Analysis
-
max time kernel
152s -
max time network
161s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
04-02-2022 13:23
Static task
static1
Behavioral task
behavioral1
Sample
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe
Resource
win10v2004-en-20220113
General
-
Target
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe
-
Size
5.0MB
-
MD5
c182610dd437f90d0cc6cb0ac19cfdb7
-
SHA1
9729820748673938e057ce74d007b758f6f9b195
-
SHA256
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91
-
SHA512
618bb4559c36eec0b8e3552c16b94b0060d68186b9864ca6670d8a17225088a69a498a367a226f5944a3b7d79a61565cd7123e27001053000b6d42d86352051a
Malware Config
Extracted
C:\[HOW TO RECOVER FILES].TXT
prolock
chec1kyourf1les@protonmail.com
http://ug76vzhn2fujp6of2mjb6rjt4rploqe4q5gr2bkuaiwmzpf7nehzpsqd.onion
Signatures
-
ProLock Ransomware
Rebranded update of PwndLocker first seen in March 2020.
-
Drops desktop.ini file(s) 64 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exedescription ioc process File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\SAVEDG~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\ZKOSACOX\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\TEMPOR~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\STARTM~1\Programs\ADMINI~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\DEFAUL~1\STARTM~1\Programs\ACCESS~1\SYSTEM~1\Desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\Links\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\TEMPOR~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\Searches\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\TEMPOR~1\Content.IE5\AKOZAZUE\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Public\DOCUME~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Public\LIBRAR~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Public\RECORD~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\FAVORI~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Default\STARTM~1\Programs\ACCESS~1\SYSTEM~1\Desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\DBS3QI6C\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\AKOZAZUE\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\History\History.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\VL9MRVWS\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\MICROS~1\Hearts\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\H2R8HLJC\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\MICROS~1\FEEDSC~1\ZZZ3YRT4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\8927RJE4\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\MICROS~1\FEEDSC~1\E16QEJ8K\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\AppData\Local\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\AKOZAZUE\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\DOCUME~1\Admin\LOCALS~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\APPLIC~1\TEMPOR~1\Content.IE5\desktop.ini 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exepid process 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe -
Drops file in Program Files directory 64 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exedescription ioc process File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\com.jrockit.mc.alert_5.5.0.165303.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\VideoLAN\VLC\lua\http\css\mobile.css 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.jface.databinding.nl_zh_4.4.0.v20140623020002.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.p2.ui.sdk.scheduler.nl_ja_4.4.0.v20140623020002.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Asia\Hong_Kong 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\ms\LC_MES~1\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\WriteSend.mpeg 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Asia\Omsk 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\America\Swift_Current 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\ro\LC_MES~1\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\IDTEMP~1\ENU\AdobeID.pdf 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\VideoLAN\VLC\lua\http\css\UI-LIG~1\images\ui-bg_gloss-wave_35_f6a828_500x100.png 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Europe\Kaliningrad 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\UPDATE~1\org-netbeans-modules-masterfs-nio2.xml 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\visualvm\config\Modules\com-sun-tools-visualvm-host-views.xml 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Africa\Khartoum 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Asia\Irkutsk 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\AUSTRA~1\Eucla 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\ConvertToRemove.inf 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Etc\GMT-4 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.equinox.p2.director.app_1.0.300.v20140228-1829.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\config\Modules\org-netbeans-modules-options-keymap.xml 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\visualvm\UPDATE~1\com-sun-tools-visualvm-heapdump.xml 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\ANTARC~1\Mawson 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Tracker\warning.gif 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Lima 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Asia\Yerevan 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\features\OR2344~1.V20\META-INF\ECLIPSE_.SF 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\com.jrockit.mc.greychartplugin_5.5.0.165303.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\America\Curacao 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\ga\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\Kentucky\Louisville 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\profiler\config\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\visualvm\modules\locale\com-sun-tools-visualvm-core_ja.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\cs\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\features\ORF64A~1.V20\epl-v10.html 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\p2\ORGECL~1.COR\cache\binary\com.jrockit.mc.rcp.product_root_5.5.0.165303 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\modules\locale\org-netbeans-modules-autoupdate-cli_zh_CN.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\DenyUpdate.mp3 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Asia\Riyadh87 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\platform\modules\locale\org-netbeans-core-output2_zh_CN.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\bs\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\sk\LC_MES~1\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\America\ARGENT~1\Rio_Gallegos 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\SystemV\YST9YDT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\org.eclipse.e4.ui.workbench.swt.nl_zh_4.4.0.v20140623020002.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-host-remote.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\gl\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\PDFSigQFormalRep.pdf 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\DICTIO~1\en-US-9-0.bdic 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\features\OR7BC3~1.V20\epl-v10.html 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\MICROS~1\Mahjong\en-US\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~2\Adobe\READER~1.0\Reader\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~2\Adobe\READER~1.0\Resource\TYPESU~1\Unicode\ICU\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Google\Chrome\APPLIC~1\890438~1.114\EXTENS~1\external_extensions.json 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\MISSIO~1\plugins\com.jrockit.mc.rjmx.ui_5.5.0.165303.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Asia\Yekaterinburg 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File created C:\PROGRA~1\VideoLAN\VLC\locale\lg\LC_MES~1\[HOW TO RECOVER FILES].TXT 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Legal\ENU\license.html 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\jre\lib\zi\Atlantic\Azores 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\JDK17~1.0_8\lib\visualvm\visualvm\modules\com-sun-tools-visualvm-attach.jar 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Europe\Kaliningrad 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\Java\jre7\lib\zi\Africa\Cairo 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe File opened for modification C:\PROGRA~1\MICROS~1\MULTIP~1\Checkers\en-US\chkrzm.exe.mui 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exepid process 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exepid process 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exedescription pid process Token: SeSecurityPrivilege 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe Token: SeTakeOwnershipPrivilege 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe Token: SeBackupPrivilege 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe Token: SeRestorePrivilege 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe Token: SeManageVolumePrivilege 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe Token: SeDebugPrivilege 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exedescription pid process target process PID 2036 wrote to memory of 1356 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1356 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1356 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1356 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1676 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1676 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1676 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1676 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1092 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1092 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1092 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1092 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 952 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 952 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 952 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 952 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 436 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 436 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 436 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 436 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1040 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1040 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1040 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1040 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 456 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 456 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 456 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 456 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1412 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1412 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1412 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1412 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1072 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1072 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1072 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1072 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 756 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 756 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 756 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 756 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 960 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 960 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 960 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 960 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 792 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 792 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 792 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 792 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 336 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 336 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 336 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 336 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1484 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1484 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1484 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1484 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1976 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1976 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1976 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 1976 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 840 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 840 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 840 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe PID 2036 wrote to memory of 840 2036 9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe net.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe"C:\Users\Admin\AppData\Local\Temp\9c2bab6fc93db69b1b4771a0f599255728c8a1d0636a4c23f74190ef5f5def91.exe"1⤵
