Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Resubmissions
12/12/2024, 19:32
241212-x9e15svnbv 1012/12/2024, 19:32
241212-x8638sxjep 912/12/2024, 19:19
241212-x1wyaswqbq 10Analysis
-
max time kernel
11s -
max time network
13s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/12/2024, 19:32
Static task
static1
Behavioral task
behavioral1
Sample
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe
Resource
win7-20241023-en
General
-
Target
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe
-
Size
624KB
-
MD5
84b88ac81e4872ff3bf15c72f431d101
-
SHA1
0823d067541de16325e5454a91b57262365a0705
-
SHA256
4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6
-
SHA512
185691b0103669c5aa25b22c36f29ddb66f074e0f2e3ae6a36ed8917c35f1fba71fba65c11c3211ce64f6c5919ac879ce0fdcc4dddae420cbecf40711dff1860
-
SSDEEP
12288:V4eCA30wfnlxvaUwZNf6qYID7ZJuIQOsknZh20QyCkje0ZM7qgbGKTO7muYpralU:3C8valgsDyfSBKXyMUkW2LILGBm3IzPB
Malware Config
Signatures
-
pid Process 4832 powershell.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4832 powershell.exe 4832 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4832 powershell.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2104 wrote to memory of 4832 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 83 PID 2104 wrote to memory of 4832 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 83 PID 2104 wrote to memory of 4832 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 83 PID 2104 wrote to memory of 4188 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 85 PID 2104 wrote to memory of 4188 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 85 PID 2104 wrote to memory of 4188 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 85 PID 4188 wrote to memory of 2796 4188 net.exe 87 PID 4188 wrote to memory of 2796 4188 net.exe 87 PID 4188 wrote to memory of 2796 4188 net.exe 87 PID 2104 wrote to memory of 4580 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 88 PID 2104 wrote to memory of 4580 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 88 PID 2104 wrote to memory of 4580 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 88 PID 4580 wrote to memory of 4936 4580 net.exe 90 PID 4580 wrote to memory of 4936 4580 net.exe 90 PID 4580 wrote to memory of 4936 4580 net.exe 90 PID 2104 wrote to memory of 2784 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 91 PID 2104 wrote to memory of 2784 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 91 PID 2104 wrote to memory of 2784 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 91 PID 2784 wrote to memory of 3616 2784 net.exe 93 PID 2784 wrote to memory of 3616 2784 net.exe 93 PID 2784 wrote to memory of 3616 2784 net.exe 93 PID 2104 wrote to memory of 2440 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 94 PID 2104 wrote to memory of 2440 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 94 PID 2104 wrote to memory of 2440 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 94 PID 2440 wrote to memory of 3256 2440 net.exe 96 PID 2440 wrote to memory of 3256 2440 net.exe 96 PID 2440 wrote to memory of 3256 2440 net.exe 96 PID 2104 wrote to memory of 1412 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 97 PID 2104 wrote to memory of 1412 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 97 PID 2104 wrote to memory of 1412 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 97 PID 1412 wrote to memory of 2004 1412 net.exe 99 PID 1412 wrote to memory of 2004 1412 net.exe 99 PID 1412 wrote to memory of 2004 1412 net.exe 99 PID 2104 wrote to memory of 4984 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 100 PID 2104 wrote to memory of 4984 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 100 PID 2104 wrote to memory of 4984 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 100 PID 4984 wrote to memory of 4504 4984 net.exe 102 PID 4984 wrote to memory of 4504 4984 net.exe 102 PID 4984 wrote to memory of 4504 4984 net.exe 102 PID 2104 wrote to memory of 3544 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 103 PID 2104 wrote to memory of 3544 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 103 PID 2104 wrote to memory of 3544 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 103 PID 3544 wrote to memory of 2640 3544 net.exe 105 PID 3544 wrote to memory of 2640 3544 net.exe 105 PID 3544 wrote to memory of 2640 3544 net.exe 105 PID 2104 wrote to memory of 3884 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 106 PID 2104 wrote to memory of 3884 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 106 PID 2104 wrote to memory of 3884 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 106 PID 3884 wrote to memory of 2496 3884 net.exe 108 PID 3884 wrote to memory of 2496 3884 net.exe 108 PID 3884 wrote to memory of 2496 3884 net.exe 108 PID 2104 wrote to memory of 512 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 109 PID 2104 wrote to memory of 512 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 109 PID 2104 wrote to memory of 512 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 109 PID 512 wrote to memory of 4464 512 net.exe 111 PID 512 wrote to memory of 4464 512 net.exe 111 PID 512 wrote to memory of 4464 512 net.exe 111 PID 2104 wrote to memory of 4728 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 112 PID 2104 wrote to memory of 4728 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 112 PID 2104 wrote to memory of 4728 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 112 PID 4728 wrote to memory of 3328 4728 net.exe 114 PID 4728 wrote to memory of 3328 4728 net.exe 114 PID 4728 wrote to memory of 3328 4728 net.exe 114 PID 2104 wrote to memory of 4556 2104 4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe"C:\Users\Admin\AppData\Local\Temp\4d4df87cf8d8551d836f67fbde4337863bac3ff6b5cb324675054ea023b12ab6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -Command "& { }"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4832
