0.9
低危

0fe82dc1245fbb5001e1fae0396549fc50a083a82e1d63efa1f837813be691b6

0fe82dc1245fbb5001e1fae0396549fc50a083a82e1d63efa1f837813be691b6.exe

分析耗时

193s

最近分析

372天前

文件大小

69.5KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN RANSOM GANDCRAB
鹰眼引擎
DACN 0.12
FACILE 1.00
IMCLNet 0.65
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:RansomX-gen [Ransom] 20190907 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20190907 2013.8.14.323
McAfee GenericRXEH-WC!E31E3BACC67B 20190907 6.0.6.653
Tencent None 20190907 1.0.0.1
静态指标
行为判定
动态指标
网络通信
与未执行 DNS 查询的主机进行通信 (2 个事件)
host 114.114.114.114
host 8.8.8.8
文件已被 VirusTotal 上 57 个反病毒引擎识别为恶意 (50 out of 57 个事件)
ALYac Generic.Ransom.GandCrab.C13EE326
APEX Malicious
AVG Win32:RansomX-gen [Ransom]
Acronis suspicious
Ad-Aware Generic.Ransom.GandCrab.C13EE326
AhnLab-V3 Trojan/Win32.FileCoder.R221681
Antiy-AVL Trojan[Ransom]/Win32.GandCrypt.c
Arcabit Generic.Ransom.GandCrab.C13EE326
Avast Win32:RansomX-gen [Ransom]
Avira TR/Dropper.Gen
BitDefender Generic.Ransom.GandCrab.C13EE326
CAT-QuickHeal Trojan.Mauvaise.SL1
ClamAV Win.Ransomware.Gandcrab-6502432-0
Comodo TrojWare.Win32.Ransom.GandCrab.B@7kn2ff
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.cc67b2
Cylance Unsafe
Cyren W32/S-700f8b9d!Eldorado
DrWeb Trojan.DownLoader27.28632
ESET-NOD32 a variant of Win32/Filecoder.GandCrab.B
Emsisoft Generic.Ransom.GandCrab.C13EE326 (B)
Endgame malicious (high confidence)
F-Prot W32/S-700f8b9d!Eldorado
F-Secure Trojan.TR/Dropper.Gen
FireEye Generic.mg.e31e3bacc67b28be
Fortinet W32/GandCrab.B!tr.ransom
GData Generic.Ransom.GandCrab.C13EE326
Ikarus Trojan.Crypt
Invincea heuristic
Jiangmin Trojan.Generic.bzhzc
K7AntiVirus Trojan ( 0053d33d1 )
K7GW Trojan ( 00526c7b1 )
Kaspersky HEUR:Trojan.Win32.Generic
MAX malware (ai score=82)
Malwarebytes Ransom.GandCrab
McAfee GenericRXEH-WC!E31E3BACC67B
McAfee-GW-Edition BehavesLike.Win32.Generic.kt
MicroWorld-eScan Generic.Ransom.GandCrab.C13EE326
Microsoft Ransom:Win32/GandCrab!rfn
NANO-Antivirus Trojan.Win32.Encoder.eyfpxx
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM20.1.B8A4.Malware.Gen
Rising Ransom.GandCrab!1.B8D6 (CLASSIC)
SUPERAntiSpyware Ransom.GandCrab/Variant
SentinelOne DFI - Malicious PE
Sophos Troj/GandCrab-A
Symantec Ransom.GandCrab!g4
Trapmine malicious.high.ml.score
TrendMicro Ransom_GANDCRAB.SM1
TrendMicro-HouseCall Ransom_GANDCRAB.SM1
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

2018-02-21 01:28:57

PE Imphash

6b11af918234585a966ca8fab046dc6c

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
.text 0x00001000 0x000082e8 0x00008400 5.8214573063246595
.rdata 0x0000a000 0x000070a6 0x00007200 3.301387386742077
.data 0x00012000 0x00000a80 0x00000c00 3.115311570797407
.CRT 0x00013000 0x00000004 0x00000200 0.0
.rsrc 0x00014000 0x000001e0 0x00000200 4.7176788329467545
.reloc 0x00015000 0x00000ac4 0x00000c00 0.0

