Analysis
-
max time kernel
385s -
max time network
278s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
20-06-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
PhantomSolutions.exe
Resource
win7-20240419-en
General
-
Target
PhantomSolutions.exe
-
Size
4.2MB
-
MD5
09ba36b3539981f4f69de454cb97c0df
-
SHA1
53ec52c277921e020770e54450988df8189378de
-
SHA256
f976368908d75ad474cb16762742852803ae91d1727197a80e9c55ec9e910b89
-
SHA512
8f6a533a930e7b7285afc0ce87b57f147db6a73322263fd762b097f73a6d232237d907b8b0e3ebd57da568a618267d6f2d9cf33d00d1b729d86f20bba8be32e6
-
SSDEEP
98304:7d7m+ij9HD0+jCihNRkl/W6aG/wcKnfu8NUT6K:o+y4ihkl/Wo/afHP
Malware Config
Signatures
-
Cerber 64 IoCs
Cerber is a widely used ransomware-as-a-service (RaaS), first seen in 2017.
description ioc pid Process 4516 Process not Found 4924 taskkill.exe 2284 Process not Found 2144 taskkill.exe 2340 Process not Found 2052 taskkill.exe 1432 Process not Found Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} Process not Found 4736 taskkill.exe 4328 Process not Found 5096 Process not Found 1048 Process not Found 3956 Process not Found 3552 taskkill.exe 3096 Process not Found 436 taskkill.exe 2268 Process not Found 4540 taskkill.exe 2284 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} Process not Found 3208 taskkill.exe 5048 taskkill.exe 4712 taskkill.exe 3688 Process not Found 4580 Process not Found 3248 taskkill.exe 4080 Process not Found 4388 taskkill.exe 4184 Process not Found 1944 taskkill.exe 2464 Process not Found 3076 Process not Found 4860 Process not Found 2472 Process not Found 396 taskkill.exe 4636 taskkill.exe 1476 Process not Found 1244 Process not Found 3396 Process not Found 4092 taskkill.exe 2592 Process not Found 3568 Process not Found Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} Process not Found 2724 Process not Found 900 taskkill.exe 1480 Process not Found 4080 Process not Found 1008 Process not Found 2636 taskkill.exe 4900 Process not Found 3596 Process not Found 4628 Process not Found 4316 taskkill.exe 3980 taskkill.exe 1484 Process not Found 4536 Process not Found 4676 taskkill.exe Mutant created AFUWIN.{5b5b8120-cd0e-11d9-b61b-0001294c3bd8} Process not Found 1480 taskkill.exe 2724 Process not Found 1744 Process not Found 3192 Process not Found 3260 taskkill.exe 1788 taskkill.exe -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ Process not Found -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion Process not Found -
Executes dropped EXE 28 IoCs
pid Process 2476 Process not Found 1084 Process not Found 3956 Process not Found 1220 Process not Found 1060 Process not Found 4572 Process not Found 2304 Process not Found 3536 Process not Found 1436 Process not Found 4796 Process not Found 3096 Process not Found 916 Process not Found 1988 Process not Found 4492 Process not Found 4092 Process not Found 2372 Process not Found 4900 Process not Found 396 Process not Found 4204 Process not Found 4972 Process not Found 4736 Process not Found 1652 Process not Found 4416 Process not Found 1984 Process not Found 4412 Process not Found 936 Process not Found 3956 Process not Found 1060 Process not Found -
resource yara_rule behavioral2/files/0x000800000002357b-10.dat themida behavioral2/memory/2476-11-0x00007FF70E230000-0x00007FF70EBD2000-memory.dmp themida behavioral2/memory/2476-13-0x00007FF70E230000-0x00007FF70EBD2000-memory.dmp themida behavioral2/memory/2476-14-0x00007FF70E230000-0x00007FF70EBD2000-memory.dmp themida behavioral2/memory/2476-15-0x00007FF70E230000-0x00007FF70EBD2000-memory.dmp themida behavioral2/memory/2476-16-0x00007FF70E230000-0x00007FF70EBD2000-memory.dmp themida behavioral2/memory/2476-18-0x00007FF70E230000-0x00007FF70EBD2000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Process not Found -
Drops file in System32 directory 7 IoCs
description ioc Process File opened for modification C:\Windows\system32\wbem\repository\MAPPING1.MAP Process not Found File opened for modification C:\Windows\system32\wbem\repository\MAPPING2.MAP Process not Found File opened for modification C:\Windows\system32\wbem\repository\MAPPING3.MAP Process not Found File opened for modification C:\Windows\system32\wbem\repository\OBJECTS.DATA Process not Found File opened for modification C:\Windows\system32\wbem\repository\INDEX.BTR Process not Found File opened for modification C:\Windows\system32\wbem\repository Process not Found File opened for modification C:\Windows\system32\wbem\repository\WRITABLE.TST Process not Found -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 2476 Process not Found -
Launches sc.exe 64 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2724 sc.exe 3876 Process not Found 1420 Process not Found 1712 Process not Found 1768 sc.exe 2984 sc.exe 4888 Process not Found 4208 Process not Found 2548 Process not Found 2268 Process not Found 1640 Process not Found 5072 sc.exe 3220 Process not Found 836 Process not Found 4812 Process not Found 2160 sc.exe 2480 Process not Found 1184 Process not Found 5076 Process not Found 4864 sc.exe 3244 sc.exe 5072 Process not Found 4108 Process not Found 2052 Process not Found 4964 sc.exe 3556 sc.exe 3712 Process not Found 2308 sc.exe 3612 Process not Found 3860 Process not Found 4592 Process not Found 400 Process not Found 4088 Process not Found 3600 Process not Found 4208 Process not Found 5100 Process not Found 4480 sc.exe 4184 sc.exe 4472 sc.exe 2704 sc.exe 1844 Process not Found 1948 Process not Found 3964 Process not Found 4304 sc.exe 464 Process not Found 4428 Process not Found 2348 Process not Found 4884 Process not Found 1484 Process not Found 1788 Process not Found 3404 sc.exe 2476 Process not Found 3556 Process not Found 1468 Process not Found 3076 Process not Found 4028 Process not Found 3964 sc.exe 4888 sc.exe 4272 Process not Found 1640 Process not Found 836 Process not Found 3244 Process not Found 1860 sc.exe 3052 Process not Found -
Kills process with taskkill 64 IoCs
pid Process 2724 Process not Found 4396 Process not Found 2472 taskkill.exe 3260 taskkill.exe 2836 taskkill.exe 968 Process not Found 5000 Process not Found 1312 taskkill.exe 4312 taskkill.exe 4464 taskkill.exe 4264 Process not Found 4492 Process not Found 4548 taskkill.exe 4632 Process not Found 1512 Process not Found 952 taskkill.exe 1860 Process not Found 2092 Process not Found 1768 taskkill.exe 2560 Process not Found 1772 Process not Found 3432 Process not Found 1680 Process not Found 3252 Process not Found 4216 Process not Found 4184 Process not Found 2216 taskkill.exe 4340 Process not Found 1056 Process not Found 3872 taskkill.exe 1932 Process not Found 3688 Process not Found 3180 Process not Found 920 Process not Found 396 taskkill.exe 4536 taskkill.exe 3236 Process not Found 3128 taskkill.exe 1836 taskkill.exe 2636 taskkill.exe 4092 taskkill.exe 3612 Process not Found 3376 Process not Found 4928 Process not Found 4656 Process not Found 2104 Process not Found 2036 taskkill.exe 3556 Process not Found 816 Process not Found 4116 Process not Found 1080 Process not Found 4884 Process not Found 1060 Process not Found 1852 Process not Found 4860 Process not Found 4088 taskkill.exe 4328 taskkill.exe 1572 Process not Found 3780 taskkill.exe 4912 Process not Found 4900 taskkill.exe 2288 Process not Found 1264 Process not Found 1788 Process not Found -
Runs net.exe
-
Suspicious behavior: LoadsDriver 27 IoCs
pid Process 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found 660 Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: SeDebugPrivilege 3776 taskkill.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe Token: 33 2588 PhantomSolutions.exe Token: SeIncBasePriorityPrivilege 2588 PhantomSolutions.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2588 wrote to memory of 60 2588 PhantomSolutions.exe 87 PID 2588 wrote to memory of 60 2588 PhantomSolutions.exe 87 PID 2588 wrote to memory of 60 2588 PhantomSolutions.exe 87 PID 60 wrote to memory of 3776 60 cmd.exe 89 PID 60 wrote to memory of 3776 60 cmd.exe 89 PID 60 wrote to memory of 3776 60 cmd.exe 89 PID 2588 wrote to memory of 4908 2588 PhantomSolutions.exe 91 PID 2588 wrote to memory of 4908 2588 PhantomSolutions.exe 91 PID 2588 wrote to memory of 4908 2588 PhantomSolutions.exe 91 PID 4908 wrote to memory of 3656 4908 cmd.exe 93 PID 4908 wrote to memory of 3656 4908 cmd.exe 93 PID 4908 wrote to memory of 3656 4908 cmd.exe 93 PID 2588 wrote to memory of 3128 2588 PhantomSolutions.exe 94 PID 2588 wrote to memory of 3128 2588 PhantomSolutions.exe 94 PID 2588 wrote to memory of 3128 2588 PhantomSolutions.exe 94 PID 3128 wrote to memory of 3296 3128 cmd.exe 96 PID 3128 wrote to memory of 3296 3128 cmd.exe 96 PID 3128 wrote to memory of 3296 3128 cmd.exe 96 PID 2588 wrote to memory of 5044 2588 PhantomSolutions.exe 97 PID 2588 wrote to memory of 5044 2588 PhantomSolutions.exe 97 PID 2588 wrote to memory of 5044 2588 PhantomSolutions.exe 97 PID 5044 wrote to memory of 1768 5044 cmd.exe 99 PID 5044 wrote to memory of 1768 5044 cmd.exe 99 PID 5044 wrote to memory of 1768 5044 cmd.exe 99 PID 2588 wrote to memory of 3492 2588 PhantomSolutions.exe 100 PID 2588 wrote to memory of 3492 