-
-
C:\Windows\SysWOW64\net.exenet stop "Acronis VSS Provider" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Acronis VSS Provider" /y3⤵PID:2796
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Enterprise Client Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Enterprise Client Service" /y3⤵PID:4936
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Agent" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Agent" /y3⤵PID:3616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos AutoUpdate Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos AutoUpdate Service" /y3⤵PID:3256
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Clean Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Clean Service" /y3⤵PID:2004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Device Control Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Device Control Service" /y3⤵PID:4504
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos File Scanner Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos File Scanner Service" /y3⤵PID:2640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Health Service" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Health Service" /y3⤵PID:2496
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Agent" /y2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Agent" /y3⤵PID:4464
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos MCS Client" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4728 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos MCS Client" /y3⤵
- System Location Discovery: System Language Discovery
PID:3328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Message Router" /y2⤵PID:4556
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Message Router" /y3⤵PID:4276
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Safestore Service" /y2⤵PID:3644
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Safestore Service" /y3⤵PID:4004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos System Protection Service" /y2⤵PID:2120
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos System Protection Service" /y3⤵PID:1796
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Sophos Web Control Service" /y2⤵
- System Location Discovery: System Language Discovery
PID:1460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Sophos Web Control Service" /y3⤵PID:2948
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Backup Service" /y2⤵PID:3880
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Backup Service" /y3⤵
- System Location Discovery: System Language Discovery
PID:4108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLsafe Filter Service" /y2⤵PID:2856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLsafe Filter Service" /y3⤵PID:1044
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Symantec System Recovery" /y2⤵PID:3064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Symantec System Recovery" /y3⤵PID:2368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Veeam Backup Catalog Data Service" /y2⤵PID:2988
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Veeam Backup Catalog Data Service" /y3⤵PID:3468
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcronisAgent" /y2⤵PID:2956
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcronisAgent" /y3⤵
- System Location Discovery: System Language Discovery
PID:3640
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AcrSch2Svc" /y2⤵PID:4596
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AcrSch2Svc" /y3⤵PID:4940
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Antivirus" /y2⤵PID:3952
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Antivirus" /y3⤵PID:2592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ARSM" /y2⤵PID:3840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ARSM" /y3⤵PID:2752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentAccelerator" /y2⤵PID:1924
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentAccelerator" /y3⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecAgentBrowser" /y2⤵PID:2128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecAgentBrowser" /y3⤵
- System Location Discovery: System Language Discovery
PID:4536
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecDeviceMediaService" /y2⤵PID:4856
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecDeviceMediaService" /y3⤵PID:3808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecJobEngine" /y2⤵PID:2232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecJobEngine" /y3⤵PID:2800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecManagementService" /y2⤵PID:1672
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecManagementService" /y3⤵PID:4036
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecRPCService" /y2⤵PID:1964
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecRPCService" /y3⤵PID:2216
-
-
-
C:\Windows\SysWOW64\net.exenet stop "BackupExecVSSProvider" /y2⤵PID:1512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "BackupExecVSSProvider" /y3⤵PID:1652
-
-
-
C:\Windows\SysWOW64\net.exenet stop "bedbg" /y2⤵PID:1836
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "bedbg" /y3⤵
- System Location Discovery: System Language Discovery
PID:2512
-
-
-
C:\Windows\SysWOW64\net.exenet stop "DCAgent" /y2⤵PID:3304
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "DCAgent" /y3⤵PID:4752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPSecurityService" /y2⤵PID:3704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPSecurityService" /y3⤵
- System Location Discovery: System Language Discovery
PID:4440
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EPUpdateService" /y2⤵
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EPUpdateService" /y3⤵PID:3372
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EraserSvc11710" /y2⤵PID:3768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EraserSvc11710" /y3⤵PID:1128
