Analysis

  • max time kernel
    104s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-03-2024 10:59

General

  • Target

    fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc.exe

  • Size

    971KB

  • MD5

    8bb54aaed2117ea1e335444375aa113c

  • SHA1

    e04cd1c0df50f44e369b3e8f16aa7f5a3aedd330

  • SHA256

    fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc

  • SHA512

    379ea13ff1070baedc72f2c18789af55e56243dc340b8c6a26ba19c559e59c8a79d37291d8f5838de0b64233b66f02e875ced5dda9fba1e411e03b0eaa92ce5f

  • SSDEEP

    24576:bL9SB7iMphWNaOhroNLvCYKxhj954HZLLZd2zvGH26CIQx0G:bLa7i6WNFhroNLvLKxFDiZLL2GH23N9

Malware Config

Extracted

Path

C:\Users\Admin\Contacts\HOW TO BACK FILES.txt

Family

targetcompany

Ransom Note
Hello Your files are encrypted and can not be used We have downloaded your confidential data and are ready to publish it on our blog To return your files in work condition you need decryption tool Follow the instructions to decrypt all your data Do not try to change or restore files yourself, this will break them If you want, on our site you can decrypt one file for free. Free test decryption allowed only for not valuable file with size less than 3MB How to get decryption tool: 1) Download and install TOR browser by this link: https://www.torproject.org/download/ 2) If TOR blocked in your country and you can't access to the link then use any VPN software 3) Run TOR browser and open the site: wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin 4) Copy your private ID in the input field. Your Private key: 123201D74ED6CDEF6243BC75 5) You will see payment information and we can make free test decryption here 6)After payment, you will receive a tool for decrypting files, and we will delete the data that was taken from you Our blog of leaked companies: wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion If you are unable to contact us through the site, then you can email us: [email protected] Waiting for a response via mail can be several days. Do not use it if you have not tried contacting through the site.�
URLs

http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin

http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion

Signatures

  • Detect ZGRat V1 34 IoCs
  • TargetCompany,Mallox

    TargetCompany (aka Mallox) is a ransomware which encrypts files using a combination of ChaCha20, AES-128, and Curve25519, first seen in June 2021.

  • ZGRat

    ZGRat is remote access trojan written in C#.

  • Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Modifies file permissions 1 TTPs 18 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc.exe
    "C:\Users\Admin\AppData\Local\Temp\fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Kill-Delete.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4720
      • C:\Windows\system32\reg.exe
        reg delete "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Command Processor" /v "AutoRun" /f
        3⤵
          PID:3944
        • C:\Windows\system32\takeown.exe
          takeown /f C:\Windows\system32\cmd.exe /a
          3⤵
          • Modifies file permissions
          • Suspicious use of AdjustPrivilegeToken
          PID:4856
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /S /D /c" echo y"
          3⤵
            PID:376
          • C:\Windows\system32\cacls.exe
            cacls C:\Windows\system32\cmd.exe /g Administrators:f
            3⤵
              PID:2188
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" echo y"
              3⤵
                PID:4944
              • C:\Windows\system32\cacls.exe
                cacls C:\Windows\system32\cmd.exe /e /g Users:r
                3⤵
                  PID:4316
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                  3⤵
                    PID:3112
                  • C:\Windows\system32\cacls.exe
                    cacls C:\Windows\system32\cmd.exe /e /g Administrators:r
                    3⤵
                      PID:2616
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                      3⤵
                        PID:5100
                      • C:\Windows\system32\cacls.exe
                        cacls C:\Windows\system32\cmd.exe /e /d SERVICE
                        3⤵
                          PID:3808
                        • C:\Windows\system32\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                          3⤵
                            PID:2132
                          • C:\Windows\system32\cacls.exe
                            cacls C:\Windows\system32\cmd.exe /e /d mssqlserver
                            3⤵
                              PID:4628
                            • C:\Windows\system32\cmd.exe
                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                              3⤵
                                PID:1516
                              • C:\Windows\system32\cacls.exe
                                cacls C:\Windows\system32\cmd.exe /e /d "network service"
                                3⤵
                                  PID:4912
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                  3⤵
                                    PID:748
                                  • C:\Windows\system32\cacls.exe
                                    cacls C:\Windows\system32\cmd.exe /e /g system:r
                                    3⤵
                                      PID:3088
                                    • C:\Windows\system32\cmd.exe
                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                      3⤵
                                        PID:3564
                                      • C:\Windows\system32\cacls.exe
                                        cacls C:\Windows\system32\cmd.exe /e /d mssql$sqlexpress
                                        3⤵
                                          PID:4296
                                        • C:\Windows\system32\takeown.exe
                                          takeown /f C:\Windows\SysWOW64\cmd.exe /a
                                          3⤵
                                          • Modifies file permissions
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:2040
                                        • C:\Windows\system32\cmd.exe
                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                          3⤵
                                            PID:4112
                                          • C:\Windows\system32\cacls.exe
                                            cacls C:\Windows\SysWOW64\cmd.exe /g Administrators:f
                                            3⤵
                                              PID:3612
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                              3⤵
                                                PID:2172
                                              • C:\Windows\system32\cacls.exe
                                                cacls C:\Windows\SysWOW64\cmd.exe /e /g Users:r
                                                3⤵
                                                  PID:3152
                                                • C:\Windows\system32\cmd.exe
                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                  3⤵
                                                    PID:3496
                                                  • C:\Windows\system32\cacls.exe
                                                    cacls C:\Windows\SysWOW64\cmd.exe /e /g Administrators:r
                                                    3⤵
                                                      PID:1788
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                      3⤵
                                                        PID:2548
                                                      • C:\Windows\system32\cacls.exe
                                                        cacls C:\Windows\SysWOW64\cmd.exe /e /d SERVICE
                                                        3⤵
                                                          PID:4172
                                                        • C:\Windows\system32\cmd.exe
                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                          3⤵
                                                            PID:2884
                                                          • C:\Windows\system32\cacls.exe
                                                            cacls C:\Windows\SysWOW64\cmd.exe /e /d mssqlserver
                                                            3⤵
                                                              PID:2844
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                              3⤵
                                                                PID:4656
                                                              • C:\Windows\system32\cacls.exe
                                                                cacls C:\Windows\SysWOW64\cmd.exe /e /d "network service"
                                                                3⤵
                                                                  PID:2512
                                                                • C:\Windows\system32\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                  3⤵
                                                                    PID:2968
                                                                  • C:\Windows\system32\cacls.exe
                                                                    cacls C:\Windows\SysWOW64\cmd.exe /e /g system:r
                                                                    3⤵
                                                                      PID:3636
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                      3⤵
                                                                        PID:5036
                                                                      • C:\Windows\system32\cacls.exe
                                                                        cacls C:\Windows\SysWOW64\cmd.exe /e /d mssql$sqlexpress
                                                                        3⤵
                                                                          PID:4420
                                                                        • C:\Windows\system32\takeown.exe
                                                                          takeown /f C:\Windows\system32\net.exe /a
                                                                          3⤵
                                                                          • Modifies file permissions
                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                          PID:3944
                                                                        • C:\Windows\system32\cmd.exe
                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                          3⤵
                                                                            PID:2100
                                                                          • C:\Windows\system32\cacls.exe
                                                                            cacls C:\Windows\system32\net.exe /g Administrators:f
                                                                            3⤵
                                                                              PID:376
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                              3⤵
                                                                                PID:2348
                                                                              • C:\Windows\system32\cacls.exe
                                                                                cacls C:\Windows\system32\net.exe /e /g Users:r
                                                                                3⤵
                                                                                  PID:1324
                                                                                • C:\Windows\system32\cmd.exe
                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                  3⤵
                                                                                    PID:4316
                                                                                  • C:\Windows\system32\cacls.exe
                                                                                    cacls C:\Windows\system32\net.exe /e /g Administrators:r
                                                                                    3⤵
                                                                                      PID:2776
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                      3⤵
                                                                                        PID:1712
                                                                                      • C:\Windows\system32\cacls.exe
                                                                                        cacls C:\Windows\system32\net.exe /e /d SERVICE
                                                                                        3⤵
                                                                                          PID:4640
                                                                                        • C:\Windows\system32\cmd.exe
                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                          3⤵
                                                                                            PID:4884
                                                                                          • C:\Windows\system32\cacls.exe
                                                                                            cacls C:\Windows\system32\net.exe /e /d mssqlserver
                                                                                            3⤵
                                                                                              PID:1368
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                              3⤵
                                                                                                PID:3300
                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                cacls C:\Windows\system32\net.exe /e /d "network service"
                                                                                                3⤵
                                                                                                  PID:4912
                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                  3⤵
                                                                                                    PID:1364
                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                    cacls C:\Windows\system32\net.exe /e /d system
                                                                                                    3⤵
                                                                                                      PID:2984
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                      3⤵
                                                                                                        PID:3648
                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                        cacls C:\Windows\system32\net.exe /e /d mssql$sqlexpress