Resources

Name Offset Size Language Sub-language File type
RT_MANIFEST 0x00014060 0x0000017d LANG_ENGLISH SUBLANG_ENGLISH_US None

Imports

Library KERNEL32.dll:
0x1000a058 SetFilePointer
0x1000a05c GetFileAttributesW
0x1000a060 ReadFile
0x1000a064 GetLastError
0x1000a068 MoveFileW
0x1000a06c lstrcpyW
0x1000a070 SetFileAttributesW
0x1000a074 CreateMutexW
0x1000a078 GetDriveTypeW
0x1000a07c VerSetConditionMask
0x1000a080 WaitForSingleObject
0x1000a084 GetTickCount
0x1000a08c OpenProcess
0x1000a090 GetSystemDirectoryW
0x1000a094 TerminateThread
0x1000a098 Sleep
0x1000a09c TerminateProcess
0x1000a0a0 VerifyVersionInfoW
0x1000a0a4 WaitForMultipleObjects
0x1000a0a8 DeleteCriticalSection
0x1000a0b0 lstrlenW
0x1000a0b4 SetHandleInformation
0x1000a0b8 lstrcatA
0x1000a0bc MultiByteToWideChar
0x1000a0c0 CreatePipe
0x1000a0c4 lstrcmpiA
0x1000a0c8 Process32NextW
0x1000a0d0 LeaveCriticalSection
0x1000a0d4 EnterCriticalSection
0x1000a0d8 FindFirstFileW
0x1000a0dc lstrcmpW
0x1000a0e0 FindClose
0x1000a0e4 FindNextFileW
0x1000a0e8 GetNativeSystemInfo
0x1000a0ec GetComputerNameW
0x1000a0f0 GetDiskFreeSpaceW
0x1000a0f4 GetWindowsDirectoryW
0x1000a0f8 GetVolumeInformationW
0x1000a0fc LoadLibraryA
0x1000a100 lstrcmpiW
0x1000a104 VirtualFree
0x1000a108 CreateThread
0x1000a10c CloseHandle
0x1000a110 lstrcatW
0x1000a114 CreateFileMappingW
0x1000a118 ExitThread
0x1000a11c CreateFileW
0x1000a120 GetModuleFileNameW
0x1000a124 WriteFile
0x1000a128 GetModuleHandleW
0x1000a12c UnmapViewOfFile
0x1000a130 MapViewOfFile
0x1000a134 GetFileSize
0x1000a13c lstrcpyA
0x1000a140 GetModuleHandleA
0x1000a144 VirtualAlloc
0x1000a148 GetProcAddress
0x1000a14c Process32FirstW
0x1000a150 GetTempPathW
0x1000a154 GetProcessHeap
0x1000a158 HeapFree
0x1000a15c HeapAlloc
0x1000a160 lstrlenA
0x1000a164 CreateProcessW
0x1000a168 ExitProcess
Library USER32.dll:
0x1000a190 BeginPaint
0x1000a194 wsprintfW
0x1000a198 TranslateMessage
0x1000a19c LoadCursorW
0x1000a1a0 LoadIconW
0x1000a1a4 MessageBoxA
0x1000a1a8 GetMessageW
0x1000a1ac EndPaint
0x1000a1b0 DestroyWindow
0x1000a1b4 RegisterClassExW
0x1000a1b8 ShowWindow
0x1000a1bc CreateWindowExW
0x1000a1c0 SendMessageW
0x1000a1c4 DispatchMessageW
0x1000a1c8 DefWindowProcW
0x1000a1cc UpdateWindow
0x1000a1d0 GetForegroundWindow
0x1000a1d4 SetWindowLongW
Library GDI32.dll:
0x1000a050 TextOutW
Library ADVAPI32.dll:
0x1000a000 FreeSid
0x1000a004 RegSetValueExW
0x1000a008 RegCreateKeyExW
0x1000a00c RegCloseKey
0x1000a010 CryptExportKey
0x1000a014 CryptAcquireContextW
0x1000a018 CryptGetKeyParam
0x1000a01c CryptReleaseContext
0x1000a020 CryptImportKey
0x1000a024 CryptEncrypt
0x1000a028 CryptGenKey
0x1000a02c CryptDestroyKey
0x1000a030 GetUserNameW
0x1000a034 RegQueryValueExW
0x1000a038 RegOpenKeyExW
Library SHELL32.dll:
0x1000a180 ShellExecuteW
0x1000a188 ShellExecuteExW
Library CRYPT32.dll:
0x1000a044 CryptStringToBinaryA
0x1000a048 CryptBinaryToStringA
Library WININET.dll:
0x1000a1dc InternetCloseHandle
0x1000a1e0 HttpAddRequestHeadersW
0x1000a1e4 HttpSendRequestW
0x1000a1e8 InternetConnectW
0x1000a1ec HttpOpenRequestW
0x1000a1f0 InternetOpenW
0x1000a1f4 InternetReadFile
Library PSAPI.DLL:
0x1000a174 EnumDeviceDrivers