2588 PhantomSolutions.exe 100 PID 2588 wrote to memory of 3492 2588 PhantomSolutions.exe 100 PID 3492 wrote to memory of 2340 3492 cmd.exe 102 PID 3492 wrote to memory of 2340 3492 cmd.exe 102 PID 3492 wrote to memory of 2340 3492 cmd.exe 102 PID 2588 wrote to memory of 1064 2588 PhantomSolutions.exe 103 PID 2588 wrote to memory of 1064 2588 PhantomSolutions.exe 103 PID 2588 wrote to memory of 1064 2588 PhantomSolutions.exe 103 PID 1064 wrote to memory of 4924 1064 cmd.exe 105 PID 1064 wrote to memory of 4924 1064 cmd.exe 105 PID 1064 wrote to memory of 4924 1064 cmd.exe 105 PID 2588 wrote to memory of 1480 2588 PhantomSolutions.exe 106 PID 2588 wrote to memory of 1480 2588 PhantomSolutions.exe 106 PID 2588 wrote to memory of 1480 2588 PhantomSolutions.exe 106 PID 1480 wrote to memory of 4336 1480 cmd.exe 108 PID 1480 wrote to memory of 4336 1480 cmd.exe 108 PID 1480 wrote to memory of 4336 1480 cmd.exe 108 PID 2588 wrote to memory of 4916 2588 PhantomSolutions.exe 109 PID 2588 wrote to memory of 4916 2588 PhantomSolutions.exe 109 PID 2588 wrote to memory of 4916 2588 PhantomSolutions.exe 109 PID 4916 wrote to memory of 2868 4916 cmd.exe 111 PID 4916 wrote to memory of 2868 4916 cmd.exe 111 PID 4916 wrote to memory of 2868 4916 cmd.exe 111 PID 2588 wrote to memory of 3712 2588 PhantomSolutions.exe 112 PID 2588 wrote to memory of 3712 2588 PhantomSolutions.exe 112 PID 2588 wrote to memory of 3712 2588 PhantomSolutions.exe 112 PID 3712 wrote to memory of 3552 3712 cmd.exe 114 PID 3712 wrote to memory of 3552 3712 cmd.exe 114 PID 3712 wrote to memory of 3552 3712 cmd.exe 114 PID 2588 wrote to memory of 3732 2588 PhantomSolutions.exe 115 PID 2588 wrote to memory of 3732 2588 PhantomSolutions.exe 115 PID 2588 wrote to memory of 3732 2588 PhantomSolutions.exe 115 PID 3732 wrote to memory of 3140 3732 cmd.exe 117 PID 3732 wrote to memory of 3140 3732 cmd.exe 117 PID 3732 wrote to memory of 3140 3732 cmd.exe 117 PID 2588 wrote to memory of 2432 2588 PhantomSolutions.exe 118 PID 2588 wrote to memory of 2432 2588 PhantomSolutions.exe 118 PID 2588 wrote to memory of 2432 2588 PhantomSolutions.exe 118 PID 2432 wrote to memory of 2552 2432 cmd.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\PhantomSolutions.exe"C:\Users\Admin\AppData\Local\Temp\PhantomSolutions.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Suspicious use of AdjustPrivilegeToken
PID:3776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- Kills process with taskkill
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵
- Cerber
PID:4924
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4336
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:3140
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3016
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4568
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2136
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4416
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2880
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:3980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:4948
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:4384
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:1220
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:952
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:5100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:4960
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:1432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4740
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4908
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:3100
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3128
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:1596
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1236
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:4336
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:4380
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:4512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:3152
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:4964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:1040
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:3732
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:4936
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:3388
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4448
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2276
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:3912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2676
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4088
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3980
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1720
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:1852
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:220
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4796
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4320
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4656
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:1844
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:3776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:3656
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:1900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:3128
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵
- Cerber
PID:5048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:1912
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵
- Launches sc.exe
PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:2416
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:3492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1592
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:1204
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:4300
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵
- Cerber
PID:4676
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:1824
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:2552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:1404
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:5020
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4052
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2884
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4832
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4812
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:5108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2572
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:1508
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4024
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1852
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:8
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1712
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:5024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:3432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:5092
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:2204
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4204
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:4112
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:4736
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:4380
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1480
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:5012
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2708
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1040
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4560
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:388
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3964
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:2944
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵
- Launches sc.exe
PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:2464
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2544
-
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:4864
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:464
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:2676
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:4068
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4880
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2472
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:4712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4596
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4532
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:2144
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:3196
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:2960
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3492
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:4424
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:4480
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵
- Kills process with taskkill
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2576
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:4540
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:2868
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵
- Cerber
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:2428