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EsgShKernel" /y2⤵PID:1300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EsgShKernel" /y3⤵PID:1984
-
-
-
C:\Windows\SysWOW64\net.exenet stop "FA_Scheduler" /y2⤵
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "FA_Scheduler" /y3⤵
- System Location Discovery: System Language Discovery
PID:4564
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IISAdmin" /y2⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IISAdmin" /y3⤵PID:2808
-
-
-
C:\Windows\SysWOW64\net.exenet stop "IMAP4Svc" /y2⤵PID:2160
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "IMAP4Svc" /y3⤵PID:2396
-
-
-
C:\Windows\SysWOW64\net.exenet stop "macmnsvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "macmnsvc" /y3⤵PID:2896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "masvc" /y2⤵PID:4008
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "masvc" /y3⤵PID:2204
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBAMService" /y2⤵PID:4776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBAMService" /y3⤵PID:1416
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MBEndpointAgent" /y2⤵
- System Location Discovery: System Language Discovery
PID:3252 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MBEndpointAgent" /y3⤵PID:2076
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeEngineService" /y2⤵PID:3284
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeEngineService" /y3⤵PID:2292
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFramework" /y2⤵PID:4332
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFramework" /y3⤵PID:2616
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McAfeeFrameworkMcAfeeFramework" /y2⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McAfeeFrameworkMcAfeeFramework" /y3⤵PID:3540
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McShield" /y2⤵PID:920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McShield" /y3⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-
-
C:\Windows\SysWOW64\net.exenet stop "McTaskManager" /y2⤵PID:3292
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "McTaskManager" /y3⤵PID:4256
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfemms" /y2⤵PID:716
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfemms" /y3⤵PID:964
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mfevtp" /y2⤵PID:1372
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mfevtp" /y3⤵PID:3836
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MMS" /y2⤵PID:1256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MMS" /y3⤵PID:1764
-
-
-
C:\Windows\SysWOW64\net.exenet stop "mozyprobackup" /y2⤵PID:1064
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "mozyprobackup" /y3⤵
- System Location Discovery: System Language Discovery
PID:1840
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer" /y2⤵PID:1248
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer" /y3⤵PID:1720
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer100" /y2⤵PID:440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer100" /y3⤵PID:3488
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MsDtsServer110" /y2⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MsDtsServer110" /y3⤵PID:1884
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeES" /y2⤵PID:2780
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeES" /y3⤵PID:4572
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeIS" /y2⤵PID:4748
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeIS" /y3⤵PID:3600
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMGMT" /y2⤵PID:2240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMGMT" /y3⤵PID:4848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeMTA" /y2⤵PID:5032
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeMTA" /y3⤵
- System Location Discovery: System Language Discovery
PID:2436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSA" /y2⤵PID:1776
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSA" /y3⤵PID:2944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSExchangeSRS" /y2⤵PID:4068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSExchangeSRS" /y3⤵PID:4508
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SQL_2008" /y2⤵PID:1432
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:1792
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$SYSTEM_BGC" /y2⤵PID:1020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$SYSTEM_BGC" /y3⤵PID:3020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPS" /y2⤵PID:764
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPS" /y3⤵PID:4500
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSOLAP$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSOLAP$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:3280
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$BKUPEXEC" /y2⤵PID:4268
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$BKUPEXEC" /y3⤵
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$ECWDB2" /y2⤵PID:376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$ECWDB2" /y3⤵PID:1576
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTICEMGT" /y2⤵PID:5024
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTICEMGT" /y3⤵PID:1812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PRACTTICEBGC" /y2⤵PID:2220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PRACTTICEBGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:3116
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROFXENGAGEMENT" /y2⤵PID:4260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROFXENGAGEMENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:3028
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SBSMONITORING" /y2⤵PID:2256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SBSMONITORING" /y3⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SHAREPOINT" /y2⤵
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SHAREPOINT" /y3⤵PID:1120
