Analysis
-
max time kernel
198s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2023, 19:39
Static task
static1
Behavioral task
behavioral1
Sample
64new_cip6.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
64new_cip6.exe
Resource
win10v2004-20221111-en
General
-
Target
64new_cip6.exe
-
Size
309KB
-
MD5
4ee1b43ffdea06ff320b1dbfc7195087
-
SHA1
3efec2894e16fa21417808c99bedfa7ddbd5c881
-
SHA256
c1fbc69f6892aa18f81cfaf0fc889be96a9421324fbd87cde99cd06731d27615
-
SHA512
64c285f003d72c20a839b19584a1576fc8f4f11b3500c5969102781241760a1fdb5d341e4e3862227792752bf15a145ce99f94dde3ed8ad6147032f0b0ea04e8
-
SSDEEP
6144:vPLavV9JccWJzcwYuUxhCKrSjZ5pjedRYc4ihyYr+3l0W3WtCyaw7c:v+vV9CZMuUxhC6SjZfjeu++3Gaw7c
Malware Config
Extracted
\??\A:\!-Recovery_Instructions-!.html
<h2>[email protected]</h2>
https://tox.chat/download.html</p>
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
description pid Process procid_target PID 4224 created 3052 4224 64new_cip6.exe 49 -
Modifies extensions of user files 7 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\CompleteFind.png => C:\Users\Admin\Pictures\CompleteFind.png.cipher6 64new_cip6.exe File renamed C:\Users\Admin\Pictures\DenyImport.raw => C:\Users\Admin\Pictures\DenyImport.raw.cipher6 64new_cip6.exe File renamed C:\Users\Admin\Pictures\ExportInstall.raw => C:\Users\Admin\Pictures\ExportInstall.raw.cipher6 64new_cip6.exe File renamed C:\Users\Admin\Pictures\LimitRemove.png => C:\Users\Admin\Pictures\LimitRemove.png.cipher6 64new_cip6.exe File renamed C:\Users\Admin\Pictures\OptimizeDebug.raw => C:\Users\Admin\Pictures\OptimizeDebug.raw.cipher6 64new_cip6.exe File opened for modification C:\Users\Admin\Pictures\SwitchUpdate.tiff 64new_cip6.exe File renamed C:\Users\Admin\Pictures\SwitchUpdate.tiff => C:\Users\Admin\Pictures\SwitchUpdate.tiff.cipher6 64new_cip6.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 64new_cip6.exe File opened (read-only) \??\N: 64new_cip6.exe File opened (read-only) \??\Q: 64new_cip6.exe File opened (read-only) \??\W: 64new_cip6.exe File opened (read-only) \??\F: 64new_cip6.exe File opened (read-only) \??\I: 64new_cip6.exe File opened (read-only) \??\R: 64new_cip6.exe File opened (read-only) \??\U: 64new_cip6.exe File opened (read-only) \??\Y: 64new_cip6.exe File opened (read-only) \??\Z: 64new_cip6.exe File opened (read-only) \??\K: 64new_cip6.exe File opened (read-only) \??\O: 64new_cip6.exe File opened (read-only) \??\M: 64new_cip6.exe File opened (read-only) \??\S: 64new_cip6.exe File opened (read-only) \??\H: 64new_cip6.exe File opened (read-only) \??\L: 64new_cip6.exe File opened (read-only) \??\E: 64new_cip6.exe File opened (read-only) \??\G: 64new_cip6.exe File opened (read-only) \??\P: 64new_cip6.exe File opened (read-only) \??\T: 64new_cip6.exe File opened (read-only) \??\V: 64new_cip6.exe File opened (read-only) \??\X: 64new_cip6.exe File opened (read-only) \??\A: 64new_cip6.exe File opened (read-only) \??\B: 64new_cip6.exe -
Kills process with taskkill 16 IoCs
pid Process 4764 taskkill.exe 4680 taskkill.exe 1344 taskkill.exe 4144 taskkill.exe 5044 taskkill.exe 4440 taskkill.exe 564 taskkill.exe 4064 taskkill.exe 2008 taskkill.exe 3008 taskkill.exe 1536 taskkill.exe 1476 taskkill.exe 4052 taskkill.exe 1724 taskkill.exe 3028 taskkill.exe 3456 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe 4224 64new_cip6.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 4144 taskkill.exe Token: SeDebugPrivilege 4052 taskkill.exe Token: SeDebugPrivilege 4764 taskkill.exe Token: SeDebugPrivilege 1724 taskkill.exe Token: SeDebugPrivilege 564 taskkill.exe Token: SeDebugPrivilege 3028 taskkill.exe Token: SeDebugPrivilege 4064 taskkill.exe Token: SeDebugPrivilege 2008 taskkill.exe Token: SeDebugPrivilege 3008 taskkill.exe Token: SeDebugPrivilege 5044 taskkill.exe Token: SeDebugPrivilege 4680 taskkill.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 1476 taskkill.exe Token: SeDebugPrivilege 3456 taskkill.exe Token: SeDebugPrivilege 4440 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4224 wrote to memory of 696 4224 64new_cip6.exe 80 PID 4224 wrote to memory of 696 4224 64new_cip6.exe 80 PID 4224 wrote to memory of 696 4224 64new_cip6.exe 80 PID 696 wrote to memory of 4564 696 cmd.exe 82 PID 696 wrote to memory of 4564 696 cmd.exe 82 PID 4224 wrote to memory of 752 4224 64new_cip6.exe 83 PID 4224 wrote to memory of 752 4224 64new_cip6.exe 83 PID 4224 wrote to memory of 752 4224 64new_cip6.exe 83 PID 752 wrote to memory of 3968 752 cmd.exe 85 PID 752 wrote to memory of 3968 752 cmd.exe 85 PID 3968 wrote to memory of 4144 3968 cmd.exe 86 PID 3968 wrote to memory of 4144 3968 cmd.exe 86 PID 4224 wrote to memory of 4800 4224 64new_cip6.exe 87 PID 4224 wrote to memory of 4800 4224 64new_cip6.exe 87 PID 4224 wrote to memory of 4800 4224 64new_cip6.exe 87 PID 4800 wrote to memory of 1400 4800 cmd.exe 89 PID 4800 wrote to memory of 1400 4800 cmd.exe 89 PID 1400 wrote to