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:2104
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵
- Launches sc.exe
PID:4304
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:5056
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:3460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:4400
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1772
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:3248
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:2984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:2572
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:4728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:1440
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1312
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1992
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4668
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:540
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2960
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:5044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2204
-
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3140
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:968
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:2552
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:5056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2416
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:2464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:4812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4744
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:2436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵
- Kills process with taskkill
PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2028
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3956
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:4908
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:4960
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:4004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:1596
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:1912
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:4424
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:2420
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:1436
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:4184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4480
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4216
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3212
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2428
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5012
-
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3388
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4568
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4400
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1860
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:2160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3096
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1508
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:1744
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵
- Kills process with taskkill
PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4320
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:3728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:1048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:5048
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4004
-
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1912
-
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:540
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4512
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4184
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:4592
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:864
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:4816
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:2428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:1956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2216
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2884
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:528
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3260
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4240
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:3096
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:1220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4712
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2916
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:1060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3428
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:4420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:3892
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4424
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3024
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4352
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:4164
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3244
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2868
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:1184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3092
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4416
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:464
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:4744
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:1264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:2812
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:2688
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:4276
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:352
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:4532
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:5024
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2916
-
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:1432
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2720
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2280
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:3872
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4016
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3296
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:1048
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:5060
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:2952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:2960
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:4464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:2432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:2100
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:2636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:3464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1232
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:4728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:2644
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:4812
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:2336
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4880
-
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:1440
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4492
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:4044
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:3128
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:4016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:412
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:4420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1988
-
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:5044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2396
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:628
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2276
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4272
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:5072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3600
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Kills process with taskkill
PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2884
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3208
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4596
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4872
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:4644
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:2916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:1440
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:3836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:1604
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4388
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1060
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3948
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:2900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:548
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:4548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3024
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4820
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2592
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:528