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQL_2008" /y2⤵PID:1824
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQL_2008" /y3⤵
- System Location Discovery: System Language Discovery
PID:2588
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SYSTEM_BGC" /y2⤵PID:2860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SYSTEM_BGC" /y3⤵PID:3472
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPS" /y2⤵PID:400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPS" /y3⤵PID:868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$TPSAMA" /y2⤵PID:1336
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$TPSAMA" /y3⤵PID:4360
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵PID:3240
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:4896
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2012" /y2⤵PID:4340
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2012" /y3⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher" /y2⤵PID:1612
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher" /y3⤵PID:3932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y2⤵PID:2252
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$PROFXENGAGEMENT" /y3⤵PID:4800
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SBSMONITORING" /y2⤵PID:1872
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SBSMONITORING" /y3⤵PID:3676
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SHAREPOINT" /y2⤵PID:4784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SHAREPOINT" /y3⤵PID:2872
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SQL_2008" /y2⤵PID:4600
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SQL_2008" /y3⤵PID:4696
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$SYSTEM_BGC" /y2⤵PID:4484
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$SYSTEM_BGC" /y3⤵
- System Location Discovery: System Language Discovery
PID:1928
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPS" /y2⤵PID:4524
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPS" /y3⤵PID:1276
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLFDLauncher$TPSAMA" /y2⤵PID:1348
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLFDLauncher$TPSAMA" /y3⤵PID:2040
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLSERVER" /y2⤵PID:2056
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLSERVER" /y3⤵PID:4196
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper100" /y2⤵PID:4704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper100" /y3⤵PID:2760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerOLAPService" /y2⤵PID:208
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerOLAPService" /y3⤵
- System Location Discovery: System Language Discovery
PID:912
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL80" /y2⤵PID:1908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL80" /y3⤵PID:1680
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MySQL57" /y2⤵PID:2444
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MySQL57" /y3⤵PID:1172
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ntrtscan" /y2⤵
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ntrtscan" /y3⤵PID:2408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "OracleClientCache80" /y2⤵PID:5112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "OracleClientCache80" /y3⤵PID:1296
-
-
-
C:\Windows\SysWOW64\net.exenet stop "PDVFSService" /y2⤵PID:4680
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "PDVFSService" /y3⤵PID:2016
-
-
-
C:\Windows\SysWOW64\net.exenet stop "POP3Svc" /y2⤵
- System Location Discovery: System Language Discovery
PID:684 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "POP3Svc" /y3⤵
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer" /y2⤵PID:2576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer" /y3⤵PID:2728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SQL_2008" /y2⤵PID:5080
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SQL_2008" /y3⤵PID:3560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$SYSTEM_BGC" /y2⤵
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$SYSTEM_BGC" /y3⤵PID:3988
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPS" /y2⤵PID:4804
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPS" /y3⤵PID:3340
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ReportServer$TPSAMA" /y2⤵PID:2584
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ReportServer$TPSAMA" /y3⤵
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
C:\Windows\SysWOW64\net.exenet stop "RESvc" /y2⤵PID:976
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "RESvc" /y3⤵PID:3124
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sacsvr" /y2⤵PID:896
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sacsvr" /y3⤵PID:4548
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SamSs" /y2⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SamSs" /y3⤵PID:4320
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVAdminService" /y2⤵PID:4412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVAdminService" /y3⤵PID:1688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SAVService" /y2⤵PID:2376
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SAVService" /y3⤵
- System Location Discovery: System Language Discovery
PID:1868
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SDRSVC" /y2⤵
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SDRSVC" /y3⤵PID:2704
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SepMasterService" /y2⤵PID:3888
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SepMasterService" /y3⤵PID:3436
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ShMonitor" /y2⤵PID:860
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ShMonitor" /y3⤵PID:4296
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Smcinst" /y2⤵
- System Location Discovery: System Language Discovery
PID:776 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Smcinst" /y3⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SmcService" /y2⤵PID:4308