                                                                                                        3⤵
                                                                                                          PID:4284
                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                          takeown /f C:\Windows\SysWOW64\net.exe /a
                                                                                                          3⤵
                                                                                                          • Modifies file permissions
                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                          PID:3652
                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                          3⤵
                                                                                                            PID:1876
                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                            cacls C:\Windows\SysWOW64\net.exe /g Administrators:f
                                                                                                            3⤵
                                                                                                              PID:3280
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                              3⤵
                                                                                                                PID:2132
                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                cacls C:\Windows\SysWOW64\net.exe /e /g Users:r
                                                                                                                3⤵
                                                                                                                  PID:2232
                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                  3⤵
                                                                                                                    PID:3864
                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                    cacls C:\Windows\SysWOW64\net.exe /e /g Administrators:r
                                                                                                                    3⤵
                                                                                                                      PID:3112
                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                      3⤵
                                                                                                                        PID:3440
                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                        cacls C:\Windows\SysWOW64\net.exe /e /d SERVICE
                                                                                                                        3⤵
                                                                                                                          PID:4596
                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                          3⤵
                                                                                                                            PID:4640
                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                            cacls C:\Windows\SysWOW64\net.exe /e /d mssqlserver
                                                                                                                            3⤵
                                                                                                                              PID:4536
                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                              3⤵
                                                                                                                                PID:2448
                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                cacls C:\Windows\SysWOW64\net.exe /e /d "network service"
                                                                                                                                3⤵
                                                                                                                                  PID:2616
                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                  3⤵
                                                                                                                                    PID:2976
                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                    cacls C:\Windows\SysWOW64\net.exe /e /d system
                                                                                                                                    3⤵
                                                                                                                                      PID:2040
                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                      3⤵
                                                                                                                                        PID:2336
                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                        cacls C:\Windows\SysWOW64\net.exe /e /d mssql$sqlexpress
                                                                                                                                        3⤵
                                                                                                                                          PID:4944
                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                          takeown /f C:\Windows\system32\net1.exe /a
                                                                                                                                          3⤵
                                                                                                                                          • Modifies file permissions
                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                          PID:2936
                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                          3⤵
                                                                                                                                            PID:4108
                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                            cacls C:\Windows\system32\net1.exe /g Administrators:f
                                                                                                                                            3⤵
                                                                                                                                              PID:4028
                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                              3⤵
                                                                                                                                                PID:4828
                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                cacls C:\Windows\system32\net1.exe /e /g Users:r
                                                                                                                                                3⤵
                                                                                                                                                  PID:4112
                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                  3⤵
                                                                                                                                                    PID:4948
                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                    cacls C:\Windows\system32\net1.exe /e /g Administrators:r
                                                                                                                                                    3⤵
                                                                                                                                                      PID:3676
                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                      3⤵
                                                                                                                                                        PID:3652
                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                        cacls C:\Windows\system32\net1.exe /e /d SERVICE
                                                                                                                                                        3⤵
                                                                                                                                                          PID:2032
                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                          3⤵
                                                                                                                                                            PID:2356
                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                            cacls C:\Windows\system32\net1.exe /e /d mssqlserver
                                                                                                                                                            3⤵
                                                                                                                                                              PID:3280
                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                              3⤵
                                                                                                                                                                PID:3900
                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                cacls C:\Windows\system32\net1.exe /e /d "network service"
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:4068
                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:1900
                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                    cacls C:\Windows\system32\net1.exe /e /d system
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:3692
                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:4420
                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                        cacls C:\Windows\system32\net1.exe /e /d mssql$sqlexpress
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:1428
                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                          takeown /f C:\Windows\SysWOW64\net1.exe /a
                                                                                                                                                                          3⤵
                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                          PID:4884
                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:2260
                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                            cacls C:\Windows\SysWOW64\net1.exe /g Administrators:f
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:1712
                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:3564
                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                cacls C:\Windows\SysWOW64\net1.exe /e /g Users:r
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:1928
                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:5016
                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                    cacls C:\Windows\SysWOW64\net1.exe /e /g Administrators:r
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:2232
                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:1256
                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                        cacls C:\Windows\SysWOW64\net1.exe /e /d SERVICE
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:4468
                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:4288
                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                            cacls C:\Windows\SysWOW64\net1.exe /e /d mssqlserver
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:3816
                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4536
                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                cacls C:\Windows\SysWOW64\net1.exe /e /d "network service"
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:2080
                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:864
                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\net1.exe /e /d system
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:1216
                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:2172
                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\net1.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:4028
