Resubmissions

22-11-2022 00:51

221122-a7gqmagg5y 8

21-11-2022 23:09

221121-25dpqsed6v 10

21-11-2022 21:54

221121-1slddace2y 10

21-11-2022 21:30

221121-1crkfsge79 10

21-11-2022 20:42

221121-zg8h4afe23 10

21-11-2022 19:29

221121-x7e85ahb6w 10

Analysis

  • max time kernel
    299s
  • max time network
    295s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2022 21:54

General

  • Target

    http://45.95.169.45:23205/

Score
10/10

Malware Config

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • XMRig Miner payload 10 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 5 IoCs
  • Checks computer location settings 2 TTPs 4 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 5 IoCs
  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 24 IoCs
  • Suspicious use of SetWindowsHookEx 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Google\Chrome\Application\chrome.exe
    "C:\Program Files\Google\Chrome\Application\chrome.exe" http://45.95.169.45:23205/
    1⤵
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=89.0.4389.114 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdf6264f50,0x7ffdf6264f60,0x7ffdf6264f70
      2⤵
        PID:3544
      • C:\Program Files\Google\Chrome\Application\chrome.exe
        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --gpu-preferences=SAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=1632 /prefetch:2
        2⤵
          PID:3308
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1988 /prefetch:8
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:4716
        • C:\Program Files\Google\Chrome\Application\chrome.exe
          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2260 /prefetch:8
          2⤵
            PID:2356
          • C:\Program Files\Google\Chrome\Application\chrome.exe
            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2940 /prefetch:1
            2⤵
              PID:1332
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3136 /prefetch:1
              2⤵
                PID:4112
              • C:\Program Files\Google\Chrome\Application\chrome.exe
                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4324 /prefetch:8
                2⤵
                  PID:3928
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 /prefetch:8
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  PID:2164
                • C:\Program Files\Google\Chrome\Application\chrome.exe
                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4548 /prefetch:8
                  2⤵
                    PID:1640
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4340 /prefetch:8
                    2⤵
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4472
                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4396 /prefetch:8
                    2⤵
                      PID:1824
                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4552 /prefetch:8
                      2⤵
                        PID:812
                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4464 /prefetch:8
                        2⤵
                          PID:1864
                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --disable-gpu-compositing --lang=en-US --extension-process --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4556 /prefetch:1
                          2⤵
                            PID:3108
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4896 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:3184
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1520 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4168
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4272 /prefetch:8
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            PID:4384
                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=4924 /prefetch:8
                            2⤵
                              PID:3484
                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4924 /prefetch:1
                              2⤵
                                PID:1276
                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5300 /prefetch:8
                                2⤵
                                  PID:4788
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5380 /prefetch:8
                                  2⤵
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:2300
                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=3668 /prefetch:8
                                  2⤵
                                    PID:404
                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5548 /prefetch:8
                                    2⤵
                                      PID:4164
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4996 /prefetch:8
                                      2⤵
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:3752
                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5688 /prefetch:8
                                      2⤵
                                        PID:3496
                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=4440 /prefetch:8
                                        2⤵
                                          PID:892
                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5716 /prefetch:8
                                          2⤵
                                            PID:3744
                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=1540 /prefetch:8
                                            2⤵
                                              PID:1292
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4424 /prefetch:8
                                              2⤵
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:4168
                                            • C:\Program Files\Google\Chrome\Application\chrome.exe
                                              "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5676 /prefetch:8
                                              2⤵
                                                PID:4832
                                              • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5860 /prefetch:8
                                                2⤵
                                                  PID:4132
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5848 /prefetch:8
                                                  2⤵
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:4292
                                                • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                  "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5632 /prefetch:8
                                                  2⤵
                                                    PID:1424
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=SAAAAAAAAADoAAAwAAAAAAAAAAAAAAAAAABgAAAQAAAoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAB4AAAAAAAAAHgAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAAIAAAAAAAAAAgAAAAAAAAA --mojo-platform-channel-handle=3480 /prefetch:2
                                                    2⤵
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    PID:3628
                                                  • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                    "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2580 /prefetch:8
                                                    2⤵
                                                      PID:3656
                                                    • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                      "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5320 /prefetch:8
                                                      2⤵
                                                        PID:1820
                                                      • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                        "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1404 /prefetch:8
                                                        2⤵
                                                          PID:4516
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4408 /prefetch:8
                                                          2⤵
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:4328
                                                        • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                          "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=5988 /prefetch:8
