Resubmissions
23-09-2020 10:35
200923-mkwlt9yalx 1023-07-2020 14:59
200723-mtbw6t99d2 1023-07-2020 13:47
200723-5t3mhtw95x 10Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
23-09-2020 10:35
Static task
static1
Behavioral task
behavioral1
Sample
build-x64-crypt.bin.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
build-x64-crypt.bin.exe
Resource
win10
General
-
Target
build-x64-crypt.bin.exe
-
Size
52KB
-
MD5
8cc13fea61cc0ba1382a779ee46726f0
-
SHA1
bd8ef46a02085153605a87fcc047f7ef3d0c4131
-
SHA256
eeb8a83d7532797d39d060ffb2a65562e8d803c4dbd8379289f99367cac2f850
-
SHA512
2f317f04b6bda9af58b049cb9bd0032d08c0aa30b8ac8d76b10f738ab11f4cc9f4eca4af3ecf26e610715117e2d68e5f8fb0ac139e60e882cc24fc795bf0a34a
Malware Config
Extracted
C:\Users\Admin\Desktop\Ejdgcj-decrypt.hta
exorcist
http://217.8.117.26/pay
http://4dnd3utjsmm2zcsb.onion/pay
Signatures
-
Exorcist
Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 360 bcdedit.exe 912 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid process 1780 wbadmin.exe 316 wbadmin.exe -
Modifies extensions of user files 4 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
build-x64-crypt.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\JoinDebug.crw => C:\Users\Admin\Pictures\JoinDebug.crw.Ejdgcj build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\JoinDebug.crw.Ejdgcj build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\LockBackup.raw => C:\Users\Admin\Pictures\LockBackup.raw.Ejdgcj build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\LockBackup.raw.Ejdgcj build-x64-crypt.bin.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
build-x64-crypt.bin.exedescription ioc process File opened (read-only) \??\O: build-x64-crypt.bin.exe File opened (read-only) \??\P: build-x64-crypt.bin.exe File opened (read-only) \??\A: build-x64-crypt.bin.exe File opened (read-only) \??\B: build-x64-crypt.bin.exe File opened (read-only) \??\I: build-x64-crypt.bin.exe File opened (read-only) \??\K: build-x64-crypt.bin.exe File opened (read-only) \??\V: build-x64-crypt.bin.exe File opened (read-only) \??\F: build-x64-crypt.bin.exe File opened (read-only) \??\L: build-x64-crypt.bin.exe File opened (read-only) \??\Q: build-x64-crypt.bin.exe File opened (read-only) \??\S: build-x64-crypt.bin.exe File opened (read-only) \??\J: build-x64-crypt.bin.exe File opened (read-only) \??\M: build-x64-crypt.bin.exe File opened (read-only) \??\R: build-x64-crypt.bin.exe File opened (read-only) \??\T: build-x64-crypt.bin.exe File opened (read-only) \??\U: build-x64-crypt.bin.exe File opened (read-only) \??\W: build-x64-crypt.bin.exe File opened (read-only) \??\X: build-x64-crypt.bin.exe File opened (read-only) \??\E: build-x64-crypt.bin.exe File opened (read-only) \??\G: build-x64-crypt.bin.exe File opened (read-only) \??\H: build-x64-crypt.bin.exe File opened (read-only) \??\N: build-x64-crypt.bin.exe File opened (read-only) \??\Y: build-x64-crypt.bin.exe File opened (read-only) \??\Z: build-x64-crypt.bin.exe -
Modifies service 2 TTPs 5 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\SwProvider_{b5946137-7b9f-4925-af80-51abd60b20d5} vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe -
Drops file in Windows directory 6 IoCs
Processes:
wbadmin.exewbadmin.exedescription ioc process File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1408 vssadmin.exe -
Kills process with taskkill 91 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 228 taskkill.exe 552 taskkill.exe 968 taskkill.exe 1140 taskkill.exe 340 taskkill.exe 220 taskkill.exe 1708 taskkill.exe 2016 taskkill.exe 1252 taskkill.exe 1544 taskkill.exe 316 taskkill.exe 1736 taskkill.exe 588 taskkill.exe 224 taskkill.exe 1456 taskkill.exe 1040 taskkill.exe 1100 taskkill.exe 804 taskkill.exe 1848 taskkill.exe 2036 taskkill.exe 1300 taskkill.exe 1756 taskkill.exe 1756 taskkill.exe 1144 taskkill.exe 1336 taskkill.exe 968 taskkill.exe 1936 taskkill.exe 1780 taskkill.exe 2008 taskkill.exe 684 taskkill.exe 1548 taskkill.exe 684 taskkill.exe 2008 taskkill.exe 1488 taskkill.exe 956 taskkill.exe 1972 taskkill.exe 1144 taskkill.exe 1952 taskkill.exe 1836 taskkill.exe 1792 taskkill.exe 1760 taskkill.exe 900 taskkill.exe 1952 taskkill.exe 1500 taskkill.exe 1064 taskkill.exe 1524 taskkill.exe 1736 taskkill.exe 236 taskkill.exe 1556 taskkill.exe 1996 taskkill.exe 1524 taskkill.exe 480 taskkill.exe 1936 taskkill.exe 924 taskkill.exe 316 taskkill.exe 1556 taskkill.exe 1836 taskkill.exe 1336 taskkill.exe 848 taskkill.exe 936 taskkill.exe 956 taskkill.exe 2036 taskkill.exe 848 taskkill.exe 2016 taskkill.exe -
Processes:
mshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
NTFS ADS 5 IoCs
Processes:
build-x64-crypt.bin.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\boot.sys:ivrhwmenumbuocvak build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:tpupnbvzicwro build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:xbcqjlijd build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:iykxevszimranzpu build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:xbcqjlijd build-x64-crypt.bin.exe -
Suspicious behavior: EnumeratesProcesses 344 IoCs
Processes:
build-x64-crypt.bin.exepid process 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe 1000 build-x64-crypt.bin.exe -
Suspicious use of AdjustPrivilegeToken 135 IoCs
Processes:
WMIC.exevssvc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeIncreaseQuotaPrivilege 1760 WMIC.exe Token: SeSecurityPrivilege 1760 WMIC.exe Token: SeTakeOwnershipPrivilege 1760 WMIC.exe Token: SeLoadDriverPrivilege 1760 WMIC.exe Token: SeSystemProfilePrivilege 1760 WMIC.exe Token: SeSystemtimePrivilege 1760 WMIC.exe Token: SeProfSingleProcessPrivilege 1760 WMIC.exe Token: SeIncBasePriorityPrivilege 1760 WMIC.exe Token: SeCreatePagefilePrivilege 1760 WMIC.exe Token: SeBackupPrivilege 1760 WMIC.exe Token: SeRestorePrivilege 1760 WMIC.exe Token: SeShutdownPrivilege 1760 WMIC.exe Token: SeDebugPrivilege 1760 WMIC.exe Token: SeSystemEnvironmentPrivilege 1760 WMIC.exe Token: SeRemoteShutdownPrivilege 1760 WMIC.exe Token: SeUndockPrivilege 1760 WMIC.exe Token: SeManageVolumePrivilege 1760 WMIC.exe Token: 33 1760 WMIC.exe Token: 34 1760 WMIC.exe Token: 35 1760 WMIC.exe Token: SeIncreaseQuotaPrivilege 1760 WMIC.exe Token: SeSecurityPrivilege 1760 WMIC.exe Token: SeTakeOwnershipPrivilege 1760 WMIC.exe Token: SeLoadDriverPrivilege 1760 WMIC.exe Token: SeSystemProfilePrivilege 1760 WMIC.exe Token: SeSystemtimePrivilege 1760 WMIC.exe Token: SeProfSingleProcessPrivilege 1760 WMIC.exe Token: SeIncBasePriorityPrivilege 1760 WMIC.exe Token: SeCreatePagefilePrivilege 1760 WMIC.exe Token: SeBackupPrivilege 1760 WMIC.exe Token: SeRestorePrivilege 1760 WMIC.exe Token: SeShutdownPrivilege 1760 WMIC.exe Token: SeDebugPrivilege 1760 WMIC.exe Token: SeSystemEnvironmentPrivilege 1760 WMIC.exe Token: SeRemoteShutdownPrivilege 1760 WMIC.exe Token: SeUndockPrivilege 1760 WMIC.exe Token: SeManageVolumePrivilege 1760 WMIC.exe Token: 33 1760 WMIC.exe Token: 34 1760 WMIC.exe Token: 35 1760 WMIC.exe Token: SeBackupPrivilege 1512 vssvc.exe Token: SeRestorePrivilege 1512 vssvc.exe Token: SeAuditPrivilege 1512 vssvc.exe Token: SeDebugPrivilege 1972 taskkill.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 544 taskkill.exe Token: SeDebugPrivilege 968 taskkill.exe Token: SeDebugPrivilege 956 taskkill.exe Token: SeDebugPrivilege 1252 taskkill.exe Token: SeDebugPrivilege 1952 taskkill.exe Token: SeDebugPrivilege 232 taskkill.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 1140 taskkill.exe Token: SeDebugPrivilege 360 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 1488 taskkill.exe Token: SeDebugPrivilege 1080 taskkill.exe Token: SeDebugPrivilege 1848 taskkill.exe Token: SeDebugPrivilege 1456 taskkill.exe Token: SeDebugPrivilege 316 taskkill.exe Token: SeDebugPrivilege 2044 taskkill.exe Token: SeDebugPrivilege 1524 taskkill.exe Token: SeDebugPrivilege 1040 taskkill.exe -
Suspicious use of WriteProcessMemory 588 IoCs
Processes:
build-x64-crypt.bin.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1000 wrote to memory of 1304 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1304 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1304 1000 build-x64-crypt.bin.exe cmd.exe PID 1304 wrote to memory of 1760 1304 cmd.exe WMIC.exe PID 1304 wrote to memory of 1760 1304 cmd.exe WMIC.exe PID 1304 wrote to memory of 1760 1304 cmd.exe WMIC.exe PID 1000 wrote to memory of 2000 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 2000 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 2000 1000 build-x64-crypt.bin.exe cmd.exe PID 2000 wrote to memory of 1780 2000 cmd.exe wbadmin.exe PID 2000 wrote to memory of 1780 2000 cmd.exe wbadmin.exe PID 2000 wrote to memory of 1780 2000 cmd.exe wbadmin.exe PID 1000 wrote to memory of 420 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 420 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 420 1000 build-x64-crypt.bin.exe cmd.exe PID 420 wrote to memory of 316 420 cmd.exe wbadmin.exe PID 420 wrote to memory of 316 420 cmd.exe wbadmin.exe PID 420 wrote to memory of 316 420 cmd.exe wbadmin.exe PID 1000 wrote to memory of 684 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 684 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 684 1000 build-x64-crypt.bin.exe cmd.exe PID 684 wrote to memory of 360 684 cmd.exe bcdedit.exe PID 684 