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SmcService" /y3⤵PID:3852
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SMTPSvc" /y2⤵PID:2068
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SMTPSvc" /y3⤵PID:2632
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SNAC" /y2⤵PID:1496
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SNAC" /y3⤵PID:2952
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SntpService" /y2⤵PID:2892
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SntpService" /y3⤵PID:544
-
-
-
C:\Windows\SysWOW64\net.exenet stop "sophossps" /y2⤵PID:368
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "sophossps" /y3⤵PID:4020
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$BKUPEXEC" /y2⤵PID:2416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$BKUPEXEC" /y3⤵PID:4668
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$ECWDB2" /y2⤵PID:4684
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$ECWDB2" /y3⤵PID:3224
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEBGC" /y2⤵PID:4908
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEBGC" /y3⤵PID:2284
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PRACTTICEMGT" /y2⤵PID:3412
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PRACTTICEMGT" /y3⤵
- System Location Discovery: System Language Discovery
PID:3788
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROFXENGAGEMENT" /y2⤵PID:2060
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROFXENGAGEMENT" /y3⤵PID:1008
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SBSMONITORING" /y2⤵PID:3260
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SBSMONITORING" /y3⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SHAREPOINT" /y2⤵PID:720
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SHAREPOINT" /y3⤵PID:3968
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQL_2008" /y2⤵
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQL_2008" /y3⤵PID:4528
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SYSTEM_BGC" /y2⤵PID:4828
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SYSTEM_BGC" /y3⤵PID:4084
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPS" /y2⤵PID:4840
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPS" /y3⤵PID:2960
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$TPSAMA" /y2⤵
- System Location Discovery: System Language Discovery
PID:3348 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$TPSAMA" /y3⤵PID:4364
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:1588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵
- System Location Discovery: System Language Discovery
PID:2108
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2012" /y2⤵PID:3928
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2012" /y3⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLBrowser" /y2⤵PID:5036
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLBrowser" /y3⤵PID:4760
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSafeOLRService" /y2⤵PID:3140
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSafeOLRService" /y3⤵PID:4136
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLSERVERAGENT" /y2⤵PID:1476
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLSERVERAGENT" /y3⤵
- System Location Discovery: System Language Discovery
PID:3100
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY" /y2⤵PID:4416
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY" /y3⤵PID:996
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLTELEMETRY$ECWDB2" /y2⤵PID:2920
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLTELEMETRY$ECWDB2" /y3⤵PID:2236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLWriter" /y2⤵
- System Location Discovery: System Language Discovery
PID:668 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLWriter" /y3⤵PID:1852
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SstpSvc" /y2⤵PID:2148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SstpSvc" /y3⤵PID:3688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "svcGenericHost" /y2⤵PID:4912
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "svcGenericHost" /y3⤵PID:4648
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_filter" /y2⤵PID:3272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_filter" /y3⤵PID:2804
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_service" /y2⤵
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_service" /y3⤵PID:3944
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update_64" /y2⤵PID:3300
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update_64" /y3⤵
- System Location Discovery: System Language Discovery
PID:880
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TmCCSF" /y2⤵PID:60
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TmCCSF" /y3⤵PID:3992
-
-
-
C:\Windows\SysWOW64\net.exenet stop "tmlisten" /y2⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "tmlisten" /y3⤵PID:2228
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKey" /y2⤵PID:3320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKey" /y3⤵PID:4404
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyScheduler" /y2⤵PID:2732
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyScheduler" /y3⤵PID:4552
-
-
-
C:\Windows\SysWOW64\net.exenet stop "TrueKeyServiceHelper" /y2⤵PID:1784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "TrueKeyServiceHelper" /y3⤵PID:4168
-
-
-
C:\Windows\SysWOW64\net.exenet stop "UI0Detect" /y2⤵
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "UI0Detect" /y3⤵PID:2580
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBackupSvc" /y2⤵PID:5016
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBackupSvc" /y3⤵PID:4288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamBrokerSvc" /y2⤵PID:5128
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamBrokerSvc" /y3⤵PID:5176