                                                          2⤵
                                                            PID:1164
                                                          • C:\Program Files\Google\Chrome\Application\chrome.exe
                                                            "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=1568,3735396598297301977,4917600531554294202,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1408 /prefetch:8
                                                            2⤵
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            PID:2208
                                                        • C:\Windows\System32\CompPkgSrv.exe
                                                          C:\Windows\System32\CompPkgSrv.exe -Embedding
                                                          1⤵
                                                            PID:4168
                                                          • C:\Windows\System32\rundll32.exe
                                                            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                                            1⤵
                                                              PID:3628
                                                            • C:\Users\Admin\Downloads\1.exe
                                                              "C:\Users\Admin\Downloads\1.exe"
                                                              1⤵
                                                              • Executes dropped EXE
                                                              • Checks computer location settings
                                                              • Modifies registry class
                                                              PID:3760
                                                              • C:\Windows\SysWOW64\WScript.exe
                                                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.vbs"
                                                                2⤵
                                                                • Checks computer location settings
                                                                PID:3660
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat" "
                                                                  3⤵
                                                                    PID:2452
                                                                    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GoogleUpdate.exe
                                                                      googleupdate
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      PID:2604
                                                              • C:\Users\Admin\Downloads\2.exe
                                                                "C:\Users\Admin\Downloads\2.exe"
                                                                1⤵
                                                                • Executes dropped EXE
                                                                • Checks computer location settings
                                                                • Modifies registry class
                                                                PID:392
                                                                • C:\Windows\SysWOW64\WScript.exe
                                                                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX1\start.vbs"
                                                                  2⤵
                                                                  • Checks computer location settings
                                                                  PID:4168
                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX1\start.bat" "
                                                                    3⤵
                                                                      PID:4924
                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\GoogleUpdate.exe
                                                                        googleupdate
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        PID:3412
                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\1\" -spe -an -ai#7zMap24993:64:7zEvent4237
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:2896
                                                                • C:\Windows\System32\Notepad.exe
                                                                  "C:\Windows\System32\Notepad.exe" C:\Users\Admin\Downloads\1\start.vbs
                                                                  1⤵
                                                                  • Opens file in notepad (likely ransom note)
                                                                  PID:2908
                                                                • C:\Program Files\7-Zip\7zG.exe
                                                                  "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\1\GoogleUpdate\" -spe -an -ai#7zMap19612:90:7zEvent16375
                                                                  1⤵
                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                  • Suspicious use of FindShellTrayWindow
                                                                  PID:2308
                                                                • C:\Windows\system32\OpenWith.exe
                                                                  C:\Windows\system32\OpenWith.exe -Embedding
                                                                  1⤵
                                                                  • Modifies registry class
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:928
                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\1\GoogleUpdate\_TEXT_CN
                                                                    2⤵
                                                                      PID:2444
                                                                  • C:\Windows\system32\NOTEPAD.EXE
                                                                    "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\1\GoogleUpdate\.text
                                                                    1⤵
                                                                      PID:4236
                                                                    • C:\Users\Admin\Downloads\1\GoogleUpdate.exe
                                                                      "C:\Users\Admin\Downloads\1\GoogleUpdate.exe"
                                                                      1⤵
                                                                      • Executes dropped EXE
                                                                      PID:3712
                                                                    • C:\Program Files\7-Zip\7zG.exe
                                                                      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Downloads\*\" -spe -an -ai#7zMap29013:146:7zEvent25482
                                                                      1⤵
                                                                      • Suspicious use of AdjustPrivilegeToken
                                                                      PID:1704
                                                                    • C:\Windows\system32\OpenWith.exe
                                                                      C:\Windows\system32\OpenWith.exe -Embedding
                                                                      1⤵
                                                                      • Modifies registry class
                                                                      • Suspicious behavior: GetForegroundWindowSpam
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:4732
                                                                      • C:\Windows\system32\NOTEPAD.EXE
                                                                        "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Downloads\inject-down-run.bin
                                                                        2⤵
                                                                          PID:3084