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "CSFalconService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "CSFalconService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "McAfeeFramework" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Alerter" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Alerter" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "AcronisAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Acronis VSS Provider" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecAgentAccelerator" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecDeviceMediaService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecJobEngine" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecManagementService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecRPCService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BackupExecVSSProvider" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "DFSR" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DFSR" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPIntegrationService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPIntegrationService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPProtectedService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPProtectedService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPSecurityService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EPUpdateService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MB3Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MB3Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MBAMService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MBEndpointAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeES" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMGMT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMTA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeSA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeSRS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeADTopology" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeADTopology" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeDelivery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeDelivery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeDiagnostics" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeDiagnostics" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeEdgeSync" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeEdgeSync" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeHM" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeHM" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeHMRecovery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeHMRecovery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeIS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeMailboxReplication" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMailboxReplication" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeRPC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeRPC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeRepl" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeRepl" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeServiceHost" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeServiceHost" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeTransport" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeTransport" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeUM" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeUM" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSExchangeUMCR" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeUMCR" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLSERVER" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MsDtsServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MySQL57" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "OSearch15" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OSearch15" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "OracleClientCache80" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "QuickBooksDB25" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "QuickBooksDB25" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPAdminV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPAdminV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPSearchHostController" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPSearchHostController" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPTraceV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPTraceV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPUserCodeV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPUserCodeV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SPWriterV4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SPWriterV4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBrowser" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLSafeOLRService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLsafe Backup Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLSERVERAGENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLTELEMETRY" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBackups" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBackups" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSMQ" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSMQ" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$*" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$*" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLWriter" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLBackupAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBackupAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Symantec System Recovery" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SyncoveryVSSService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SyncoveryVSSService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamBackupSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamCatalogSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamCloudSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamEndpointBackupSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEndpointBackupSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamEnterpriseManagerSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamMountSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamNFSSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamRESTSvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VeeamTransportSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "Veeam Backup Catalog Data Service" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "epag" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "epag" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "epredline" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "epredline" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "mozyprobackup" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "masvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "macmnsvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "mfemms" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "McAfeeDLPAgentService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeDLPAgentService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "psqlWGE" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "psqlWGE" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "swprv" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swprv" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "wsbexchange" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wsbexchange" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "WinVNC4" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WinVNC4" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "TMBMServer" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TMBMServer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "tmccsf" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmccsf" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "tmlisten" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "VSNAPVSS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VSNAPVSS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "stc_endpt_svc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "stc_endpt_svc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "wbengine" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "bbagent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bbagent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "NasPmService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NasPmService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BASupportExpressStandaloneService_N_Central" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BASupportExpressStandaloneService_N_Central" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "BASupportExpressSrvcUpdater_N_Central" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BASupportExpressSrvcUpdater_N_Central" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "hasplms" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "hasplms" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EqlVss" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EqlVss" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "EqlReqService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EqlReqService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "RapidRecoveryAgent" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RapidRecoveryAgent" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "YTBackup" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "YTBackup" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "vhdsvc" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "vhdsvc" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "TeamViewer" /y2⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TeamViewer" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSOLAP$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$BKUPEXEC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$ECWDB2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PRACTICEMGT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PRACTTICEBGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PROD" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SOPHOS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SQLEXPRESS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$VEEAMSQL2008R2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQL$VEEAMSQL2012" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLFDLauncher$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLSERVER" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerADHelper" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerADHelper100" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "MSSQLServerOLAPService" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$BKUPEXEC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$CITRIX_METAFRAME" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$CXDB" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$ECWDB2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PRACTTICEBGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PRACTTICEMGT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PROD" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$PROFXENGAGEMENT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SBSMONITORING" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SHAREPOINT" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SOPHOS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SQLEXPRESS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$VEEAMSQL2008R2" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "SQLAgent$VEEAMSQL2012" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$SQL_2008" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$SYSTEM_BGC" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$TPS" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop "ReportServer$TPSAMA" /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2036-56-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/2036-55-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/2036-57-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/2036-58-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/2036-59-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/2036-60-0x0000000000100000-0x0000000000101000-memory.dmpFilesize
4KB
-
memory/2036-61-0x0000000075021000-0x0000000075023000-memory.dmpFilesize
8KB