                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                          takeown /f C:\Windows\system32\mshta.exe /a
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                          PID:4188
                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:3512
                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                            cacls C:\Windows\system32\mshta.exe /g Administrators:f
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:3896
                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:1876
                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                cacls C:\Windows\system32\mshta.exe /e /g Users:r
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:3908
                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:3480
                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                    cacls C:\Windows\system32\mshta.exe /e /g Administrators:r
                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                      PID:2032
                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                        PID:5016
                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                        cacls C:\Windows\system32\mshta.exe /e /d SERVICE
                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                          PID:3916
                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                            PID:4588
                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                            cacls C:\Windows\system32\mshta.exe /e /d mssqlserver
                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                              PID:4912
                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                PID:5044
                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                cacls C:\Windows\system32\mshta.exe /e /d "network service"
                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                  PID:4596
                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                    PID:4856
                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                    cacls C:\Windows\system32\mshta.exe /e /d system
                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                      PID:4352
                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                        PID:4172
                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                        cacls C:\Windows\system32\mshta.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                          PID:752
                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                          takeown /f C:\Windows\SysWOW64\mshta.exe /a
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                          PID:1900
                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                            PID:4316
                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\mshta.exe /g Administrators:f
                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                              PID:1428
                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                PID:4692
                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\mshta.exe /e /g Users:r
                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                  PID:3392
                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                    PID:2936
                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\mshta.exe /e /g Administrators:r
                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                      PID:3576
                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                        PID:5004
                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\mshta.exe /e /d SERVICE
                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                          PID:864
                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                            PID:3952
                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\mshta.exe /e /d mssqlserver
                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                              PID:408
                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                PID:2348
                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\mshta.exe /e /d "network service"
                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                  PID:4112
                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                    PID:2912
                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\mshta.exe /e /d system
                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                      PID:3908
                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                        PID:3192
                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\mshta.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                          PID:1796
                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                          takeown /f C:\Windows\system32\FTP.exe /a
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                          PID:4068
                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                            PID:1436
                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\FTP.exe /g Administrators:f
                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                              PID:1428
                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                PID:3952
                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\FTP.exe /e /g Users:r
                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                  PID:2260
                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                    PID:5104
                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\FTP.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                      PID:2356
                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                        PID:4420
                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\FTP.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                          PID:752
                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                            PID:2776
                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\FTP.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                              PID:1936
                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                PID:1436
                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\FTP.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                  PID:1528
                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                    PID:2100
                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\FTP.exe /e /d system
                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                      PID:1428
                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                        PID:4108
                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\FTP.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                          PID:3788
                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\SysWOW64\FTP.exe /a
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                          PID:3896
                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                            PID:3152
                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\FTP.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                              PID:2468
                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                PID:5044
                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\FTP.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                  PID:4596
                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                    PID:1060
                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\FTP.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                      PID:3440
                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                        PID:2652
                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\FTP.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                          PID:4172
                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                            PID:4884
                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\FTP.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                              PID:4316
                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                PID:4960
                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\FTP.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                  PID:3564
                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                    PID:1236
                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\FTP.exe /e /d system
                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                      PID:4548
                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                        PID:3900
                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\FTP.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                          PID:4380
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\system32\wscript.exe /a
                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                          PID:3692
                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                            PID:1012
                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\wscript.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                              PID:2832
                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                PID:436
                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\wscript.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                  PID:2976
                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                    PID:1396
                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\wscript.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                      PID:2988
                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                        PID:1936
                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\wscript.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                          PID:4944
                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                            PID:3676
                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\wscript.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                              PID:932
                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                PID:4992
                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\wscript.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                  PID:3112
                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                    PID:2132
                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\wscript.exe /e /d system
                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                      PID:3200
                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                        PID:2300
                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\wscript.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                          PID:4960
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\SysWOW64\wscript.exe /a
                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                          PID:4352
                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                            PID:5044
                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\wscript.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                              PID:1796
                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                PID:3900
                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\wscript.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                  PID:1900
                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                    PID:2616
                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\wscript.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                      PID:4172
