Analysis
-
max time kernel
112s -
max time network
120s -
platform
windows7_x64 -
resource
win7 -
submitted
23-07-2020 13:40
Static task
static1
Behavioral task
behavioral1
Sample
build-x32.crypt.bin.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
build-x32.crypt.bin.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
build-x32.crypt.bin.exe
Score
10/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs
-
Deletes itself 1 IoCs
Processes:
cmd.exepid process 292 cmd.exe -
Kills process with taskkill 91 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1720 taskkill.exe 1544 taskkill.exe 1660 taskkill.exe 1128 taskkill.exe 1860 taskkill.exe 1960 taskkill.exe 1616 taskkill.exe 2036 taskkill.exe 1396 taskkill.exe 1764 taskkill.exe 528 taskkill.exe 1760 taskkill.exe 1440 taskkill.exe 1664 taskkill.exe 1432 taskkill.exe 1088 taskkill.exe 2036 taskkill.exe 1696 taskkill.exe 1584 taskkill.exe 1668 taskkill.exe 668 taskkill.exe 432 taskkill.exe 1592 taskkill.exe 1076 taskkill.exe 1440 taskkill.exe 1760 taskkill.exe 1584 taskkill.exe 1948 taskkill.exe 1856 taskkill.exe 1648 taskkill.exe 2008 taskkill.exe 2040 taskkill.exe 1940 taskkill.exe 1440 taskkill.exe 1696 taskkill.exe 1860 taskkill.exe 316 taskkill.exe 1852 taskkill.exe 2008 taskkill.exe 1108 taskkill.exe 656 taskkill.exe 528 taskkill.exe 1396 taskkill.exe 432 taskkill.exe 2008 taskkill.exe 1916 taskkill.exe 1604 taskkill.exe 1568 taskkill.exe 1536 taskkill.exe 1580 taskkill.exe 1656 taskkill.exe 1608 taskkill.exe 1212 taskkill.exe 1544 taskkill.exe 1916 taskkill.exe 1964 taskkill.exe 1128 taskkill.exe 1760 taskkill.exe 1956 taskkill.exe 1536 taskkill.exe 1856 taskkill.exe 1356 taskkill.exe 1820 taskkill.exe 1580 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 358 IoCs
Processes:
build-x32.crypt.bin.exepid process 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe 1124 build-x32.crypt.bin.exe -
Modifies service 2 TTPs 4 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1816 vssadmin.exe -
Modifies extensions of user files 11 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
build-x32.crypt.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\ResumeAssert.crw => C:\Users\Admin\Pictures\ResumeAssert.crw.UVvemj build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\ResumeAssert.crw.UVvemj build-x32.crypt.bin.exe File renamed C:\Users\Admin\Pictures\SwitchImport.png => C:\Users\Admin\Pictures\SwitchImport.png.UVvemj build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\SwitchImport.png.UVvemj build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\DisableInitialize.crw.UVvemj build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\EditExpand.png.UVvemj build-x32.crypt.bin.exe File renamed C:\Users\Admin\Pictures\InvokeConvert.tiff => C:\Users\Admin\Pictures\InvokeConvert.tiff.UVvemj build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\InvokeConvert.tiff.UVvemj build-x32.crypt.bin.exe File renamed C:\Users\Admin\Pictures\DisableInitialize.crw => C:\Users\Admin\Pictures\DisableInitialize.crw.UVvemj build-x32.crypt.bin.exe File renamed C:\Users\Admin\Pictures\EditExpand.png => C:\Users\Admin\Pictures\EditExpand.png.UVvemj build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\InvokeConvert.tiff build-x32.crypt.bin.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
build-x32.crypt.bin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d.bmp" build-x32.crypt.bin.exe -
NTFS ADS 5 IoCs
Processes:
build-x32.crypt.bin.exedescription ioc process File created C:\Users\Admin\AppData\Local\Temp\boot.sys:ftztnzezfosqioqjq build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:qncbeovltenni build-x32.crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:uzkcayivo build-x32.crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:fwsjvisltoiwhlkd build-x32.crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:uzkcayivo build-x32.crypt.bin.exe -
Exorcist
Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 792 timeout.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Suspicious use of WriteProcessMemory 772 IoCs
Processes:
build-x32.crypt.bin.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 1124 wrote to memory of 1312 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1312 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1312 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1312 1124 build-x32.crypt.bin.exe cmd.exe PID 1312 wrote to memory of 1476 1312 cmd.exe WMIC.exe PID 1312 wrote to memory of 1476 1312 cmd.exe WMIC.exe PID 1312 wrote to memory of 1476 1312 cmd.exe WMIC.exe PID 1312 wrote to memory of 1476 1312 cmd.exe WMIC.exe PID 1124 wrote to memory of 1096 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1096 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1096 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1096 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1536 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1536 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1536 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1536 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1720 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1720 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1720 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1720 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1824 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1824 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1824 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1824 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1808 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1808 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1808 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1808 1124 build-x32.crypt.bin.exe cmd.exe PID 1808 wrote to memory of 1816 1808 cmd.exe vssadmin.exe PID 1808 wrote to memory of 1816 1808 cmd.exe vssadmin.exe PID 1808 wrote to memory of 1816 1808 cmd.exe vssadmin.exe PID 1808 wrote to memory of 1816 1808 cmd.exe vssadmin.exe PID 1124 wrote to memory of 1660 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1660 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1660 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1660 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1608 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1608 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1608 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1608 1124 build-x32.crypt.bin.exe cmd.exe PID 1608 wrote to memory of 1644 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1644 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1644 1608 cmd.exe taskkill.exe PID 1608 wrote to memory of 1644 1608 cmd.exe taskkill.exe PID 1124 wrote to memory of 1868 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1868 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1868 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1868 1124 build-x32.crypt.bin.exe cmd.exe PID 1868 wrote to memory of 1948 1868 cmd.exe taskkill.exe PID 1868 wrote to memory of 1948 1868 cmd.exe taskkill.exe PID 1868 wrote to memory of 1948 1868 cmd.exe taskkill.exe PID 1868 wrote to memory of 1948 1868 cmd.exe taskkill.exe PID 1124 wrote to memory of 1972 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1972 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1972 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 1972 1124 build-x32.crypt.bin.exe cmd.exe PID 1972 wrote to memory of 1028 1972 cmd.exe taskkill.exe PID 1972 wrote to memory of 1028 1972 cmd.exe taskkill.exe PID 1972 wrote to memory of 1028 1972 cmd.exe taskkill.exe PID 1972 wrote to memory of 1028 1972 cmd.exe taskkill.exe PID 1124 wrote to memory of 2020 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 2020 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 2020 1124 build-x32.crypt.bin.exe cmd.exe PID 1124 wrote to memory of 2020 1124 build-x32.crypt.bin.exe cmd.exe -
Suspicious use of AdjustPrivilegeToken 131 IoCs
Processes:
WMIC.exevssvc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeIncreaseQuotaPrivilege 1476 WMIC.exe Token: SeSecurityPrivilege 1476 WMIC.exe Token: SeTakeOwnershipPrivilege 1476 WMIC.exe Token: SeLoadDriverPrivilege 1476 WMIC.exe Token: SeSystemProfilePrivilege 1476 WMIC.exe Token: SeSystemtimePrivilege 1476 WMIC.exe Token: SeProfSingleProcessPrivilege 1476 WMIC.exe Token: SeIncBasePriorityPrivilege 1476 WMIC.exe Token: SeCreatePagefilePrivilege 1476 WMIC.exe Token: SeBackupPrivilege 1476 WMIC.exe Token: SeRestorePrivilege 1476 WMIC.exe Token: SeShutdownPrivilege 1476 WMIC.exe Token: SeDebugPrivilege 1476 WMIC.exe Token: SeSystemEnvironmentPrivilege 1476 WMIC.exe Token: SeRemoteShutdownPrivilege 1476 WMIC.exe Token: SeUndockPrivilege 1476 WMIC.exe Token: SeManageVolumePrivilege 1476 WMIC.exe Token: 33 1476 WMIC.exe Token: 34 1476 WMIC.exe Token: 35 1476 WMIC.exe Token: SeIncreaseQuotaPrivilege 1476 WMIC.exe Token: SeSecurityPrivilege 1476 WMIC.exe Token: SeTakeOwnershipPrivilege 1476 WMIC.exe Token: SeLoadDriverPrivilege 1476 WMIC.exe