wrote to memory of 360 684 cmd.exe bcdedit.exe PID 684 wrote to memory of 360 684 cmd.exe bcdedit.exe PID 1000 wrote to memory of 276 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 276 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 276 1000 build-x64-crypt.bin.exe cmd.exe PID 276 wrote to memory of 912 276 cmd.exe bcdedit.exe PID 276 wrote to memory of 912 276 cmd.exe bcdedit.exe PID 276 wrote to memory of 912 276 cmd.exe bcdedit.exe PID 1000 wrote to memory of 1776 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1776 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1776 1000 build-x64-crypt.bin.exe cmd.exe PID 1776 wrote to memory of 1408 1776 cmd.exe vssadmin.exe PID 1776 wrote to memory of 1408 1776 cmd.exe vssadmin.exe PID 1776 wrote to memory of 1408 1776 cmd.exe vssadmin.exe PID 1000 wrote to memory of 372 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 372 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 372 1000 build-x64-crypt.bin.exe cmd.exe PID 372 wrote to memory of 1040 372 cmd.exe VSSVC.exe PID 372 wrote to memory of 1040 372 cmd.exe VSSVC.exe PID 372 wrote to memory of 1040 372 cmd.exe VSSVC.exe PID 1000 wrote to memory of 1740 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1740 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1740 1000 build-x64-crypt.bin.exe cmd.exe PID 1740 wrote to memory of 1972 1740 cmd.exe taskkill.exe PID 1740 wrote to memory of 1972 1740 cmd.exe taskkill.exe PID 1740 wrote to memory of 1972 1740 cmd.exe taskkill.exe PID 1000 wrote to memory of 2024 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 2024 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 2024 1000 build-x64-crypt.bin.exe cmd.exe PID 2024 wrote to memory of 224 2024 cmd.exe taskkill.exe PID 2024 wrote to memory of 224 2024 cmd.exe taskkill.exe PID 2024 wrote to memory of 224 2024 cmd.exe taskkill.exe PID 1000 wrote to memory of 1828 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1828 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 1828 1000 build-x64-crypt.bin.exe cmd.exe PID 1828 wrote to memory of 1736 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 1736 1828 cmd.exe taskkill.exe PID 1828 wrote to memory of 1736 1828 cmd.exe taskkill.exe PID 1000 wrote to memory of 920 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 920 1000 build-x64-crypt.bin.exe cmd.exe PID 1000 wrote to memory of 920 1000 build-x64-crypt.bin.exe cmd.exe PID 920 wrote to memory of 544 920 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe"C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /C wmic.exe SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic.exe SHADOWCOPY DELETE /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP3⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\system32\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest3⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\system32\cmd.execmd /C bcdedit.exe /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.execmd /C bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.execmd /C vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.execmd /C C:\Windows\system32\vssvc.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\VSSVC.exeC:\Windows\system32\vssvc.exe3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wxServer*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wxServer*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBFCService*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBFCService*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBVSS*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBVSS*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sql*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sql*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM msaccess*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msaccess*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM mssql*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mssql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM mysql*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mysql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wxServerView*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wxServerView*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlmangr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlmangr*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM RAgui*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM RAgui*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM supervise*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM supervise*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Culture*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Culture*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Defwatch*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Defwatch*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM winword*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM winword*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBW32*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBW32*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBDBMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBDBMgr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM qbupdate*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM qbupdate*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM axlbridge*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM axlbridge*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM httpd*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM httpd*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fdlauncher*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fdlauncher*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MsDtSrvr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MsDtSrvr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM java*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM java*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM 360se*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM 360se*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM 360doctor*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM 360doctor*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wdswfsafe*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wdswfsafe*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fdhost*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fdhost*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM GDscan*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM GDscan*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ZhuDongFangYu*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ZhuDongFangYu*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBDBMgrN*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBDBMgrN*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM mysqld*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mysqld*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM AutodeskDesktopApp*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AutodeskDesktopApp*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM acwebbrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM acwebbrowser*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Creative Cloud*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Creative Cloud*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Adobe Desktop Service*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Adobe Desktop Service*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM CoreSync*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM CoreSync*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Adobe CEF Helper*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Adobe CEF Helper*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM node*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM node*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM AdobeIPCBroker*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AdobeIPCBroker*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sync-taskbar*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sync-taskbar*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sync-worker*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sync-worker*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM InputPersonalization*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM InputPersonalization*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM AdobeCollabSync*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AdobeCollabSync*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM BrCtrlCntr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM BrCtrlCntr*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM BrCcUxSys*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM BrCcUxSys*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SimplyConnectionManager*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SimplyConnectionManager*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Simply.SystemTrayIcon*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Simply.SystemTrayIcon*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fbguard*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fbguard*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fbserver*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fbserver*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ONENOTEM*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ONENOTEM*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wrapper*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wrapper*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM DefWatch*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM DefWatch*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ccEvtMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ccEvtMgr*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ccSetMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ccSetMgr*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SavRoam*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SavRoam*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Sqlservr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Sqlservr*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlagent*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlagent*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqladhlp*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqladhlp*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Culserver*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Culserver*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM RTVscan*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM RTVscan*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlbrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlbrowser*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLADHLP*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLADHLP*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBIDPService*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBIDPService*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Intuit.QuickBooks.FCS*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Intuit.QuickBooks.FCS*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBCFMonitorService*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBCFMonitorService*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlwriter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlwriter*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM msmdsrv*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msmdsrv*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM tomcat6*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM tomcat6*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM zhudongfangyu*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM zhudongfangyu*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM vmware-usbarbitator64*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM vmware-usbarbitator64*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM vmware-converter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM vmware-converter*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM dbsrv12*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM dbsrv12*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM dbeng8*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM dbeng8*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$VEEAMSQL2012*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$VEEAMSQL2012*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLBrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLBrowser*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLWriter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLWriter*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM FishbowlMySQL*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM FishbowlMySQL*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MySQL57*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MySQL57*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQLServerADHelper100*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLServerADHelper100*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM msftesql-Exchange*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msftesql-Exchange*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##SSEE*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##SSEE*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$SHAREPOINT*3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x2e01⤵
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\SysWOW64\mshta.exe" "C:\Users\Admin\Desktop\Ejdgcj-decrypt.hta"1⤵
- Modifies Internet Explorer settings
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\Ejdgcj-decrypt.hta
-
memory/204-32-0x0000000000000000-mapping.dmp
-
memory/204-64-0x0000000000000000-mapping.dmp
-
memory/216-92-0x0000000000000000-mapping.dmp
-