                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                        PID:2776
                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\wscript.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                          PID:2936
                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                            PID:3332
                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\wscript.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                              PID:2720
                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                PID:1012
                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\wscript.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                  PID:4272
                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                    PID:3972
                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\wscript.exe /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                      PID:3648
                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                        PID:4612
                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\wscript.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                          PID:3944
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\system32\cscript.exe /a
                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                          PID:3952
                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                            PID:756
                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\cscript.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                              PID:2988
                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                PID:3896
                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\cscript.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1256
                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3916
                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\cscript.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4904
                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4288
                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\cscript.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                          PID:5044
                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4640
                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\cscript.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3900
                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4744
                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\cscript.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2720
                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:608
                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\cscript.exe /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4272
                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4188
                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\cscript.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3952
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\SysWOW64\cscript.exe /a
                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3404
                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:3112
                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\cscript.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3916
                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2468
                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\cscript.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:2300
                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4420
                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\cscript.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2100
                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2336
                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\cscript.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4692
                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:864
                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\cscript.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1012
                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:5004
                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\cscript.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:608
                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:4028
                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\cscript.exe /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2172
                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4948
                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\cscript.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2260
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /a
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2032
                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:5104
                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1256
                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4188
                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4112
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2912
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3908
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2652
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1436
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:752
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4352
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:4548
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3440
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2468
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1368
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4420
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4172
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /a
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:2832
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2336
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4108
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3648
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3972
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:608
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:1396
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:5016
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4316
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:932
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1928
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1876
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:3924
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:5104
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4564
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:764
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4700
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\ProgramData /a
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3564
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2132
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\ProgramData /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3908
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3440
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\ProgramData /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:508
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3692
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\ProgramData /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3992
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4732
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\ProgramData /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3944
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2232
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\ProgramData /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1608
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1756
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\ProgramData /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4992
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3200
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\ProgramData /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:3404
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:3112
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\ProgramData /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1900
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\takeown.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          takeown /f C:\Users\Public /a
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • Modifies file permissions
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:3900
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:4628
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Users\Public /g Administrators:f
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:1712
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:3692
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Users\Public /e /g Users:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:1528
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:2832
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Users\Public /e /g Administrators:r
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:2720
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:4612
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Users\Public /e /d SERVICE
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:1396
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:384
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            cacls C:\Users\Public /e /d mssqlserver
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:3676
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:1052
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                cacls C:\Users\Public /e /d "network service"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  PID:4516
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /S /D /c" echo y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    PID:3200
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                  • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    cacls C:\Users\Public /e /d system
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      PID:4256
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:1436
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Windows\system32\cacls.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        cacls C:\Users\Public /e /d mssql$sqlexpress
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          PID:4288
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                      • C:\Users\Admin\AppData\Local\Temp\fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        C:\Users\Admin\AppData\Local\Temp\fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        2⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Checks computer location settings
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Enumerates connected drives
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Drops file in Program Files directory
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • System policy modification
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        PID:2756
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2396
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            • C:\Windows\system32\bcdedit.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              bcdedit /set {current} bootstatuspolicy ignoreallfailures
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • Modifies boot configuration data using bcdedit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4924
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Windows\System32\cmd.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            "C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              PID:4296
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                              • C:\Windows\system32\bcdedit.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                bcdedit /set {current} recoveryenabled no
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                4⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                • Modifies boot configuration data using bcdedit
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                PID:2080
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1036 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:8
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          1⤵
                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            PID:2988