Token: SeSystemProfilePrivilege 1476 WMIC.exe Token: SeSystemtimePrivilege 1476 WMIC.exe Token: SeProfSingleProcessPrivilege 1476 WMIC.exe Token: SeIncBasePriorityPrivilege 1476 WMIC.exe Token: SeCreatePagefilePrivilege 1476 WMIC.exe Token: SeBackupPrivilege 1476 WMIC.exe Token: SeRestorePrivilege 1476 WMIC.exe Token: SeShutdownPrivilege 1476 WMIC.exe Token: SeDebugPrivilege 1476 WMIC.exe Token: SeSystemEnvironmentPrivilege 1476 WMIC.exe Token: SeRemoteShutdownPrivilege 1476 WMIC.exe Token: SeUndockPrivilege 1476 WMIC.exe Token: SeManageVolumePrivilege 1476 WMIC.exe Token: 33 1476 WMIC.exe Token: 34 1476 WMIC.exe Token: 35 1476 WMIC.exe Token: SeBackupPrivilege 744 vssvc.exe Token: SeRestorePrivilege 744 vssvc.exe Token: SeAuditPrivilege 744 vssvc.exe Token: SeDebugPrivilege 1644 taskkill.exe Token: SeDebugPrivilege 1948 taskkill.exe Token: SeDebugPrivilege 1028 taskkill.exe Token: SeDebugPrivilege 1500 taskkill.exe Token: SeDebugPrivilege 1092 taskkill.exe Token: SeDebugPrivilege 1108 taskkill.exe Token: SeDebugPrivilege 1720 taskkill.exe Token: SeDebugPrivilege 1760 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 1960 taskkill.exe Token: SeDebugPrivilege 284 taskkill.exe Token: SeDebugPrivilege 2008 taskkill.exe Token: SeDebugPrivilege 1580 taskkill.exe Token: SeDebugPrivilege 1548 taskkill.exe Token: SeDebugPrivilege 1828 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 1592 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe Token: SeDebugPrivilege 2040 taskkill.exe Token: SeDebugPrivilege 2024 taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build-x32.crypt.bin.exe"C:\Users\Admin\AppData\Local\Temp\build-x32.crypt.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Modifies extensions of user files
- Sets desktop wallpaper using registry
- NTFS ADS
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /C wmic.exe SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\WMIC.exewmic.exe SHADOWCOPY DELETE /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C bcdedit.exe /set {default} recoveryenabled No2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\cmd.execmd /C C:\Windows\system32\vssvc.exe2⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM wxServer*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM wxServer*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBFCService*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBFCService*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBVSS*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBVSS*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sql*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sql*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM msaccess*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM msaccess*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM mssql*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM mssql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM mysql*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM mysql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM wxServerView*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM wxServerView*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sqlmangr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sqlmangr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM RAgui*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM RAgui*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM supervise*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM supervise*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Culture*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Culture*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Defwatch*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Defwatch*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM winword*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM winword*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBW32*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBW32*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBDBMgr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBDBMgr*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM qbupdate*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM qbupdate*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM axlbridge*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM axlbridge*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM httpd*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM httpd*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM fdlauncher*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM fdlauncher*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MsDtSrvr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MsDtSrvr*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM java*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM java*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM 360se*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM 360se*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM 360doctor*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM 360doctor*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM wdswfsafe*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM wdswfsafe*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM fdhost*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM fdhost*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM GDscan*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM GDscan*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM ZhuDongFangYu*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM ZhuDongFangYu*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBDBMgrN*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBDBMgrN*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM mysqld*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM mysqld*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM AutodeskDesktopApp*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM AutodeskDesktopApp*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM acwebbrowser*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM acwebbrowser*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Creative Cloud*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Creative Cloud*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Adobe Desktop Service*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Adobe Desktop Service*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM CoreSync*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM CoreSync*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Adobe CEF Helper*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Adobe CEF Helper*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM node*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM node*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM AdobeIPCBroker*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM AdobeIPCBroker*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sync-taskbar*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sync-taskbar*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sync-worker*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sync-worker*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM InputPersonalization*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM InputPersonalization*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM AdobeCollabSync*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM AdobeCollabSync*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM BrCtrlCntr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM BrCtrlCntr*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM BrCcUxSys*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM BrCcUxSys*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SimplyConnectionManager*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SimplyConnectionManager*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Simply.SystemTrayIcon*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Simply.SystemTrayIcon*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM fbguard*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM fbguard*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM fbserver*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM fbserver*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM ONENOTEM*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM ONENOTEM*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM wrapper*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM wrapper*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM DefWatch*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM DefWatch*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM ccEvtMgr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM ccEvtMgr*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM ccSetMgr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM ccSetMgr*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SavRoam*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SavRoam*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Sqlservr*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Sqlservr*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sqlagent*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sqlagent*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sqladhlp*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sqladhlp*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Culserver*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Culserver*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM RTVscan*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM RTVscan*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sqlbrowser*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sqlbrowser*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLADHLP*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLADHLP*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBIDPService*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBIDPService*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM Intuit.QuickBooks.FCS*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM Intuit.QuickBooks.FCS*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM QBCFMonitorService*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM QBCFMonitorService*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM sqlwriter*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM sqlwriter*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM msmdsrv*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM msmdsrv*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM tomcat6*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM tomcat6*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM zhudongfangyu*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM zhudongfangyu*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM vmware-usbarbitator64*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM vmware-usbarbitator64*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM vmware-converter*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM vmware-converter*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM dbsrv12*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM dbsrv12*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM dbeng8*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM dbeng8*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$VEEAMSQL2012*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLAgent$VEEAMSQL2012*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLAgent$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLBrowser*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLBrowser*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLWriter*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLWriter*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM FishbowlMySQL*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM FishbowlMySQL*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MySQL57*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MySQL57*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQLServerADHelper100*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQLServerADHelper100*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM msftesql-Exchange*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM msftesql-Exchange*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##SSEE*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##SSEE*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$SBSMONITORING*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQL$SHAREPOINT*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQL$SHAREPOINT*3⤵
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLAgent$SBSMONITORING*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLAgent$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.execmd /C taskkill /F /T /IM SQLAgent$SHAREPOINT*2⤵
-
C:\Windows\SysWOW64\taskkill.exetaskkill /F /T /IM SQLAgent$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /T 15 /NOBREAK && del "C:\Users\Admin\AppData\Local\Temp\build-x32.crypt.bin.exe" /F2⤵
- Deletes itself
-
C:\Windows\SysWOW64\timeout.exetimeout /T 15 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/284-47-0x0000000000000000-mapping.dmp
-
memory/284-30-0x0000000000000000-mapping.dmp
-
memory/284-181-0x0000000000000000-mapping.dmp
-
memory/292-191-0x0000000000000000-mapping.dmp
-
memory/292-52-0x0000000000000000-mapping.dmp
-