Exports

Ordinal Address Name
1 0x10005ec0 _ReflectiveLoader@0
L!This 0
m cannot be run in DOS mode.
Tg:4:4:44:44:44:4:4:44:4;42:44:44:44:44:4Rich:4
`.rdata
@.data
@.rsrc
@.reloc
UQSVWj
3_^[]j
W_^[]U
^[]^3[]U
SVWj@h
fD$$QD$
U\SV3D$
fD$,D$
D$TD$X
t$PD$\D$`
D$dD$8P
_^]SEPuW
[_3^]h
^]U$SV3Ek
]U\SV3Es
fE_^[u(Mu
<}tK<=tBF>
<}t)F<=t
UQSV3WE33p
[]_^[]VWy
GFu33;_
GFu33;_
HthHuo
<}tcG<=t
EPWuu-
MPEPPEP!]
_^[]UE
E F$E(F0E0F<E8FHE@FTEPFtEXF
PPRPRPRPj#
PD$ D$$i
VD$TD$Tp
_^[]jw8
D$8f|$8P
GfZvjj
D$P\$$
W|$,t$ D$03D$
r]K\$(
T$4T$$L$
L$(T$$;s
D$D\$@
BNu^[=`*
\$$D$,m
D$DD$0w
fL$@D$Ds
f|$ D$h/
FK$'rt$
V_^[]3<
EPMQUREPM
u4EPMQURU
U\VjDE
SVUMWj
GFu_^[t
WfEfEMEEl
3_^[]h
_^3[]ULf
EgandEcrabE.bitE
_^[]V5D
33EVVPWj
SVWj@h
EtPpNWu
UWM]$(
SVWj@h
u_^[]U
L$(|$,
D$$D$$PQh
6D$$D$$PWh
Wt$(j@Bh
t$(D$$D$
L$@<GWw
PVjt$ j
D$<L$J
PPT$4$
D$$D$$PWh
t$(3HL$
SVW3Uh
u_^[]U
U3M39]
r_^[]UE
]U SVW3E
Ffu[Jj
u{]h<uy]E
NuEu(u
{U}w(j
u_^[]U
E]UQMEM
E]SVWj@h
_^[SV5
^@[UQ=`*
ftO+ft
E[_^]U
SVWj@h
_^[]UQSVWj@h
_^[]Uh
_^3[]U0SWj@h
D$@D$D
Vs VhT
Vs,VhT
Vs8VhT
VsDVhT
VsPVhT
Vs\VhT
Vs|VhT
3_fLF^[]
SVW39t
^[_^[UQVEPh
F t=Qh
EF8EPh
FPu*Qh
E3EfDEfE
3fEEPv|t\
EPEPEPEPEP
v|uN|uh$
N|3fTA
ULSV5D
33WPMM
3PPPPfE$
_^[]U@SVWF
KPSVWE
E_^[],
Vft;+ft
fu^_3[^_[SVW
GFu_^3[
_^[UdSVWh
AafDMA
EECrypPEtGenERandfEomE
EAdvaEpi32E.dllE
_^3[]U8SVWh
3MWWEP]
EECrypPEtGenERandfEomE
EAdvaEpi32E.dllE
_^3[]U
MH$E3M
P0p4x8X<
MHDE3M
pTxXX\
MHdE3M
ptxxX|
on0v00f
on0v00f
on0v00f
DDDDDDDDDDDDDD
EMEineIE5ntel5@*
E5Genu
MMtCE%?
KuZ^%l
zww5uwkwa
wFwywX
wDwwowxjwzw
||X||0%|||y|U|
|9|T|||
|)|_;|G|
||Y||:|
|)||(|9||I|=
wiwt!w
wfw)ww
wwdwww
cc||ww{{
kkooT`00P
ggV++}
bMvvE@}}
Ag_E#Srr[u
=L&&jl66Z~??A
Oh44\Q4
qqsb11S*
RF##e^0
=&N''i
-nnZZ[RRv;;Ma}R)){>^//q
,@ `y
[[jjFgr99KJJ
XXJk*O
MMf33U
PPx<<D%KQQ]@@
?!p88H
cwuB!!c
5/__5DD.
9WU~~z==Gdd]]2
D""fT**~;
v;d22Vt::N
H$$l\\]nCbb917yy2Cn77Ymm
dNNIllVV
%eezzG
oxxJ%%o\..r8
Q#|tt>!KKa
pp|>>BqffHH
aaj55_WWi
IUUP((xz
e1BBhhAA)Z--w
:cc||ww{{
kkooTP`00
gg}V++
Ag_E#Srr[u
=jL&&Zl66A~??
O\h44Q4
qqsSb11?*
ReF##^(0
=&iN''
tX,,.4
nnZZ[RRMv;;a}{R))>q^//
,`@ y[[jjFgKr99
LLXXJk*O
MMUf33
PPDx<<%KQQ]@@
?!Hp88
cwucB!!0
WU~~Gz==dd]]+2
fD""~T**;
FF)k<(
v;Vd22Nt::
lH$$\\]nCbb917yy2CYn77mm
NNIllVV
%eezzG
oxxoJ%%r\..$8
