Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-05-2022 12:39
Behavioral task
behavioral1
Sample
Cancellation-1228813013$-May5.xlsb
Resource
win7-20220414-en
General
-
Target
Cancellation-1228813013$-May5.xlsb
-
Size
65KB
-
MD5
4ed18e5cf0345e1fec51922960217b52
-
SHA1
1dd2279ce4c569ff462884c1a283c6c9d5505dc7
-
SHA256
8aa260005950bb9d062fa127e0f7fa615b02fafb15000cac4ff52e4aa97f1d16
-
SHA512
df53c2ce7788cbce925014ce03c6efbb6e4354c73b9fe14615e5a3798203d18dc0f67117602472c2743e043f51993e4327334ac90fd0de185708a0c9bf3a89f3
Malware Config
Extracted
Extracted
qakbot
403.683
obama182
1651756499
103.107.113.120:443
80.11.74.81:2222
177.102.2.175:32101
24.178.196.158:2222
91.177.173.10:995
181.208.248.227:443
176.67.56.94:443
202.134.152.2:2222
148.0.57.85:443
179.179.162.9:993
40.134.246.185:995
37.186.54.254:995
196.203.37.215:80
120.150.218.241:995
208.107.221.224:443
113.53.151.59:443
70.46.220.114:443
69.14.172.24:443
108.60.213.141:443
24.55.67.176:443
74.14.7.71:2222
103.246.242.202:443
172.115.177.204:2222
24.152.219.253:995
197.83.230.61:443
38.70.253.226:2222
217.165.84.177:993
118.161.34.21:443
194.36.28.102:443
32.221.224.140:995
39.33.170.57:995
81.215.196.174:443
24.139.72.117:443
113.110.253.185:995
187.207.47.198:61202
203.122.46.130:443
79.129.121.68:995
140.82.49.12:443
47.23.89.62:993
86.132.13.91:2078
75.99.168.194:443
41.228.22.180:443
148.64.96.100:443
2.50.4.57:443
67.209.195.198:443
217.128.122.65:2222
5.32.41.45:443
179.158.105.44:443
46.107.48.202:443
183.82.103.213:443
103.139.243.207:990
72.76.94.99:443
76.70.9.169:2222
93.48.80.198:995
82.152.39.39:443
2.34.12.8:443
92.132.172.197:2222
75.99.168.194:61201
89.86.33.217:443
88.228.251.169:443
120.61.3.169:443
85.246.82.244:443
89.211.182.31:2222
103.87.95.133:2222
173.174.216.62:443
86.98.208.214:2222
174.69.215.101:443
89.101.97.139:443
63.143.92.99:995
37.34.253.233:443
86.195.158.178:2222
144.202.3.39:995
144.202.2.175:995
45.63.1.12:443
149.28.238.199:443
140.82.63.183:995
144.202.3.39:443
140.82.63.183:443
45.63.1.12:995
149.28.238.199:995
144.202.2.175:443
45.76.167.26:443
45.76.167.26:995
94.36.195.102:2222
141.237.86.114:995
118.161.34.21:995
105.99.204.185:443
90.120.65.153:2078
2.50.17.128:2222
58.105.167.36:50000
189.146.78.175:443
104.34.212.7:32103
76.25.142.196:443
173.21.10.71:2222
73.151.236.31:443
67.165.206.193:993
45.46.53.140:2222
191.99.191.28:443
180.129.20.164:995
149.135.101.20:443
31.35.28.29:443
187.208.0.99:443
201.142.133.198:443
82.41.63.217:443
201.172.23.68:2222
72.252.157.172:990
190.252.242.69:443
70.51.152.61:2222
217.118.46.41:2222
72.252.157.172:995
5.193.104.246:2222
100.1.108.246:443
187.102.135.141:2222
47.156.191.217:443
2.191.231.178:443
109.12.111.14:443
41.215.151.247:995
103.157.122.130:21
96.37.113.36:993
186.64.67.8:443
67.69.166.79:2222
121.74.167.191:995
190.36.233.41:2222
68.204.7.158:443
197.94.84.67:443
106.51.48.170:50001
72.66.116.235:995
72.12.115.78:22
103.139.243.207:993
89.137.52.44:443
191.34.199.46:443
98.50.191.202:443
96.45.66.216:61202
102.182.232.3:995
84.241.8.23:32103
172.114.160.81:995
217.164.117.87:1194
45.9.20.200:443