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          Network

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          Replay Monitor

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          Loading Replay Monitor...

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          Downloads

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Documents and Settings\Admin\Local Settings\Microsoft\CLR_v4.0\UsageLogs\fd2babde5ef8b417cd3ee03db2149633728585ba4a70919fb6f516dc59c23fbc.exe.log

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            bdd50fab193bb1a687efd2214c3ddd75

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            2ed9874e543e755b7d7fb9f52fd687f2c287399f

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            bfedba89a98eaff3bc2b9cabf01a9059f5a052e3849fb08f6fa00f845abc11e7

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            318c4096b76cdb767ecc13ea9887098312140e2851c0a7b3e925d71bfc9ff03bc14bc8de9c3c38de39bc836368c0e29a09b9603d0769ebab4204895ae2f8c444

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Kill-Delete.bat

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            10KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            1726416850d3bba46eeb804fae57083d

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            7e7957d7e7fd7c27b9fb903a0828b09cbb44c196

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            c207a7a561ab726fb272b5abd99c4da8e927b5da788210d5dd186023c2783990

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            7747e5c6bd77a43ee958cb7b533a73757e8bfb7b3706af4eb7ec9a99458720f89cd30bb23b4cb069826dc36a6ce737424ad0007307be67a7391591f6c936df27

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • C:\Users\Admin\Contacts\HOW TO BACK FILES.txt

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            1KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            MD5

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            aa8423804d80edd99b33342551e63863

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA1

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            058ee552483270962da08ff3e5057fd590ba3e2b

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA256

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            8b7fb4cecfc1b4b5e5d2df1de495f63b8a9953cd004d4cbd98670fb2949ce23e

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            SHA512

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            bf1ae245ee5e7307329b44dc60188afbb10bc2b11dd9c35fac7735d59f48ad4b8b7a158831e3b510bd22778b03d8b8eb11be3b65ce289b0f92bceeecd7671145

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-31-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-7-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-5-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-43-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-9-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-11-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-13-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-15-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-17-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-19-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-21-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-23-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-25-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-27-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-29-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-45-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-37-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-39-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-33-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-0-0x0000015B50A60000-0x0000015B50B56000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            984KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-1-0x0000015B6B090000-0x0000015B6B152000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            776KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-4-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-35-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-47-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-49-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-51-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-53-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-59-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-61-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-63-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-57-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-55-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-67-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-65-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-926-0x0000015B526F0000-0x0000015B526F1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            4KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-927-0x0000015B6B1A0000-0x0000015B6B1FC000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            368KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-928-0x0000015B6B200000-0x0000015B6B24C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            304KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-3-0x0000015B6B190000-0x0000015B6B1A0000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            64KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-41-0x0000015B6B090000-0x0000015B6B14C000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            752KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-940-0x00007FFAE3300000-0x00007FFAE3DC1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/1216-2-0x00007FFAE3300000-0x00007FFAE3DC1000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            10.8MB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2756-939-0x0000000140000000-0x0000000140066000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            408KB

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                          • memory/2756-2086-0x0000000140000000-0x0000000140066000-memory.dmp

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            Filesize

                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                            408KB