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v6

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Caches

                                                                        MD5

                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                        SHA1

                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                        SHA256

                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                        SHA512

                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GoogleUpdate.exe

                                                                        Filesize

                                                                        3.9MB

                                                                        MD5

                                                                        273e2fbc0a4fdf5100eff76cdc72f292

                                                                        SHA1

                                                                        f5d61a4a3154b1ec7a32e5cd5df9ce4c2d873bf1

                                                                        SHA256

                                                                        219325a1f600be24dd8e265e1d21efcdba85c7ae849031e8b8746928fdf41bc7

                                                                        SHA512

                                                                        4db326187be98be9ea8db28feefb71cfcbf435698b8516c742beb821cdf2655b938a8ca4da7331ee66957359f0bb0408aeedf8dad87ceba546d19e831054cab7

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\GoogleUpdate.exe

                                                                        Filesize

                                                                        3.9MB

                                                                        MD5

                                                                        273e2fbc0a4fdf5100eff76cdc72f292

                                                                        SHA1

                                                                        f5d61a4a3154b1ec7a32e5cd5df9ce4c2d873bf1

                                                                        SHA256

                                                                        219325a1f600be24dd8e265e1d21efcdba85c7ae849031e8b8746928fdf41bc7

                                                                        SHA512

                                                                        4db326187be98be9ea8db28feefb71cfcbf435698b8516c742beb821cdf2655b938a8ca4da7331ee66957359f0bb0408aeedf8dad87ceba546d19e831054cab7

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat

                                                                        Filesize

                                                                        143B

                                                                        MD5

                                                                        ba3893cad10edcb4a0572156a83a9c4c

                                                                        SHA1

                                                                        8564d3d2c10f89893f233b7b14934e1ca95baf4f

                                                                        SHA256

                                                                        94fab46d5bca4f4a74eb8686d21f49e34a05ec79ffeb14d57275434fab7e4bd9

                                                                        SHA512

                                                                        abf280586542e79248e88c3cb776f049acd1a9334a9fa8c78debb218a80068a0629a8abf16b61a19e11c1b8f0d80e4429d8ea0061ef14eb5f34f5d82397b4f3c

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.vbs

                                                                        Filesize

                                                                        117B

                                                                        MD5

                                                                        8099c67a9631789db03e90d7b7bf0980

                                                                        SHA1

                                                                        4fbf9f44825a1184b24a0d957b20a850f3b07c42

                                                                        SHA256

                                                                        88a4ed5c8caad58c8eda0d4ed6e36c98ce5b7545529da0cf41ffea4015b71206

                                                                        SHA512

                                                                        c2ce0931eed4925e9b808250aa1335e234470571f4e2c95ffc16af972656fb0c3c8b383327d38ec7d1a5d6290e5c6800715b14c0cb93f8ec2092f8e9c3a26043

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\GoogleUpdate.exe

                                                                        Filesize

                                                                        3.9MB

                                                                        MD5

                                                                        92d166a4d54aff10ff14ae9c92ddbfa4

                                                                        SHA1

                                                                        5fff7713be18fdc804e902e48ca3955123aaa0a6

                                                                        SHA256

                                                                        95e197c3e38bfbeea2271b9501b65b77d72167a289b4913bb004152088848605

                                                                        SHA512

                                                                        306ab281820c41c108e95a52555019bf44935cdb78c696e99e63c6c62587b60954118d049453b23b7743f7dd9a75a210c34fd9b320d65664e4ed681beb5357f5

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\GoogleUpdate.exe

                                                                        Filesize

                                                                        3.9MB

                                                                        MD5

                                                                        92d166a4d54aff10ff14ae9c92ddbfa4

                                                                        SHA1

                                                                        5fff7713be18fdc804e902e48ca3955123aaa0a6

                                                                        SHA256

                                                                        95e197c3e38bfbeea2271b9501b65b77d72167a289b4913bb004152088848605

                                                                        SHA512

                                                                        306ab281820c41c108e95a52555019bf44935cdb78c696e99e63c6c62587b60954118d049453b23b7743f7dd9a75a210c34fd9b320d65664e4ed681beb5357f5

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\start.bat

                                                                        Filesize

                                                                        143B

                                                                        MD5

                                                                        ba3893cad10edcb4a0572156a83a9c4c

                                                                        SHA1

                                                                        8564d3d2c10f89893f233b7b14934e1ca95baf4f

                                                                        SHA256

                                                                        94fab46d5bca4f4a74eb8686d21f49e34a05ec79ffeb14d57275434fab7e4bd9

                                                                        SHA512

                                                                        abf280586542e79248e88c3cb776f049acd1a9334a9fa8c78debb218a80068a0629a8abf16b61a19e11c1b8f0d80e4429d8ea0061ef14eb5f34f5d82397b4f3c

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\start.vbs

                                                                        Filesize

                                                                        117B

                                                                        MD5

                                                                        8099c67a9631789db03e90d7b7bf0980

                                                                        SHA1

                                                                        4fbf9f44825a1184b24a0d957b20a850f3b07c42

                                                                        SHA256

                                                                        88a4ed5c8caad58c8eda0d4ed6e36c98ce5b7545529da0cf41ffea4015b71206

                                                                        SHA512

                                                                        c2ce0931eed4925e9b808250aa1335e234470571f4e2c95ffc16af972656fb0c3c8b383327d38ec7d1a5d6290e5c6800715b14c0cb93f8ec2092f8e9c3a26043