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:3084
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:4088
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵
- Launches sc.exe
PID:1860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:2548
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵
- Launches sc.exe
PID:2984
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:3876
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:4436
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:116
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4644
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4900
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4460
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2280
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:2092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4960
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:412
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4736
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4172
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:1592
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:1124
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3732
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2428
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4272
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:2432
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:4992
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵
- Cerber
PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:3568
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3092
-
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵PID:3240
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:2416
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:3224
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:212
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1696
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2676
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:1220
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:516
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:4052
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4532
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:2680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:4536
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4460
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2284
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:396
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2836
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2952
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:1884
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3024
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4612
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:752
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3388
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:900
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:4992
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4068
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3568
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:3224
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4636
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3096
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:352
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4712
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:4264
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:3956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:4320
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4044
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4312
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2368
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4492
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4620
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:4108
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵
- Launches sc.exe
PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:3608
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:2156
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:5044
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:4920
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:4172
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:4184
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5088
-
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4164
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2348
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2592
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2844
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4400
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3216
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4068
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:2548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:5100
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:2448
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4828
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:1604
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3948
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4628
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:4016
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵
- Cerber
PID:2144
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:716
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:744
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:3296
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:4592
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵
- Launches sc.exe
PID:4472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2836
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2576
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4548
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:2100
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:3944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:3324
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:3940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- Cerber
PID:900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:3500
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4732
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:5108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4068
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:224
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3700
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:1476
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
PID:3980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:1512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3872
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:3728
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1604
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2368
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4492
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4016
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4888
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:716
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:2168
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:3296
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4084
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵
- Kills process with taskkill
PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1124
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4360
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:5056
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2344
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:4416
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:4632
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4732
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4332
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4584
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1640
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1696
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:3836
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:1084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:2436
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:3604
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:1476
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:884
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:3956
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:1440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:8
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
PID:2284
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2876
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:4388
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2992
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:3656
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1652
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:5044
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3296
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2576