memory of 4052 1400 cmd.exe 90 PID 1400 wrote to memory of 4052 1400 cmd.exe 90 PID 4224 wrote to memory of 3796 4224 64new_cip6.exe 91 PID 4224 wrote to memory of 3796 4224 64new_cip6.exe 91 PID 4224 wrote to memory of 3796 4224 64new_cip6.exe 91 PID 3796 wrote to memory of 1644 3796 cmd.exe 93 PID 3796 wrote to memory of 1644 3796 cmd.exe 93 PID 1644 wrote to memory of 4764 1644 cmd.exe 94 PID 1644 wrote to memory of 4764 1644 cmd.exe 94 PID 4224 wrote to memory of 1844 4224 64new_cip6.exe 95 PID 4224 wrote to memory of 1844 4224 64new_cip6.exe 95 PID 4224 wrote to memory of 1844 4224 64new_cip6.exe 95 PID 1844 wrote to memory of 3708 1844 cmd.exe 97 PID 1844 wrote to memory of 3708 1844 cmd.exe 97 PID 3708 wrote to memory of 1724 3708 cmd.exe 98 PID 3708 wrote to memory of 1724 3708 cmd.exe 98 PID 4224 wrote to memory of 4816 4224 64new_cip6.exe 99 PID 4224 wrote to memory of 4816 4224 64new_cip6.exe 99 PID 4224 wrote to memory of 4816 4224 64new_cip6.exe 99 PID 4816 wrote to memory of 2212 4816 cmd.exe 101 PID 4816 wrote to memory of 2212 4816 cmd.exe 101 PID 2212 wrote to memory of 564 2212 cmd.exe 102 PID 2212 wrote to memory of 564 2212 cmd.exe 102 PID 4224 wrote to memory of 1892 4224 64new_cip6.exe 103 PID 4224 wrote to memory of 1892 4224 64new_cip6.exe 103 PID 4224 wrote to memory of 1892 4224 64new_cip6.exe 103 PID 1892 wrote to memory of 3332 1892 cmd.exe 105 PID 1892 wrote to memory of 3332 1892 cmd.exe 105 PID 3332 wrote to memory of 3028 3332 cmd.exe 106 PID 3332 wrote to memory of 3028 3332 cmd.exe 106 PID 4224 wrote to memory of 408 4224 64new_cip6.exe 107 PID 4224 wrote to memory of 408 4224 64new_cip6.exe 107 PID 4224 wrote to memory of 408 4224 64new_cip6.exe 107 PID 408 wrote to memory of 4920 408 cmd.exe 109 PID 408 wrote to memory of 4920 408 cmd.exe 109 PID 4920 wrote to memory of 4064 4920 cmd.exe 110 PID 4920 wrote to memory of 4064 4920 cmd.exe 110 PID 4224 wrote to memory of 3084 4224 64new_cip6.exe 111 PID 4224 wrote to memory of 3084 4224 64new_cip6.exe 111 PID 4224 wrote to memory of 3084 4224 64new_cip6.exe 111 PID 3084 wrote to memory of 4860 3084 cmd.exe 113 PID 3084 wrote to memory of 4860 3084 cmd.exe 113 PID 4860 wrote to memory of 2008 4860 cmd.exe 114 PID 4860 wrote to memory of 2008 4860 cmd.exe 114 PID 4224 wrote to memory of 4952 4224 64new_cip6.exe 115 PID 4224 wrote to memory of 4952 4224 64new_cip6.exe 115 PID 4224 wrote to memory of 4952 4224 64new_cip6.exe 115 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 64new_cip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 64new_cip6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 64new_cip6.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 64new_cip6.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\64new_cip6.exe"C:\Users\Admin\AppData\Local\Temp\64new_cip6.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Modifies extensions of user files
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4224 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c rem Kill "SQL"3⤵
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c rem Kill "SQL"4⤵PID:4564
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe3⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlbrowser.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\system32\taskkill.exetaskkill -f -im sqlbrowser.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4144
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlwriter.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlwriter.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\system32\taskkill.exetaskkill -f -im sqlwriter.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4052
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe4⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\system32\taskkill.exetaskkill -f -im sqlservr.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4764
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im msmdsrv.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\system32\taskkill.exetaskkill -f -im msmdsrv.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1724
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe3⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im MsDtsSrvr.exe4⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\system32\taskkill.exetaskkill -f -im MsDtsSrvr.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:564
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlceip.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\system32\taskkill.exetaskkill -f -im sqlceip.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3028
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe3⤵
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\system32\taskkill.exetaskkill -f -im fdlauncher.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4064