47.23.89.62:995
187.172.191.97:443
24.43.99.75:443
103.88.226.30:443
182.191.92.203:995
39.44.144.64:995
45.241.254.110:993
39.57.56.19:995
121.7.223.59:2222
94.140.8.55:2222
172.114.160.81:443
39.49.69.112:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 936 924 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4004 924 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3240 924 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1548 924 regsvr32.exe EXCEL.EXE -
Downloads MZ/PE file
-
Loads dropped DLL 3 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3908 regsvr32.exe 3908 regsvr32.exe 1392 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\2d4286cf = 29e2c6c3412f6aa4f2184754df3f353d90decd64843ebf9416169fbc9b4fe3879f2ecce2c034b9badff3d5d3bd9bc2133c95b84a1de56b10fd33f3a290c4a5f1a7bf55514cba2231 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\520be939 = c9a60384c08382e07ce336f088ee8af7c8c04085f746 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\dd697e6e = bed3822d4dfca370b6e0682ff1ce8d904c5d08fb5c98483393b2b6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\a06131e4 = 36046cc0022a1213657dce560d02a9d861855f64f33f0ec55225e2d9b0eb451b5eab13ebca5946c468994b9eda0f8376b902ff495e71f5bfa3b24ebf3cc8619f03fe82d1888e057e6a1dcbc16f4572a71acd1849d54652cc00978461 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\df285e12 = 0e9b0e2a1ec2da750d2393a3912c39d25861764a8032861d492e56fe25c9ee281ea5e6ccf5952f87be8f169d992c808ad65d4526b438c4523e17f109f9096ec61fd8b63bdd7478ba962d8c72ec6322f4ff9d72c408 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\520be939 = c9a61484c083b74954d949ac6cc612c3d55c2c6861ce7770eb17439bf099169154b44f7480afda2661017d explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\67943977 = 4b0e04b481eb6e7bb4ee6c8bcff7f3a7309a7dc1c0e78d5a0b7de64a7ff4713adc55af4c1f90baf1cee07ddb6775b9ee0e8affe4ee6ee4c11474b236e4fcb0bf6b9fedca5df5bab904d3861b098e6349d13d42483f3ab5786feba52895ded8620c42d9447db3f87de2e880bac00e907e93a656707da4d33cf506e4c47ee9d75a07c89f32b3ae75c2b6ec28ce10de43c20d50488c71fb04dc5ce4fd7eec explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\65d5190b = af411b5e691ff792baa86a17ccc93e5f9d295884ca2a9a50d1cc913d964205d64bda13d67880ba826840c6a9b45d39898ae3338de0a8c265f181c3398f66b0b3505dbd84c91f681431b1cdb5b3 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Ugvmujzqvr\18dd5681 = aa90421c1dc6a2c766ae2d54510900f2f16eb88de7caeea3e98cb9d73b0d56a2cafe3de68bf20289e7906c4a36 explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 924 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exepid process 3908 regsvr32.exe 3908 regsvr32.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe 3856 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 3908 regsvr32.exe 1392 regsvr32.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