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:3024
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:2544
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3388
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:2024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:2944
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4440
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:1956
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:1680
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:2548
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:1664
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:220
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:4744
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:3108
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2680
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:884
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:3872
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:2280
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:2140
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵
- Cerber
PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:2144
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- Cerber
PID:3552
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:716
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:2480
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4216
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3412
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4164
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3688
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2908
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4860
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3940
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4000
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3500
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:920
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2160
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4340
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1640
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4328
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:1512
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:4948
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:1476
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4536
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:2504
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4492
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:3860
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:4944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:4420
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3552
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2472
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:4472
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:2976
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4592
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3732
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:752
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:3404
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4432
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:5012
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:3828
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:3324
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:2464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:2288
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:4024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:4412
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:2740
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4088
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:3780
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:3260
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:5000
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1712
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2720
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4596
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:1616
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:8
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:4536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:3052
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵
- Kills process with taskkill
PID:3872
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:3892
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3860
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4920
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:1436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4676
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4196
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:3024
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:4820
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:4200
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:1860
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5012
-
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵
- Launches sc.exe
PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:4400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3828
-
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:1544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:2348
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2216
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:1956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:3500
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:1244
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:1864
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:1312
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:4068
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵
- Kills process with taskkill
PID:952
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:4264
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵
- Cerber
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1744
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2448
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:1192
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:1760
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:3016
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:5076
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:1688
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4020
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:2156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4736
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1592
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4612
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2836
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4992
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:1188
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4360
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:4820
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:4448
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:2464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4440
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:1668
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3324
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3080
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:2216
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1624
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3500
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:2812
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:1836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3980
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:3208
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:1692
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4744
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:1192
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:3016
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:2704
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:2092
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:396
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:4060
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:4020
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:1768
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:3128
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:1652
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵PID:4480
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:968
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:5044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Cerber
PID:1788
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:1480
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:448
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1772
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:528
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3940
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4416
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:1184