memory/292-69-0x0000000000000000-mapping.dmp
-
memory/316-152-0x0000000000000000-mapping.dmp
-
memory/432-180-0x0000000000000000-mapping.dmp
-
memory/432-140-0x0000000000000000-mapping.dmp
-
memory/520-182-0x0000000000000000-mapping.dmp
-
memory/520-142-0x0000000000000000-mapping.dmp
-
memory/528-120-0x0000000000000000-mapping.dmp
-
memory/528-100-0x0000000000000000-mapping.dmp
-
memory/576-168-0x0000000000000000-mapping.dmp
-
memory/656-88-0x0000000000000000-mapping.dmp
-
memory/668-166-0x0000000000000000-mapping.dmp
-
memory/792-192-0x0000000000000000-mapping.dmp
-
memory/884-99-0x0000000000000000-mapping.dmp
-
memory/884-139-0x0000000000000000-mapping.dmp
-
memory/1028-31-0x0000000000000000-mapping.dmp
-
memory/1028-66-0x0000000000000000-mapping.dmp
-
memory/1028-14-0x0000000000000000-mapping.dmp
-
memory/1076-128-0x0000000000000000-mapping.dmp
-
memory/1076-108-0x0000000000000000-mapping.dmp
-
memory/1088-111-0x0000000000000000-mapping.dmp
-
memory/1088-54-0x0000000000000000-mapping.dmp
-
memory/1088-71-0x0000000000000000-mapping.dmp
-
memory/1088-92-0x0000000000000000-mapping.dmp
-
memory/1092-18-0x0000000000000000-mapping.dmp
-
memory/1092-35-0x0000000000000000-mapping.dmp
-
memory/1096-2-0x0000000000000000-mapping.dmp
-
memory/1108-37-0x0000000000000000-mapping.dmp
-
memory/1108-149-0x0000000000000000-mapping.dmp
-
memory/1108-20-0x0000000000000000-mapping.dmp
-
memory/1128-148-0x0000000000000000-mapping.dmp
-
memory/1128-188-0x0000000000000000-mapping.dmp
-
memory/1212-68-0x0000000000000000-mapping.dmp
-
memory/1312-0-0x0000000000000000-mapping.dmp
-
memory/1352-185-0x0000000000000000-mapping.dmp
-
memory/1356-126-0x0000000000000000-mapping.dmp
-
memory/1356-106-0x0000000000000000-mapping.dmp
-
memory/1364-145-0x0000000000000000-mapping.dmp
-
memory/1368-151-0x0000000000000000-mapping.dmp
-
memory/1376-131-0x0000000000000000-mapping.dmp
-
memory/1392-163-0x0000000000000000-mapping.dmp
-
memory/1396-74-0x0000000000000000-mapping.dmp
-
memory/1396-114-0x0000000000000000-mapping.dmp
-
memory/1396-93-0x0000000000000000-mapping.dmp
-
memory/1432-90-0x0000000000000000-mapping.dmp
-
memory/1432-17-0x0000000000000000-mapping.dmp
-
memory/1432-127-0x0000000000000000-mapping.dmp
-
memory/1436-19-0x0000000000000000-mapping.dmp
-
memory/1440-122-0x0000000000000000-mapping.dmp
-
memory/1440-162-0x0000000000000000-mapping.dmp
-
memory/1440-102-0x0000000000000000-mapping.dmp
-
memory/1476-1-0x0000000000000000-mapping.dmp
-
memory/1500-16-0x0000000000000000-mapping.dmp
-
memory/1500-33-0x0000000000000000-mapping.dmp
-
memory/1508-157-0x0000000000000000-mapping.dmp
-
memory/1512-21-0x0000000000000000-mapping.dmp
-
memory/1512-73-0x0000000000000000-mapping.dmp
-
memory/1512-56-0x0000000000000000-mapping.dmp
-
memory/1512-171-0x0000000000000000-mapping.dmp
-
memory/1520-159-0x0000000000000000-mapping.dmp
-
memory/1524-84-0x0000000000000000-mapping.dmp
-
memory/1536-164-0x0000000000000000-mapping.dmp
-
memory/1536-3-0x0000000000000000-mapping.dmp
-
memory/1536-86-0x0000000000000000-mapping.dmp
-
memory/1540-183-0x0000000000000000-mapping.dmp
-
memory/1544-130-0x0000000000000000-mapping.dmp
-
memory/1544-110-0x0000000000000000-mapping.dmp
-
memory/1544-72-0x0000000000000000-mapping.dmp
-
memory/1548-36-0x0000000000000000-mapping.dmp
-
memory/1548-147-0x0000000000000000-mapping.dmp
-
memory/1548-53-0x0000000000000000-mapping.dmp
-
memory/1560-95-0x0000000000000000-mapping.dmp
-
memory/1560-135-0x0000000000000000-mapping.dmp
-
memory/1568-82-0x0000000000000000-mapping.dmp
-
memory/1580-34-0x0000000000000000-mapping.dmp
-
memory/1580-146-0x0000000000000000-mapping.dmp
-
memory/1580-186-0x0000000000000000-mapping.dmp
-
memory/1580-51-0x0000000000000000-mapping.dmp
-
memory/1584-190-0x0000000000000000-mapping.dmp
-
memory/1584-150-0x0000000000000000-mapping.dmp
-
memory/1592-59-0x0000000000000000-mapping.dmp
-
memory/1592-42-0x0000000000000000-mapping.dmp
-
memory/1592-153-0x0000000000000000-mapping.dmp
-
memory/1600-25-0x0000000000000000-mapping.dmp
-
memory/1604-60-0x0000000000000000-mapping.dmp
-
memory/1608-62-0x0000000000000000-mapping.dmp
-
memory/1608-9-0x0000000000000000-mapping.dmp
-
memory/1616-70-0x0000000000000000-mapping.dmp
-
memory/1616-187-0x0000000000000000-mapping.dmp
-
memory/1636-75-0x0000000000000000-mapping.dmp
-
memory/1644-27-0x0000000000000000-mapping.dmp
-
memory/1644-10-0x0000000000000000-mapping.dmp
-
memory/1648-178-0x0000000000000000-mapping.dmp
-
memory/1648-138-0x0000000000000000-mapping.dmp
-
memory/1652-79-0x0000000000000000-mapping.dmp
-