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCatalogSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:5192 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCatalogSvc" /y3⤵PID:5240
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamCloudSvc" /y2⤵PID:5256
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamCloudSvc" /y3⤵
- System Location Discovery: System Language Discovery
PID:5304
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploymentService" /y2⤵PID:5320
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploymentService" /y3⤵PID:5368
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamDeploySvc" /y2⤵PID:5384
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamDeploySvc" /y3⤵PID:5432
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamEnterpriseManagerSvc" /y2⤵
- System Location Discovery: System Language Discovery
PID:5448 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamEnterpriseManagerSvc" /y3⤵PID:5496
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamMountSvc" /y2⤵PID:5512
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamMountSvc" /y3⤵PID:5560
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamNFSSvc" /y2⤵PID:5576
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamNFSSvc" /y3⤵PID:5624
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamRESTSvc" /y2⤵PID:5640
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamRESTSvc" /y3⤵PID:5688
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamTransportSvc" /y2⤵PID:5704
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamTransportSvc" /y3⤵PID:5752
-
-
-
C:\Windows\SysWOW64\net.exenet stop "W3Svc" /y2⤵PID:5768
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "W3Svc" /y3⤵PID:5816
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵
- System Location Discovery: System Language Discovery
PID:5852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5932
-
-
-
C:\Windows\SysWOW64\net.exenet stop "WRSVC" /y2⤵PID:5948
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "WRSVC" /y3⤵PID:5996
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$VEEAMSQL2008R2" /y2⤵
- System Location Discovery: System Language Discovery
PID:6012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$VEEAMSQL2008R2" /y3⤵PID:6080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$VEEAMSQL2008R2" /y2⤵PID:6112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$VEEAMSQL2008R2" /y3⤵
- System Location Discovery: System Language Discovery
PID:212
-
-
-
C:\Windows\SysWOW64\net.exenet stop "VeeamHvIntegrationSvc" /y2⤵PID:5180
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "VeeamHvIntegrationSvc" /y3⤵PID:5252
-
-
-
C:\Windows\SysWOW64\net.exenet stop "swi_update" /y2⤵PID:5232
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "swi_update" /y3⤵PID:5300
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CXDB" /y2⤵
- System Location Discovery: System Language Discovery
PID:5292 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CXDB" /y3⤵PID:5356
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$CITRIX_METAFRAME" /y2⤵PID:5400
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$CITRIX_METAFRAME" /y3⤵PID:5464
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQL Backups" /y2⤵PID:5504
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQL Backups" /y3⤵PID:5564
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$PROD" /y2⤵PID:5540
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$PROD" /y3⤵PID:5656
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Zoolz 2 Service" /y2⤵PID:5696
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Zoolz 2 Service" /y3⤵PID:5744
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQLServerADHelper" /y2⤵PID:5784
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQLServerADHelper" /y3⤵PID:5916
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$PROD" /y2⤵PID:6000
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$PROD" /y3⤵PID:6052
-
-
-
C:\Windows\SysWOW64\net.exenet stop "msftesql$PROD" /y2⤵PID:5148
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "msftesql$PROD" /y3⤵PID:5152
-
-
-
C:\Windows\SysWOW64\net.exenet stop "NetMsmqActivator" /y2⤵PID:5212
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "NetMsmqActivator" /y3⤵PID:5312
-
-
-
C:\Windows\SysWOW64\net.exenet stop "EhttpSrv" /y2⤵PID:5272
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "EhttpSrv" /y3⤵PID:5344
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ekrn" /y2⤵PID:5264
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ekrn" /y3⤵PID:5408
-
-
-
C:\Windows\SysWOW64\net.exenet stop "ESHASRV" /y2⤵PID:5488
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "ESHASRV" /y3⤵PID:5592
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5628 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SOPHOS" /y3⤵PID:5728
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SOPHOS" /y2⤵
- System Location Discovery: System Language Discovery
PID:5672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SOPHOS" /y3⤵PID:5812
-
-
-
C:\Windows\SysWOW64\net.exenet stop "AVP" /y2⤵PID:6020
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "AVP" /y3⤵
- System Location Discovery: System Language Discovery
PID:5236
-
-
-
C:\Windows\SysWOW64\net.exenet stop "klnagent" /y2⤵PID:2112
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "klnagent" /y3⤵PID:5288
-
-
-
C:\Windows\SysWOW64\net.exenet stop "MSSQL$SQLEXPRESS" /y2⤵PID:5220
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "MSSQL$SQLEXPRESS" /y3⤵PID:5328
-
-
-
C:\Windows\SysWOW64\net.exenet stop "SQLAgent$SQLEXPRESS" /y2⤵PID:5440
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "SQLAgent$SQLEXPRESS" /y3⤵PID:5524
-
-
-
C:\Windows\SysWOW64\net.exenet stop "wbengine" /y2⤵PID:5588
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "wbengine" /y3⤵PID:5756
-
-
-
C:\Windows\SysWOW64\net.exenet stop "kavfsslp" /y2⤵PID:5788
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "kavfsslp" /y3⤵PID:5864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82