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:3080
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:4436
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:1624
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:456
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:2812
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:3108
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3980
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:3728
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3604
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:1692
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4532
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4744
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:3432
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵PID:2476
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:2876
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im FolderChangesView.exe3⤵PID:1760
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HttpDebuggerSdk >nul 2>&12⤵PID:4108
-
C:\Windows\SysWOW64\sc.exesc stop HttpDebuggerSdk3⤵PID:2900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop npf >nul 2>&12⤵PID:4620
-
C:\Windows\SysWOW64\sc.exesc stop npf3⤵PID:5004
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:3452
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵
- Cerber
PID:4736
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Ida64.exe >nul 2>&12⤵PID:3464
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ida64.exe3⤵PID:1592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im OllyDbg.exe >nul 2>&12⤵PID:4824
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OllyDbg.exe3⤵PID:2836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg64.exe >nul 2>&12⤵PID:4352
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg64.exe3⤵PID:2908
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im Dbg32.exe >nul 2>&12⤵PID:5072
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Dbg32.exe3⤵PID:3944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1544
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:1068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:440
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:1944
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3600
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:4804
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:2984
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:2416
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:1932
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵PID:2372
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:456
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4596
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:220
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:3728
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:4532
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4320
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:836
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3432
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:5076
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:2876
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:5088
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:2092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:4204
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:2420
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:3452
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4612
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:4420
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:4992
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:3464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq charles*" /IM * /F /T >nul 2>&12⤵PID:1988
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq charles*" /IM * /F /T3⤵PID:4824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:2276
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4352
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ida*" /IM * /F /T >nul 2>&12⤵PID:3224
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ida*" /IM * /F /T3⤵PID:5072
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:2884
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵
- Kills process with taskkill
PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:3324
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵PID:2288
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:4732
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵PID:2880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerProSdk >nul 2>&12⤵PID:4436
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerProSdk3⤵PID:212
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker3 >nul 2>&12⤵PID:1864
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker33⤵
- Launches sc.exe
PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker2 >nul 2>&12⤵PID:4276
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker23⤵PID:4340
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop KProcessHacker1 >nul 2>&12⤵PID:456
-
C:\Windows\SysWOW64\sc.exesc stop KProcessHacker13⤵PID:644
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop wireshark >nul 2>&12⤵PID:3956
-
C:\Windows\SysWOW64\sc.exesc stop wireshark3⤵
- Launches sc.exe
PID:2724
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerUI.exe >nul 2>&12⤵PID:4264
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerUI.exe3⤵
- Kills process with taskkill
PID:4900
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:4532
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:3052
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c sc stop HTTPDebuggerPro >nul 2>&12⤵PID:1432
-
C:\Windows\SysWOW64\sc.exesc stop HTTPDebuggerPro3⤵
- Launches sc.exe
PID:3556
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T >nul 2>&12⤵PID:1884
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq cheatengine*" /IM * /F /T3⤵PID:4536
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T >nul 2>&12⤵PID:3128
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵PID:3892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq httpdebugger*" /IM * /F /T3⤵PID:2092
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T >nul 2>&12⤵PID:4748
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq processhacker*" /IM * /F /T3⤵
- Kills process with taskkill
PID:4464
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T >nul 2>&12⤵PID:1048
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x64dbg*" /IM * /F /T3⤵PID:4916
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T >nul 2>&12⤵PID:2156
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq x32dbg*" /IM * /F /T3⤵PID:3024
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T >nul 2>&12⤵PID:752
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq ollydbg*" /IM * /F /T3⤵PID:4040
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T >nul 2>&12⤵PID:1124
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq fiddler*" /IM * /F /T3⤵PID:1188
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /FI "IMAGENAME eq die*" /IM * /F /T >nul 2>&12⤵PID:2908
-
C:\Windows\SysWOW64\taskkill.exetaskkill /FI "IMAGENAME eq die*" /IM * /F /T3⤵PID:2308
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebuggerSvc.exe >nul 2>&12⤵PID:3944
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebuggerSvc.exe3⤵PID:4000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im HTTPDebugger.exe >nul 2>&12⤵PID:4956
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im HTTPDebugger.exe3⤵
- Cerber
- Kills process with taskkill
PID:4092
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c taskkill /f /im FolderChangesView.exe >nul 2>&12⤵PID:2740
-
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:ShellFeedsUI.AppXnj65k2d1a1rnztt2t2nng5ctmk3e76pn.mca1⤵PID:4112
-
C:\Windows\servicing\TrustedInstaller.exeC:\Windows\servicing\TrustedInstaller.exe1⤵PID:4380
-
C:\Windows\System32\mousocoreworker.exeC:\Windows\System32\mousocoreworker.exe -Embedding1⤵PID:864
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv pj8SAT2SCUicCRR6TV5inw.0.21⤵PID:4744
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵PID:1508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.6MB
MD5f96eb2236970fb3ea97101b923af4228
SHA1e0eed80f1054acbf5389a7b8860a4503dd3e184a
SHA25646fe5192387d3f897a134d29c069ebf39c72094c892134d2f0e77b12b11a6172
SHA5122fd2d28c5f571d40b43a4dd7a22d367ba42420c29627f21ca0a2052070ffb9f689d80dad638238189eed26ed19af626f47e70f1207e10007041c620dac323cc7
-
Filesize
29KB
MD5f22740ba54a400fd2be7690bb204aa08
SHA15812387783d61c6ab5702213bb968590a18065e3
SHA25665c26276cadda7a36f8977d1d01120edb5c3418be2317d501761092d5f9916c9
SHA512ac1f89736cf348f634b526569b5783118a1a35324f9ce2f2804001e5a04751f8cc21d09bfa1c4803cd14a64152beba868f5ecf119f10fa3ccbe680d2fb481500
-
Filesize
451KB
MD5f17ecf761e70feb98c7f628857eedfe7
SHA1b2c1263c641bdaee8266a05a0afbb455e29e240d
SHA256311f5c844746d4270b5b971ccef8d74ddedca873eb45f34a1a55f1ea4a3bafcf
SHA512e5a5f56a85ee0a372990914314b750d5f970b5f91e9084621d63378a3a16a6e64904786883cd026d8aa313606c32667d2a83703f8a22fa800230a6467684d084