EXCEL.EXEpid process 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE 924 EXCEL.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 924 wrote to memory of 936 924 EXCEL.EXE regsvr32.exe PID 924 wrote to memory of 936 924 EXCEL.EXE regsvr32.exe PID 924 wrote to memory of 4004 924 EXCEL.EXE regsvr32.exe PID 924 wrote to memory of 4004 924 EXCEL.EXE regsvr32.exe PID 4004 wrote to memory of 3908 4004 regsvr32.exe regsvr32.exe PID 4004 wrote to memory of 3908 4004 regsvr32.exe regsvr32.exe PID 4004 wrote to memory of 3908 4004 regsvr32.exe regsvr32.exe PID 3908 wrote to memory of 3856 3908 regsvr32.exe explorer.exe PID 3908 wrote to memory of 3856 3908 regsvr32.exe explorer.exe PID 3908 wrote to memory of 3856 3908 regsvr32.exe explorer.exe PID 3908 wrote to memory of 3856 3908 regsvr32.exe explorer.exe PID 3908 wrote to memory of 3856 3908 regsvr32.exe explorer.exe PID 924 wrote to memory of 3240 924 EXCEL.EXE regsvr32.exe PID 924 wrote to memory of 3240 924 EXCEL.EXE regsvr32.exe PID 924 wrote to memory of 1548 924 EXCEL.EXE regsvr32.exe PID 924 wrote to memory of 1548 924 EXCEL.EXE regsvr32.exe PID 3856 wrote to memory of 1172 3856 explorer.exe schtasks.exe PID 3856 wrote to memory of 1172 3856 explorer.exe schtasks.exe PID 3856 wrote to memory of 1172 3856 explorer.exe schtasks.exe PID 1804 wrote to memory of 1392 1804 regsvr32.exe regsvr32.exe PID 1804 wrote to memory of 1392 1804 regsvr32.exe regsvr32.exe PID 1804 wrote to memory of 1392 1804 regsvr32.exe regsvr32.exe PID 1392 wrote to memory of 3708 1392 regsvr32.exe explorer.exe PID 1392 wrote to memory of 3708 1392 regsvr32.exe explorer.exe PID 1392 wrote to memory of 3708 1392 regsvr32.exe explorer.exe PID 1392 wrote to memory of 3708 1392 regsvr32.exe explorer.exe PID 1392 wrote to memory of 3708 1392 regsvr32.exe explorer.exe PID 3708 wrote to memory of 4320 3708 explorer.exe reg.exe PID 3708 wrote to memory of 4320 3708 explorer.exe reg.exe PID 3708 wrote to memory of 1204 3708 explorer.exe reg.exe PID 3708 wrote to memory of 1204 3708 explorer.exe reg.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Cancellation-1228813013$-May5.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s calc2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Merto\Byrost\Veonse.OOOCCCXXX2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Merto\Byrost\Veonse.OOOCCCXXX3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn nhytxhtw /tr "regsvr32.exe -s \"C:\Merto\Byrost\Veonse.OOOCCCXXX\"" /SC ONCE /Z /ST 14:42 /ET 14:545⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Merto\Byrost\Veonsea.OOOCCCXXX2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Merto\Byrost\Veonseb.OOOCCCXXX2⤵
- Process spawned unexpected child process
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Merto\Byrost\Veonse.OOOCCCXXX"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Merto\Byrost\Veonse.OOOCCCXXX"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Ozaze" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Yjntrponbv" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD55a49dbfaa8b7ae74bd5bbbdbca791e1c
SHA17709845bfa39b4e48be26fe609908fe72ee0f658
SHA256ef7a23ebe3be9c2fa37d399f0056ed5cd9e4376aa0b45cbce7d04435be61a531
SHA5126fa67a6cec117ab63bc98e1695c9c86b4b459ba4edd733be55729c0287049e84dd3fe48d5eb1883c52da964cb56f91e9611550384a56c04f73081b38b95841cb
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD55a49dbfaa8b7ae74bd5bbbdbca791e1c
