Your server have been found vulnerable to Veeam RCE.
This means any attacker can currently access your backup servers, execute code and download/modify/erase its content.
Patching is critical.
Reference : https://www.veeam.com/kb4288
Found Veeam distribution service, vulnerable to CVE-2022-26500, CVE-2022-26501
===================================================================
UTC offset: 2.00 hours
[07.04.2022 18:32:47] <114> Info UnLock.Success, sessionId: [9392ecf3-1b1b-465d-89f0-cde716ecdd08]
[07.04.2022 18:32:49] <112> Info [RTS] Notified that job was finished. SessionId: [7c92d43b-3d85-4f20-b600-03bcecb64c3b]
[07.04.2022 18:32:49] <112> Info [RTS] Unregister repository usage, jobSessionId '7c92d43b-3d85-4f20-b600-03bcecb64c3b'
[07.04.2022 18:32:49] <112> Info [RTS] Unregister repository usage, jobSessionId '7c92d43b-3d85-4f20-b600-03bcecb64c3b'
[07.04.2022 18:32:49] <112> Info [AwsBucketPoolMapping] Release buckets by session id '7c92d43b-3d85-4f20-b600-03bcecb64c3b'