コマンドオプションサンプル:wmic SHADOWCOPY

コマンドサンプルを検索した結果です。

wmic shadowcopy call create Volume='C:\' Executing (Win32_ShadowCopy)->create() ERROR: Description = Initialization failure C:\Users\Doooh>     Previous versions not working in Windows 10 : http://social.technet.microsoft.com/Forums/windows/en-US/2ebc2245-f5a4-4883-9762-f93f8f21d19b/previous-versions-not-working-in-windows-10@forum=win10itprogeneral
wmic shadowcopy call create Volume='C:\'    以前のバージョン - piro77の日記 : http://d.hatena.ne.jp/piro77/20170630/1498830984
wmic shadowcopy call create Volume='D:\'    How to Protect and Harden a Computer against Ransomware : http://www.bleepingcomputer.com/news/security/how-to-protect-and-harden-a-computer-against-ransomware/
wmic shadowcopy call create Volume='E:\'    windows 10 - Unexpectedly able to create VSS shadow copy for FAT32 volume - Server Fault : http://serverfault.com/questions/871979/unexpectedly-able-to-create-vss-shadow-copy-for-fat32-volume
wmic shadowcopy call create Volume='targert_volume_id'    Bvckup 2 | Forum | Feature requests and suggestions : http://bvckup2.com/support/forum/topic/436
wmic shadowcopy call create Volume=    Before You Pay that Ransomware Demand… — Krebs on Security : http://krebsonsecurity.com/2016/12/before-you-pay-that-ransomware-demand/
wmic shadowcopy call create Volume=c:\    Configure Shadow Copy For Windows 10 – It`s simple when you know how ! : http://itsimple.info/@p=258
wmic shadowcopy call create Volume=D:\    windows 10 - Shadow Copy With Storage Spaces? - Super User : http://superuser.com/questions/1259047/shadow-copy-with-storage-spaces
wmic shadowcopy delet    HSDFSD Ransomware Remove It and Restore Files : http://sensorstechforum.com/hsdfsd-ransomware-remove-restore-files/
wmic shadowcopy delete (PID: 200)    Free Automated Malware Analysis Service - powered by Falcon Sandbox - Viewing online file analysis results for 'gxyegj.exe' : http://www.hybrid-analysis.com/sample/08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4@environmentId=100
wmic shadowcopy delete (PID: 3220)    Free Automated Malware Analysis Service - powered by Falcon Sandbox - Viewing online file analysis results for 'gxyegj.exe' : http://www.hybrid-analysis.com/sample/08cf8ed94cc1ef6ae23133f3e506a50d8aad9047c6fa74568a0373d991261aa4@environmentId=100
wmic shadowcopy delete (PID: 3612)    Automated Malware Analysis Service - powered by Falcon Sandbox - Viewing analysis results for 'badfile.exe' : http://www.vxstream-sandbox.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa@environmentId=100
wmic shadowcopy delete /nointeractive    Rokku Ransomware shows possible link with Chimera - Malwarebytes Labs | Malwarebytes Labs : http://blog.malwarebytes.com/threat-analysis/2016/04/rokku-ransomware/
wmic shadowcopy delete ]    Hacker Gear Archives - School for Hackers : http://schoolforhackers.com/category/hacker-gear/
wmic shadowcopy delete bcdedit /set    Hacker Gear Archives - School for Hackers : http://schoolforhackers.com/category/hacker-gear/
wmic shadowcopy delete" (UID: 00029503-00003612)    Automated Malware Analysis Service - powered by Falcon Sandbox - Viewing analysis results for 'badfile.exe' : http://www.vxstream-sandbox.com/sample/ed01ebfbc9eb5bbea545af4d01bf5f1071661840480439c6e5babe8e080e41aa@environmentId=100
wmic shadowcopy delete" ascii wide    WannaCry Malware Profile « WannaCry Malware Profile | FireEye Inc : http://www.fireeye.com/blog/threat-research/2017/05/wannacry-malware-profile.html
wmic shadowcopy delete" Command    Password Expiration - Enable or Disable - Windows 7 Help Forums : http://www.sevenforums.com/tutorials/166102-shadow-copies-delete.html
wmic shadowcopy delete"    compliance rule to check disks are basic or dyn... | BMC Communities : http://communities.bmc.com/thread/78089@tstart=0
wmic shadowcopy delete) using Event Viewer (eventvwr.exe)    Videos - CheckMAL : http://www.checkmal.com/page/resource/video/index.php@detail=read&idx=784&p=1&pc=20&lang=en
wmic shadowcopy delete    Wanna Decryptor 2.0 ransomware that spreads really fast and infects tons of computers : http://anti-malware.gridinsoft.com/adware/wana-decrypt0r-2-0-new-dangerous-ransomware-spreading-world-wide-speed-light/
wmic shadowcopy get DeviceObject    windows - Accessing Volume Shadow Copy (VSS) Snapshots from powershell - Stack Overflow : http://stackoverflow.com/questions/14207788/accessing-volume-shadow-copy-vss-snapshots-from-powershell
wmic shadowcopy list brief    These Aren't Yo Momma's WMIC Commands – Half Full of Security : http://jon.glass/blog/lists-some-wmic-commands/
wmic shadowcopy where "ID='    windows 10 - Shadow Copy With Storage Spaces? - Super User : http://superuser.com/questions/1259047/shadow-copy-with-storage-spaces

Googleで検索

https://www.google.co.jp/#q=wmic SHADOWCOPY