SHA17709845bfa39b4e48be26fe609908fe72ee0f658
SHA256ef7a23ebe3be9c2fa37d399f0056ed5cd9e4376aa0b45cbce7d04435be61a531
SHA5126fa67a6cec117ab63bc98e1695c9c86b4b459ba4edd733be55729c0287049e84dd3fe48d5eb1883c52da964cb56f91e9611550384a56c04f73081b38b95841cb
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD55a49dbfaa8b7ae74bd5bbbdbca791e1c
SHA17709845bfa39b4e48be26fe609908fe72ee0f658
SHA256ef7a23ebe3be9c2fa37d399f0056ed5cd9e4376aa0b45cbce7d04435be61a531
SHA5126fa67a6cec117ab63bc98e1695c9c86b4b459ba4edd733be55729c0287049e84dd3fe48d5eb1883c52da964cb56f91e9611550384a56c04f73081b38b95841cb
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD55a49dbfaa8b7ae74bd5bbbdbca791e1c
SHA17709845bfa39b4e48be26fe609908fe72ee0f658
SHA256ef7a23ebe3be9c2fa37d399f0056ed5cd9e4376aa0b45cbce7d04435be61a531
SHA5126fa67a6cec117ab63bc98e1695c9c86b4b459ba4edd733be55729c0287049e84dd3fe48d5eb1883c52da964cb56f91e9611550384a56c04f73081b38b95841cb
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD55a49dbfaa8b7ae74bd5bbbdbca791e1c
SHA17709845bfa39b4e48be26fe609908fe72ee0f658
SHA256ef7a23ebe3be9c2fa37d399f0056ed5cd9e4376aa0b45cbce7d04435be61a531
SHA5126fa67a6cec117ab63bc98e1695c9c86b4b459ba4edd733be55729c0287049e84dd3fe48d5eb1883c52da964cb56f91e9611550384a56c04f73081b38b95841cb
-
memory/924-136-0x00007FF9BA220000-0x00007FF9BA230000-memory.dmpFilesize
64KB
-
memory/924-130-0x00007FF9BC5B0000-0x00007FF9BC5C0000-memory.dmpFilesize
64KB
-
memory/924-131-0x00007FF9BC5B0000-0x00007FF9BC5C0000-memory.dmpFilesize
64KB
-
memory/924-135-0x00007FF9BA220000-0x00007FF9BA230000-memory.dmpFilesize
64KB
-
memory/924-134-0x00007FF9BC5B0000-0x00007FF9BC5C0000-memory.dmpFilesize
64KB
-
memory/924-133-0x00007FF9BC5B0000-0x00007FF9BC5C0000-memory.dmpFilesize
64KB
-
memory/924-132-0x00007FF9BC5B0000-0x00007FF9BC5C0000-memory.dmpFilesize
64KB
-
memory/936-137-0x0000000000000000-mapping.dmp
-
memory/1172-150-0x0000000000000000-mapping.dmp
-
memory/1204-160-0x0000000000000000-mapping.dmp
-
memory/1392-157-0x0000000001F40000-0x0000000001F62000-memory.dmpFilesize
136KB
-
memory/1392-156-0x0000000001EF0000-0x0000000001F12000-memory.dmpFilesize
136KB
-
memory/1392-155-0x0000000001F40000-0x0000000001F62000-memory.dmpFilesize
136KB
-
memory/1392-153-0x0000000000000000-mapping.dmp
-
memory/1548-149-0x0000000000000000-mapping.dmp
-
memory/3240-148-0x0000000000000000-mapping.dmp
-
memory/3708-158-0x0000000000000000-mapping.dmp
-
memory/3708-161-0x0000000000EA0000-0x0000000000EC2000-memory.dmpFilesize
136KB
-
memory/3856-147-0x0000000000000000-mapping.dmp
-
memory/3856-151-0x0000000000930000-0x0000000000952000-memory.dmpFilesize
136KB
-
memory/3908-146-0x0000000002130000-0x0000000002152000-memory.dmpFilesize
136KB
-
memory/3908-145-0x00000000020E0000-0x0000000002102000-memory.dmpFilesize
136KB
-
memory/3908-144-0x0000000002130000-0x0000000002152000-memory.dmpFilesize
136KB
-
memory/3908-143-0x0000000001FD0000-0x00000000020AA000-memory.dmpFilesize
872KB
-
memory/3908-140-0x0000000000000000-mapping.dmp
-
memory/4004-138-0x0000000000000000-mapping.dmp
-
memory/4320-159-0x0000000000000000-mapping.dmp