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im Ssms.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im Ssms.exe4⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\system32\taskkill.exetaskkill -f -im Ssms.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE3⤵PID:4952
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im SQLAGENT.EXE4⤵PID:4596
-
C:\Windows\system32\taskkill.exetaskkill -f -im SQLAGENT.EXE5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3008
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdhost.exe3⤵PID:1472
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im fdhost.exe4⤵PID:4736
-
C:\Windows\system32\taskkill.exetaskkill -f -im fdhost.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:5044
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe3⤵PID:5040
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im fdlauncher.exe4⤵PID:2272
-
C:\Windows\system32\taskkill.exetaskkill -f -im fdlauncher.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4680
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe3⤵PID:388
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im sqlservr.exe4⤵PID:2892
-
C:\Windows\system32\taskkill.exetaskkill -f -im sqlservr.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1344
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe3⤵PID:3604
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im ReportingServicesService.exe4⤵PID:2808
-
C:\Windows\system32\taskkill.exetaskkill -f -im ReportingServicesService.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1536
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im msftesql.exe3⤵PID:1504
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im msftesql.exe4⤵PID:3316
-
C:\Windows\system32\taskkill.exetaskkill -f -im msftesql.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1476
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe3⤵PID:3468
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im pg_ctl.exe4⤵PID:4752
-
C:\Windows\system32\taskkill.exetaskkill -f -im pg_ctl.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3456
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c taskkill -f -im postgres.exe3⤵PID:636
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c taskkill -f -im postgres.exe4⤵PID:3900
-
C:\Windows\system32\taskkill.exetaskkill -f -im postgres.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4440
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQLServerADHelper1003⤵PID:1716
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop MSSQLServerADHelper1004⤵PID:4036
-
C:\Windows\system32\net.exenet stop MSSQLServerADHelper1005⤵PID:4524
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1006⤵PID:2392
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$ISARS3⤵PID:3964
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop MSSQL$ISARS4⤵PID:880
-
C:\Windows\system32\net.exenet stop MSSQL$ISARS5⤵PID:3448
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$ISARS6⤵PID:1400
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop MSSQL$MSFW3⤵PID:4052
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop MSSQL$MSFW4⤵PID:4688
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$ISARS3⤵PID:3796
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLAgent$ISARS4⤵PID:3812
-
C:\Windows\system32\net.exenet stop SQLAgent$ISARS5⤵PID:992
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$ISARS6⤵PID:3200
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLAgent$MSFW3⤵PID:1724
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLAgent$MSFW4⤵PID:1884
-
C:\Windows\system32\net.exenet stop SQLAgent$MSFW5⤵PID:4616
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLAgent$MSFW6⤵PID:3372
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLBrowser3⤵PID:564
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLBrowser4⤵PID:1984
-
C:\Windows\system32\net.exenet stop SQLBrowser5⤵PID:1788
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop ReportServer$ISARS3⤵PID:1304
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop ReportServer$ISARS4⤵PID:5112
-
C:\Windows\system32\net.exenet stop ReportServer$ISARS5⤵PID:5060
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop ReportServer$ISARS6⤵PID:2400
-
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe /c %windir%\sysnative\cmd.exe /c net stop SQLWriter3⤵PID:2704
-
C:\Windows\system32\cmd.exeC:\Windows\sysnative\cmd.exe /c net stop SQLWriter4⤵PID:2980
-
C:\Windows\system32\net.exenet stop SQLWriter5⤵PID:3820
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLWriter6⤵PID:1660
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\64new_cip6.exe\\?\C:\Users\Admin\AppData\Local\Temp\64new_cip6.exe -network2⤵
- System policy modification
PID:4544 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause3⤵PID:4772
-
-
-
C:\Windows\system32\net.exenet stop MSSQL$MSFW1⤵PID:3044
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop MSSQL$MSFW2⤵PID:4128
-
-
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop SQLBrowser1⤵PID:3332