memory/220-149-0x0000000000000000-mapping.dmp
-
memory/224-17-0x0000000000000000-mapping.dmp
-
memory/228-130-0x0000000000000000-mapping.dmp
-
memory/228-172-0x0000000000000000-mapping.dmp
-
memory/228-59-0x0000000000000000-mapping.dmp
-
memory/232-31-0x0000000000000000-mapping.dmp
-
memory/232-73-0x0000000000000000-mapping.dmp
-
memory/236-117-0x0000000000000000-mapping.dmp
-
memory/236-186-0x0000000000000000-mapping.dmp
-
memory/276-86-0x0000000000000000-mapping.dmp
-
memory/276-8-0x0000000000000000-mapping.dmp
-
memory/276-147-0x0000000000000000-mapping.dmp
-
memory/316-49-0x0000000000000000-mapping.dmp
-
memory/316-134-0x0000000000000000-mapping.dmp
-
memory/316-5-0x0000000000000000-mapping.dmp
-
memory/316-163-0x0000000000000000-mapping.dmp
-
memory/340-97-0x0000000000000000-mapping.dmp
-
memory/360-80-0x0000000000000000-mapping.dmp
-
memory/360-37-0x0000000000000000-mapping.dmp
-
memory/360-7-0x0000000000000000-mapping.dmp
-
memory/372-76-0x0000000000000000-mapping.dmp
-
memory/372-44-0x0000000000000000-mapping.dmp
-
memory/372-12-0x0000000000000000-mapping.dmp
-
memory/420-114-0x0000000000000000-mapping.dmp
-
memory/420-38-0x0000000000000000-mapping.dmp
-
memory/420-4-0x0000000000000000-mapping.dmp
-
memory/480-187-0x0000000000000000-mapping.dmp
-
memory/544-21-0x0000000000000000-mapping.dmp
-
memory/544-120-0x0000000000000000-mapping.dmp
-
memory/552-171-0x0000000000000000-mapping.dmp
-
memory/552-142-0x0000000000000000-mapping.dmp
-
memory/588-148-0x0000000000000000-mapping.dmp
-
memory/588-177-0x0000000000000000-mapping.dmp
-
memory/608-176-0x0000000000000000-mapping.dmp
-
memory/684-65-0x0000000000000000-mapping.dmp
-
memory/684-6-0x0000000000000000-mapping.dmp
-
memory/684-191-0x0000000000000000-mapping.dmp
-
memory/804-90-0x0000000000000000-mapping.dmp
-
memory/804-24-0x0000000000000000-mapping.dmp
-
memory/804-56-0x0000000000000000-mapping.dmp
-
memory/804-161-0x0000000000000000-mapping.dmp
-
memory/820-194-0x0000000000000000-mapping.dmp
-
memory/840-26-0x0000000000000000-mapping.dmp
-
memory/840-58-0x0000000000000000-mapping.dmp
-
memory/848-63-0x0000000000000000-mapping.dmp
-
memory/848-135-0x0000000000000000-mapping.dmp
-
memory/900-137-0x0000000000000000-mapping.dmp
-
memory/908-40-0x0000000000000000-mapping.dmp
-
memory/908-72-0x0000000000000000-mapping.dmp
-
memory/908-106-0x0000000000000000-mapping.dmp
-
memory/912-9-0x0000000000000000-mapping.dmp
-
memory/920-52-0x0000000000000000-mapping.dmp
-
memory/920-20-0x0000000000000000-mapping.dmp
-
memory/924-67-0x0000000000000000-mapping.dmp
-
memory/924-155-0x0000000000000000-mapping.dmp
-
memory/924-140-0x0000000000000000-mapping.dmp
-
memory/928-98-0x0000000000000000-mapping.dmp
-
memory/928-178-0x0000000000000000-mapping.dmp
-
memory/928-66-0x0000000000000000-mapping.dmp
-
memory/936-150-0x0000000000000000-mapping.dmp
-
memory/936-179-0x0000000000000000-mapping.dmp
-
memory/948-162-0x0000000000000000-mapping.dmp
-
memory/956-139-0x0000000000000000-mapping.dmp
-
memory/956-25-0x0000000000000000-mapping.dmp
-
memory/968-151-0x0000000000000000-mapping.dmp
-
memory/968-95-0x0000000000000000-mapping.dmp
-
memory/968-136-0x0000000000000000-mapping.dmp
-
memory/968-23-0x0000000000000000-mapping.dmp
-
memory/1040-55-0x0000000000000000-mapping.dmp
-
memory/1040-13-0x0000000000000000-mapping.dmp
-
memory/1040-100-0x0000000000000000-mapping.dmp
-
memory/1064-189-0x0000000000000000-mapping.dmp
-
memory/1064-160-0x0000000000000000-mapping.dmp
-
memory/1064-79-0x0000000000000000-mapping.dmp
-
memory/1080-152-0x0000000000000000-mapping.dmp
-
memory/1080-43-0x0000000000000000-mapping.dmp
-
memory/1100-112-0x0000000000000000-mapping.dmp
-
memory/1100-81-0x0000000000000000-mapping.dmp
-
memory/1108-146-0x0000000000000000-mapping.dmp
-
memory/1108-77-0x0000000000000000-mapping.dmp
-
memory/1140-35-0x0000000000000000-mapping.dmp
-
memory/1144-91-0x0000000000000000-mapping.dmp
-
memory/1144-185-0x0000000000000000-mapping.dmp
-
memory/1196-188-0x0000000000000000-mapping.dmp
-
memory/1228-107-0x0000000000000000-mapping.dmp
-
memory/1248-50-0x0000000000000000-mapping.dmp
-
memory/1248-96-0x0000000000000000-mapping.dmp
-
memory/1248-181-0x0000000000000000-mapping.dmp
-
memory/1252-166-0x0000000000000000-mapping.dmp
-
memory/1252-27-0x0000000000000000-mapping.dmp
-
memory/1252-195-0x0000000000000000-mapping.dmp
-
memory/1296-42-0x0000000000000000-mapping.dmp
-
memory/1296-74-0x0000000000000000-mapping.dmp
-
memory/1300-99-0x0000000000000000-mapping.dmp
-
memory/1304-118-0x0000000000000000-mapping.dmp
-
memory/1304-0-0x0000000000000000-mapping.dmp
-
memory/1304-192-0x0000000000000000-mapping.dmp
-
memory/1336-119-0x0000000000000000-mapping.dmp
-