tt!>
ppB|>>qff
aa_j55WWi
IUUxP((z
AA)wZ--
{TTm:,
cc||ww{{
kkooT0P`0
gg+}V+
_E#Srr[u
=&jL&6Zl6?A~?
O4\h4Q4
qqs1Sb1
R#eF#^
=&'iN'
nnZZ[RR;Mv;a
}){R)>/q^/
, `@ y[[jjF
g9Kr9J
LXXJk*O
PP<Dx<%KQQ]@@
?!8Hp8
cwu!cB!
U~~=Gz=dd]]
"fD"*~T*;
v;2Vd2:Nt:
$lH$\\]n
Cbb917yy2C7Yn7mm
NIllVV
%eezzG
oxx%oJ%.r\.
WsQ#|tt!>K
pp>B|>qffH
aa5_j5WWi
IUU(xP(z
A)-wZ-
cc||ww{{
kkooT00P`
gg++}V
bMvvE@}}
Ag_E#Srr[u
=&&jL66Zl??A~
O44\hQ4
qqs11Sb
R##eF^
=&''iN
-6nnZZ
[RR;;Mva})){R>//q^
, `@
y[[jjFg99KrJJ
PP<<Dx%K
necntsyxZI
MTAO]Sywek1?-#
ZX>kQ3`J$}C)v4b=o
A.al{vUXOB
*G<zN7tU*f\!hc
+H2"C<9^.0U
0YRODu~ch
.S4'^:<I(5D&B
nf;Do6Jt!X},V
d"Gi)I~4[s?UP
ypkb]TOFA
pub_key
DELETE}
{DELETE}
Fatal error
Fatal error: rsaenh.dll is not initialized as well
advapi32.dll
CheckTokenMembership
Address:
fabian wosar <3
Can't find server
aeriedjD#shasj
*******************
RtlComputeCrc32
GandCrabGandCrabnomoreransom.coinomoreransom.bit
encryption.dll
_ReflectiveLoader@0
ExitProcess
lstrlenA
HeapAlloc
HeapFree
GetProcessHeap
GetProcAddress
VirtualAlloc
GetModuleHandleA
lstrcpyA
GetEnvironmentVariableW
GetFileSize
MapViewOfFile
UnmapViewOfFile
GetModuleHandleW
WriteFile
GetModuleFileNameW
CreateFileW
ExitThread
lstrlenW
GetTempPathW
CreateFileMappingW
lstrcatW
CloseHandle
CreateThread
VirtualFree
lstrcmpiW
lstrcmpiA
SetFilePointer
GetFileAttributesW
ReadFile
GetLastError
MoveFileW
lstrcpyW
SetFileAttributesW
CreateMutexW
GetDriveTypeW
VerSetConditionMask
WaitForSingleObject
GetTickCount
InitializeCriticalSection
OpenProcess
GetSystemDirectoryW
TerminateThread
TerminateProcess
VerifyVersionInfoW
WaitForMultipleObjects
DeleteCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
SetHandleInformation
lstrcatA
MultiByteToWideChar
CreatePipe
Process32FirstW
Process32NextW
CreateToolhelp32Snapshot
LeaveCriticalSection
EnterCriticalSection
FindFirstFileW
lstrcmpW
FindClose
FindNextFileW
GetNativeSystemInfo
GetComputerNameW
GetDiskFreeSpaceW
GetWindowsDirectoryW
GetVolumeInformationW
LoadLibraryA
KERNEL32.dll
DispatchMessageW
DefWindowProcW
UpdateWindow
SendMessageW
CreateWindowExW
ShowWindow
SetWindowLongW
LoadIconW
RegisterClassExW
TranslateMessage
wsprintfW
BeginPaint
LoadCursorW
GetMessageW
