wrote to memory of 1652 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 36 PID 292 wrote to memory of 1652 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 36 PID 292 wrote to memory of 1596 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 40 PID 292 wrote to memory of 1596 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 40 PID 292 wrote to memory of 1596 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 40 PID 292 wrote to memory of 568 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 41 PID 292 wrote to memory of 568 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 41 PID 292 wrote to memory of 568 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 41 PID 292 wrote to memory of 1584 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 51 PID 292 wrote to memory of 1584 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 51 PID 292 wrote to memory of 1584 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 51 PID 292 wrote to memory of 1644 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 44 PID 292 wrote to memory of 1644 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 44 PID 292 wrote to memory of 1644 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 44 PID 292 wrote to memory of 536 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 49 PID 292 wrote to memory of 536 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 49 PID 292 wrote to memory of 536 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 49 PID 292 wrote to memory of 1548 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 47 PID 292 wrote to memory of 1548 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 47 PID 292 wrote to memory of 1548 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 47 PID 292 wrote to memory of 572 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 45 PID 292 wrote to memory of 572 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 45 PID 292 wrote to memory of 572 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 45 PID 292 wrote to memory of 644 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 52 PID 292 wrote to memory of 644 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 52 PID 292 wrote to memory of 644 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 52 PID 292 wrote to memory of 1560 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 56 PID 292 wrote to memory of 1560 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 56 PID 292 wrote to memory of 1560 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 56 PID 292 wrote to memory of 816 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 54 PID 292 wrote to memory of 816 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 54 PID 292 wrote to memory of 816 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 54 PID 292 wrote to memory of 1840 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 172 PID 292 wrote to memory of 1840 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 172 PID 292 wrote to memory of 1840 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 172 PID 292 wrote to memory of 1348 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 171 PID 292 wrote to memory of 1348 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 171 PID 292 wrote to memory of 1348 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 171 PID 292 wrote to memory of 1532 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 170 PID 292 wrote to memory of 1532 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 170 PID 292 wrote to memory of 1532 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 170 PID 292 wrote to memory of 1480 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 168 PID 292 wrote to memory of 1480 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 168 PID 292 wrote to memory of 1480 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 168 PID 292 wrote to memory of 1716 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 166 PID 292 wrote to memory of 1716 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 166 PID 292 wrote to memory of 1716 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 166 PID 292 wrote to memory of 1468 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 164 PID 292 wrote to memory of 1468 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 164 PID 292 wrote to memory of 1468 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 164 PID 292 wrote to memory of 588 292 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe 61 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticetext = "У вас сложности с IT безопасностью?\r\n\r\nНаши специалисты Вам гарантировано помогут.\r\n\r\nДля этого напишите нам на почту - [email protected]" 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\legalnoticecaption = "Внимание Внимание Внимание!!!" 936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe"C:\Users\Admin\AppData\Local\Temp\936a35ca214e9be1438c67a1153c854c28054994ce43f1eed39bb9dc52cb54dd.exe"1⤵
- Windows security modification
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:292 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose2⤵
- Suspicious use of AdjustPrivilegeToken
PID:708
-
-
C:\Windows\system32\taskkill.exe"taskkill" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:300
-
-
C:\Windows\system32\reg.exe"reg" delete HKCU\Software\Raccine /F2⤵
- Modifies registry key
PID:1700
-
-
C:\Windows\system32\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F2⤵PID:432
-
-
C:\Windows\system32\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:1652
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:1596
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c rd /s /q D:\\$Recycle.bin2⤵PID:568
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵PID:1644
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:572
-
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵PID:1548
-
-
C:\Windows\system32\sc.exe"sc.exe" config FDResPub start= auto2⤵PID:536
-
-
C:\Windows\system32\sc.exe"sc.exe" config Dnscache start= auto2⤵PID:1584
-
-
C:\Windows\system32\sc.exe"sc.exe" config SSDPSRV start= auto2⤵PID:644
-
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes2⤵PID:816
-
-
C:\Windows\system32\sc.exe"sc.exe" config upnphost start= auto2⤵PID:1560
-
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeDLPAgentService /y2⤵PID:588
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y3⤵PID:840
-
-
-
C:\Windows\system32\net.exe"net.exe" stop BMR Boot Service /y2⤵PID:2068
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y3⤵PID:2208
-
-
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SQL_2008 /y2⤵PID:2180
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SQL_2008 /y3⤵PID:1344
-
-
-
C:\Windows\system32\net.exe"net.exe" stop zhudongfangyu /y2⤵PID:2508
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y3⤵PID:3032
-
-
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$TPSAMA /y2⤵PID:2640
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$TPSAMA /y3⤵PID:2972
-
-
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecAgentAccelerator /y2⤵PID:2876
-
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecVSSProvider /y2⤵PID:2856
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y3⤵PID:2148
-
-
-
C:\Windows\system32\net.exe"net.exe" stop PDVFSService /y2⤵PID:2836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop PDVFSService /y3⤵PID:2248
-
-
-
C:\Windows\system32\net.exe"net.exe" stop veeam /y2⤵PID:2816
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y3⤵PID:2956
-
-
-
C:\Windows\system32\net.exe"net.exe" stop VeeamNFSSvc /y2⤵PID:2796
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y3⤵PID:2288
-
-
-
C:\Windows\system32\net.exe"net.exe" stop VeeamDeploymentService /y2⤵PID:2776
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y3⤵PID:2280
-
-
-
C:\Windows\system32\net.exe"net.exe" stop VeeamTransportSvc /y2⤵PID:2756
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y3⤵PID:2944
-
-
-
C:\Windows\system32\net.exe"net.exe" stop VSNAPVSS /y2⤵PID:2736
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y3⤵PID:2136
-
-
-
C:\Windows\system32\net.exe"net.exe" stop stc_raw_agent /y2⤵PID:2712
-
-
C:\Windows\system32\net.exe"net.exe" stop ntrtscan /y2⤵PID:2620
-
-
C:\Windows\system32\net.exe"net.exe" stop EPUpdateService /y2⤵PID:2600
-
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$TPS /y2⤵PID:2580
-
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y2⤵PID:2560
-
-
C:\Windows\system32\net.exe"net.exe" stop YooIT /y2⤵PID:2488
-
-
C:\Windows\system32\net.exe"net.exe" stop YooBackup /y2⤵PID:2468
-
-
C:\Windows\system32\net.exe"net.exe" stop QBCFMonitorService /y2⤵PID:2448
-
-
C:\Windows\system32\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y2⤵PID:2428
-
-
C:\Windows\system32\net.exe"net.exe" start FDResPub /y2⤵PID:2408
-
-
C:\Windows\system32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y2⤵PID:2388
-
-
C:\Windows\system32\net.exe"net.exe" stop EPSecurityService /y2⤵PID:2356
-
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SYSTEM_BGC /y2⤵PID:2336
-
-
C:\Windows\system32\net.exe"net.exe" stop mozyprobackup /y2⤵PID:2292
-
-
C:\Windows\system32\net.exe"net.exe" stop ekrn /y2⤵PID:2272
-
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SQLEXPRESS /y2⤵PID:2252
-
-
C:\Windows\system32\net.exe"net.exe" stop MMS /y2⤵PID:2232
-
-
C:\Windows\system32\net.exe"net.exe" stop EhttpSrv /y2⤵PID:2212
-
-
C:\Windows\system32\net.exe"net.exe" stop bedbg /y2⤵PID:2128
-
-
C:\Windows\system32\net.exe"net.exe" stop mfewc /y2⤵PID:1028
-
-
C:\Windows\system32\net.exe"net.exe" stop avpsus /y2⤵PID:1468
-
-
C:\Windows\system32\net.exe"net.exe" start upnphost /y2⤵PID:1716
-
-
C:\Windows\system32\net.exe"net.exe" start SSDPSRV /y2⤵PID:1480
-
-
C:\Windows\system32\net.exe"net.exe" start Dnscache /y2⤵PID:1532
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵PID:1348
-
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:1840
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start SSDPSRV /y1⤵PID:2152
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ntrtscan /y1⤵PID:2984
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y1⤵PID:2996
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y1⤵PID:3020
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfewc /y1⤵PID:2220
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start upnphost /y1⤵PID:2164
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ekrn /y1⤵PID:2084
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop bedbg /y1⤵PID:744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop avpsus /y1⤵PID:2104
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y1⤵PID:1956
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MMS /y1⤵PID:1332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y1⤵PID:2088
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /y1⤵PID:2064
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y1⤵PID:1148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SYSTEM_BGC /y1⤵PID:2044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y1⤵PID:2056
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start FDResPub /y1⤵PID:1120
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooBackup /y1⤵PID:1116
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y1⤵PID:3068
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y1⤵PID:3060
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooIT /y1⤵PID:3052
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$TPS /y1⤵PID:3044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y1⤵PID:3008
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start Dnscache /y1⤵PID:2140
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1196932482-1743097297-13950492591024355309121304237114933859451739492094-740195237"1⤵PID:840