memory/1656-61-0x0000000000000000-mapping.dmp
-
memory/1656-179-0x0000000000000000-mapping.dmp
-
memory/1656-81-0x0000000000000000-mapping.dmp
-
memory/1656-44-0x0000000000000000-mapping.dmp
-
memory/1660-116-0x0000000000000000-mapping.dmp
-
memory/1660-96-0x0000000000000000-mapping.dmp
-
memory/1660-8-0x0000000000000000-mapping.dmp
-
memory/1664-26-0x0000000000000000-mapping.dmp
-
memory/1664-43-0x0000000000000000-mapping.dmp
-
memory/1668-154-0x0000000000000000-mapping.dmp
-
memory/1672-141-0x0000000000000000-mapping.dmp
-
memory/1672-101-0x0000000000000000-mapping.dmp
-
memory/1692-113-0x0000000000000000-mapping.dmp
-
memory/1696-104-0x0000000000000000-mapping.dmp
-
memory/1696-124-0x0000000000000000-mapping.dmp
-
memory/1712-161-0x0000000000000000-mapping.dmp
-
memory/1720-173-0x0000000000000000-mapping.dmp
-
memory/1720-4-0x0000000000000000-mapping.dmp
-
memory/1720-22-0x0000000000000000-mapping.dmp
-
memory/1720-39-0x0000000000000000-mapping.dmp
-
memory/1760-24-0x0000000000000000-mapping.dmp
-
memory/1760-172-0x0000000000000000-mapping.dmp
-
memory/1760-41-0x0000000000000000-mapping.dmp
-
memory/1760-132-0x0000000000000000-mapping.dmp
-
memory/1764-76-0x0000000000000000-mapping.dmp
-
memory/1764-40-0x0000000000000000-mapping.dmp
-
memory/1764-57-0x0000000000000000-mapping.dmp
-
memory/1784-175-0x0000000000000000-mapping.dmp
-
memory/1792-23-0x0000000000000000-mapping.dmp
-
memory/1800-91-0x0000000000000000-mapping.dmp
-
memory/1808-6-0x0000000000000000-mapping.dmp
-
memory/1812-133-0x0000000000000000-mapping.dmp
-
memory/1816-7-0x0000000000000000-mapping.dmp
-
memory/1820-112-0x0000000000000000-mapping.dmp
-
memory/1824-5-0x0000000000000000-mapping.dmp
-
memory/1824-169-0x0000000000000000-mapping.dmp
-
memory/1824-109-0x0000000000000000-mapping.dmp
-
memory/1828-170-0x0000000000000000-mapping.dmp
-
memory/1828-38-0x0000000000000000-mapping.dmp
-
memory/1828-55-0x0000000000000000-mapping.dmp
-
memory/1832-129-0x0000000000000000-mapping.dmp
-
memory/1836-189-0x0000000000000000-mapping.dmp
-
memory/1836-89-0x0000000000000000-mapping.dmp
-
memory/1852-77-0x0000000000000000-mapping.dmp
-
memory/1852-156-0x0000000000000000-mapping.dmp
-
memory/1856-58-0x0000000000000000-mapping.dmp
-
memory/1856-94-0x0000000000000000-mapping.dmp
-
memory/1860-134-0x0000000000000000-mapping.dmp
-
memory/1860-174-0x0000000000000000-mapping.dmp
-
memory/1868-11-0x0000000000000000-mapping.dmp
-
memory/1916-176-0x0000000000000000-mapping.dmp
-
memory/1916-136-0x0000000000000000-mapping.dmp
-
memory/1924-137-0x0000000000000000-mapping.dmp
-
memory/1924-97-0x0000000000000000-mapping.dmp
-
memory/1936-123-0x0000000000000000-mapping.dmp
-
memory/1936-85-0x0000000000000000-mapping.dmp
-
memory/1940-64-0x0000000000000000-mapping.dmp
-
memory/1948-12-0x0000000000000000-mapping.dmp
-
memory/1948-29-0x0000000000000000-mapping.dmp
-
memory/1956-78-0x0000000000000000-mapping.dmp
-
memory/1956-115-0x0000000000000000-mapping.dmp
-
memory/1960-117-0x0000000000000000-mapping.dmp
-
memory/1960-28-0x0000000000000000-mapping.dmp
-
memory/1960-45-0x0000000000000000-mapping.dmp
-
memory/1964-119-0x0000000000000000-mapping.dmp
-
memory/1964-160-0x0000000000000000-mapping.dmp
-
memory/1968-83-0x0000000000000000-mapping.dmp
-
memory/1968-63-0x0000000000000000-mapping.dmp
-
memory/1968-46-0x0000000000000000-mapping.dmp
-
memory/1972-13-0x0000000000000000-mapping.dmp
-
memory/1988-80-0x0000000000000000-mapping.dmp
-
memory/1988-177-0x0000000000000000-mapping.dmp
-
memory/2000-121-0x0000000000000000-mapping.dmp
-
memory/2008-49-0x0000000000000000-mapping.dmp
-
memory/2008-32-0x0000000000000000-mapping.dmp
-
memory/2008-144-0x0000000000000000-mapping.dmp
-
memory/2008-184-0x0000000000000000-mapping.dmp
-
memory/2012-87-0x0000000000000000-mapping.dmp
-
memory/2012-125-0x0000000000000000-mapping.dmp
-
memory/2020-15-0x0000000000000000-mapping.dmp
-
memory/2020-107-0x0000000000000000-mapping.dmp
-
memory/2020-167-0x0000000000000000-mapping.dmp
-
memory/2024-165-0x0000000000000000-mapping.dmp
-
memory/2024-50-0x0000000000000000-mapping.dmp
-
memory/2024-67-0x0000000000000000-mapping.dmp
-
memory/2024-105-0x0000000000000000-mapping.dmp
-
memory/2032-103-0x0000000000000000-mapping.dmp
-
memory/2032-143-0x0000000000000000-mapping.dmp
-
memory/2036-98-0x0000000000000000-mapping.dmp
-
memory/2036-118-0x0000000000000000-mapping.dmp
-
memory/2036-158-0x0000000000000000-mapping.dmp
-
memory/2040-65-0x0000000000000000-mapping.dmp
-
memory/2040-48-0x0000000000000000-mapping.dmp
-
memory/2044-155-0x0000000000000000-mapping.dmp