DestroyWindow
EndPaint
MessageBoxA
GetForegroundWindow
USER32.dll
TextOutW
GDI32.dll
RegCloseKey
RegCreateKeyExW
RegSetValueExW
AllocateAndInitializeSid
FreeSid
CryptExportKey
CryptAcquireContextW
CryptGetKeyParam
CryptReleaseContext
CryptImportKey
CryptEncrypt
CryptGenKey
CryptDestroyKey
GetUserNameW
RegQueryValueExW
RegOpenKeyExW
ADVAPI32.dll
ShellExecuteExW
ShellExecuteW
SHGetSpecialFolderPathW
SHELL32.dll
CryptStringToBinaryA
CryptBinaryToStringA
CRYPT32.dll
InternetOpenW
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpAddRequestHeadersW
HttpOpenRequestW
InternetCloseHandle
WININET.dll
GetDeviceDriverBaseNameW
EnumDeviceDrivers
PSAPI.DLL
IsProcessorFeaturePresent
<?xml version='1.0' encoding='UTF-8' standalone='yes'?>
<assembly xmlns='urn:schemas-microsoft-com:asm.v1' manifestVersion='1.0'>
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v3">
<security>
<requestedPrivileges>
<requestedExecutionLevel level='asInvoker' uiAccess='false' />
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
jjjjjj
AppData
\Microsoft\
GandCrab!
win32app
firefox
ransom_id
os_bit
os_major
pc_keyb
pc_lang
pc_group
pc_name
pc_user
ransom_id=
{USERID}
Global\
msftesql.exe
sqlagent.exe
sqlbrowser.exe
sqlservr.exe
sqlwriter.exe
oracle.exe
ocssd.exe
dbsnmp.exe
synctime.exe
mydesktopqos.exe
agntsvc.exeisqlplussvc.exe
xfssvccon.exe
mydesktopservice.exe
ocautoupds.exe
agntsvc.exeagntsvc.exe
agntsvc.exeencsvc.exe
firefoxconfig.exe
tbirdconfig.exe
ocomm.exe
mysqld.exe
mysqld-nt.exe
mysqld-opt.exe
dbeng50.exe
sqbcoreservice.exe
excel.exe
infopath.exe
msaccess.exe
mspub.exe
onenote.exe
outlook.exe
powerpnt.exe
steam.exe
thebat.exe
thebat64.exe
thunderbird.exe
visio.exe
winword.exe
wordpad.exe
/c timeout -c 5 & del "%s" /f /q
cmd.exe
Content-Type: application/x-www-form-urlencoded
curl.php?token=
action=result&e_files=%d&e_size=%I64u&e_time=%d&
action=call&
&pub_key=
&priv_key=
&version=2.3r
Microsoft Enhanced Cryptographic Provider v1.0
\ProgramData\
\Program Files\
\Tor Browser\
Ransomware
\All Users\
\Local Settings\
:\Windows\
desktop.ini
autorun.inf
ntuser.dat
iconcache.db
bootsect.bak
boot.ini
ntuser.dat.log
thumbs.db
GDCB-DECRYPT.txt
%s\GDCB-DECRYPT.txt