memory/1336-93-0x0000000000000000-mapping.dmp
-
memory/1352-82-0x0000000000000000-mapping.dmp
-
memory/1408-11-0x0000000000000000-mapping.dmp
-
memory/1408-108-0x0000000000000000-mapping.dmp
-
memory/1432-128-0x0000000000000000-mapping.dmp
-
memory/1456-47-0x0000000000000000-mapping.dmp
-
memory/1456-132-0x0000000000000000-mapping.dmp
-
memory/1456-174-0x0000000000000000-mapping.dmp
-
memory/1472-28-0x0000000000000000-mapping.dmp
-
memory/1472-60-0x0000000000000000-mapping.dmp
-
memory/1472-158-0x0000000000000000-mapping.dmp
-
memory/1476-105-0x0000000000000000-mapping.dmp
-
memory/1480-170-0x0000000000000000-mapping.dmp
-
memory/1480-84-0x0000000000000000-mapping.dmp
-
memory/1484-110-0x0000000000000000-mapping.dmp
-
memory/1484-167-0x0000000000000000-mapping.dmp
-
memory/1484-124-0x0000000000000000-mapping.dmp
-
memory/1488-85-0x0000000000000000-mapping.dmp
-
memory/1488-41-0x0000000000000000-mapping.dmp
-
memory/1500-75-0x0000000000000000-mapping.dmp
-
memory/1504-180-0x0000000000000000-mapping.dmp
-
memory/1504-70-0x0000000000000000-mapping.dmp
-
memory/1508-164-0x0000000000000000-mapping.dmp
-
memory/1516-182-0x0000000000000000-mapping.dmp
-
memory/1524-53-0x0000000000000000-mapping.dmp
-
memory/1524-190-0x0000000000000000-mapping.dmp
-
memory/1524-111-0x0000000000000000-mapping.dmp
-
memory/1544-143-0x0000000000000000-mapping.dmp
-
memory/1548-131-0x0000000000000000-mapping.dmp
-
memory/1556-125-0x0000000000000000-mapping.dmp
-
memory/1556-69-0x0000000000000000-mapping.dmp
-
memory/1668-156-0x0000000000000000-mapping.dmp
-
memory/1708-153-0x0000000000000000-mapping.dmp
-
memory/1708-138-0x0000000000000000-mapping.dmp
-
memory/1736-61-0x0000000000000000-mapping.dmp
-
memory/1736-133-0x0000000000000000-mapping.dmp
-
memory/1736-175-0x0000000000000000-mapping.dmp
-
memory/1736-19-0x0000000000000000-mapping.dmp
-
memory/1740-46-0x0000000000000000-mapping.dmp
-
memory/1740-78-0x0000000000000000-mapping.dmp
-
memory/1740-14-0x0000000000000000-mapping.dmp
-
memory/1744-34-0x0000000000000000-mapping.dmp
-
memory/1752-169-0x0000000000000000-mapping.dmp
-
memory/1752-126-0x0000000000000000-mapping.dmp
-
memory/1756-83-0x0000000000000000-mapping.dmp
-
memory/1756-39-0x0000000000000000-mapping.dmp
-
memory/1760-165-0x0000000000000000-mapping.dmp
-
memory/1760-1-0x0000000000000000-mapping.dmp
-
memory/1768-94-0x0000000000000000-mapping.dmp
-
memory/1772-168-0x0000000000000000-mapping.dmp
-
memory/1772-127-0x0000000000000000-mapping.dmp
-
memory/1776-10-0x0000000000000000-mapping.dmp
-
memory/1776-88-0x0000000000000000-mapping.dmp
-
memory/1780-36-0x0000000000000000-mapping.dmp
-
memory/1780-3-0x0000000000000000-mapping.dmp
-
memory/1780-113-0x0000000000000000-mapping.dmp
-
memory/1780-68-0x0000000000000000-mapping.dmp
-
memory/1780-141-0x0000000000000000-mapping.dmp
-
memory/1792-22-0x0000000000000000-mapping.dmp
-
memory/1792-159-0x0000000000000000-mapping.dmp
-
memory/1792-54-0x0000000000000000-mapping.dmp
-
memory/1792-104-0x0000000000000000-mapping.dmp
-
memory/1824-109-0x0000000000000000-mapping.dmp
-
memory/1824-62-0x0000000000000000-mapping.dmp
-
memory/1824-30-0x0000000000000000-mapping.dmp
-
memory/1828-18-0x0000000000000000-mapping.dmp
-
memory/1832-116-0x0000000000000000-mapping.dmp
-
memory/1836-196-0x000007FEF8040000-0x000007FEF82BA000-memory.dmpFilesize
2.5MB
-
memory/1836-145-0x0000000000000000-mapping.dmp
-
memory/1836-89-0x0000000000000000-mapping.dmp
-
memory/1840-121-0x0000000000000000-mapping.dmp
-
memory/1848-45-0x0000000000000000-mapping.dmp
-
memory/1848-184-0x0000000000000000-mapping.dmp
-
memory/1868-123-0x0000000000000000-mapping.dmp
-
memory/1936-101-0x0000000000000000-mapping.dmp
-
memory/1936-193-0x0000000000000000-mapping.dmp
-
memory/1952-29-0x0000000000000000-mapping.dmp
-
memory/1952-71-0x0000000000000000-mapping.dmp
-
memory/1972-157-0x0000000000000000-mapping.dmp
-
memory/1972-15-0x0000000000000000-mapping.dmp
-
memory/1996-33-0x0000000000000000-mapping.dmp
-
memory/1996-144-0x0000000000000000-mapping.dmp
-
memory/1996-173-0x0000000000000000-mapping.dmp
-
memory/2000-102-0x0000000000000000-mapping.dmp
-
memory/2000-2-0x0000000000000000-mapping.dmp
-
memory/2008-115-0x0000000000000000-mapping.dmp
-
memory/2008-129-0x0000000000000000-mapping.dmp
-
memory/2016-183-0x0000000000000000-mapping.dmp
-
memory/2016-103-0x0000000000000000-mapping.dmp
-
memory/2016-154-0x0000000000000000-mapping.dmp
-
memory/2024-48-0x0000000000000000-mapping.dmp
-
memory/2024-16-0x0000000000000000-mapping.dmp
-
memory/2036-57-0x0000000000000000-mapping.dmp
-
memory/2036-87-0x0000000000000000-mapping.dmp
-
memory/2044-122-0x0000000000000000-mapping.dmp
-
memory/2044-51-0x0000000000000000-mapping.dmp