ipv4bot.whatismyipaddress.com
undefined
Domain
SYSTEM\CurrentControlSet\services\Tcpip\Parameters
WORKGROUP
LocaleName
Control Panel\International
Keyboard Layout\Preload
00000419
productName
SOFTWARE\Microsoft\Windows NT\CurrentVersion
SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion
Itanium
Unknown
ProcessorNameString
HARDWARE\DESCRIPTION\System\CentralProcessor\0
Identifier
2ntdll.dll
UNKNOWN
NO_ROOT_DIR
REMOVABLE
REMOTE
RAMDISK
%I64u/
AVP.EXE
ekrn.exe
avgnt.exe
ashDisp.exe
NortonAntiBot.exe
Mcshield.exe
avengine.exe
cmdagent.exe
smc.exe
persfw.exe
pccpfw.exe
fsguiexe.exe
cfp.exe
msmpeng.exe
HTTP/1.1
---= GANDCRAB =---
Attention!
All your files documents, photos, databases and other important files are encrypted and have the extension: .GDCB
The only method of recovering files is to purchase a private key. It is on our server and only we can recover your files.
The server with your key is in a closed network TOR. You can get there by the following ways:
1. Download Tor browser - https://www.torproject.org/
2. Install Tor browser
3. Open Tor Browser
4. Open link in tor browser: http://gdcbghvjyqy7jclk.onion/3a23db8448d3b2b
5. Follow the instructions on this page
On our page you will see instructions on payment and get the opportunity to decrypt 1 file for free.
If you can't download TOR and use it, or in your country TOR blocked, read it:
1. Visit https://tox.chat/download.html
2. Download and install qTOX on your PC.
3. Open it, click "New Profile" and create profile.
4. Search our contact - 6C5AD4057E594E090E0C987B3089F74335DA75F04B7403E0575663C261349569F64D28CDCF45
5. In message please write your ID and wait our answer: 3a23db8448d3b2b
DANGEROUS!
Do not try to modify files or use your own private key - this will result in the loss of your data forever!

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137
192.168.56.101 61714 114.114.114.114 53
192.168.56.101 61714 8.8.8.8 53
192.168.56.101 56933 8.8.8.8 53
192.168.56.101 138 192.168.56.255 138
192.168.56.101 58485 114.114.114.114 53
192.168.56.101 57665 114.114.114.114 53

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Sorry! No dropped files.
Sorry! No dropped buffers.