                                                                      • C:\Users\Admin\Downloads\1.exe

                                                                        Filesize

                                                                        1.7MB

                                                                        MD5

                                                                        f3bf68a03f822eee0d1821a0e075e7d8

                                                                        SHA1

                                                                        f7f6bf88372c7f140a89868a9f53c5cc629a1013

                                                                        SHA256

                                                                        3306914d482a4580384fc75e7036115773c074a38060ff2ace9505980ddd2a6b

                                                                        SHA512

                                                                        0784fafb8a41ef3740a95e6cf7e898f2915bc10d6c5364d577a7c02b6e5fbd8303a241ffa769f9a7780d3d46ccbd7d0f2b5424371b6fac5c75db4cc0edc72cfa

                                                                      • C:\Users\Admin\Downloads\1.exe

                                                                        Filesize

                                                                        1.7MB

                                                                        MD5

                                                                        f3bf68a03f822eee0d1821a0e075e7d8

                                                                        SHA1

                                                                        f7f6bf88372c7f140a89868a9f53c5cc629a1013

                                                                        SHA256

                                                                        3306914d482a4580384fc75e7036115773c074a38060ff2ace9505980ddd2a6b

                                                                        SHA512

                                                                        0784fafb8a41ef3740a95e6cf7e898f2915bc10d6c5364d577a7c02b6e5fbd8303a241ffa769f9a7780d3d46ccbd7d0f2b5424371b6fac5c75db4cc0edc72cfa

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate.exe

                                                                        Filesize

                                                                        3.9MB

                                                                        MD5

                                                                        273e2fbc0a4fdf5100eff76cdc72f292

                                                                        SHA1

                                                                        f5d61a4a3154b1ec7a32e5cd5df9ce4c2d873bf1

                                                                        SHA256

                                                                        219325a1f600be24dd8e265e1d21efcdba85c7ae849031e8b8746928fdf41bc7

                                                                        SHA512

                                                                        4db326187be98be9ea8db28feefb71cfcbf435698b8516c742beb821cdf2655b938a8ca4da7331ee66957359f0bb0408aeedf8dad87ceba546d19e831054cab7

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate.exe

                                                                        Filesize

                                                                        3.9MB

                                                                        MD5

                                                                        273e2fbc0a4fdf5100eff76cdc72f292

                                                                        SHA1

                                                                        f5d61a4a3154b1ec7a32e5cd5df9ce4c2d873bf1

                                                                        SHA256

                                                                        219325a1f600be24dd8e265e1d21efcdba85c7ae849031e8b8746928fdf41bc7

                                                                        SHA512

                                                                        4db326187be98be9ea8db28feefb71cfcbf435698b8516c742beb821cdf2655b938a8ca4da7331ee66957359f0bb0408aeedf8dad87ceba546d19e831054cab7

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.idata

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        7bdb135cb93b87ac11a7bf349423f324

                                                                        SHA1

                                                                        6cae2a908a15c1308bc7266d6a6d9f349b07a951

                                                                        SHA256

                                                                        b0a49a5d41871feccc155b03fa3185f31390beafb141054ece95e25fa18b6a72

                                                                        SHA512

                                                                        6f13072d1324ad228f80748ce6f730e0242fbfbe6b545f0d9faa12be23228ef702631f307ed06a503a91e04b28669f874363029a2dd4586966e825fc821f5e41

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.pdata

                                                                        Filesize

                                                                        118KB

                                                                        MD5

                                                                        2b490cd980cc3c3aef50df6e1e5d7262

                                                                        SHA1

                                                                        a36b718fcbfe37e93738a175e2ab095aa043a4b1

                                                                        SHA256

                                                                        6b906b76220f8cefe6d4e4b8193d3cb11c69473e539cbe057b830aae1e458f34

                                                                        SHA512

                                                                        a3933c734fdc269b8fda6debc49f2bce807fa5172fd32bfeb0483d77518ce1412b0fc2666d79bf25e30412270721569ada7879218f2fafce25020a34aaf20521

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.reloc

                                                                        Filesize

                                                                        32KB

                                                                        MD5

                                                                        5934c482658c20298939b68d58ab45c8

                                                                        SHA1

                                                                        63b6c9010243464e3c6b4ad2f1c447043d24b3c2

                                                                        SHA256

                                                                        41cfc6d75c02df884febeb37f29d6266b5c6641d1a55fa9e4d87035c2a7ab1f3

                                                                        SHA512

                                                                        1aa6bd6ae5081e155f24823339f773fa2e7f3a41a13d438cb6298b4081dcf16069570608aa2eb32b1ee81aa0f1a666f49678d983d5222a8430bc523a7eb758a9

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.rsrc\GROUP_ICON\101

                                                                        Filesize

                                                                        104B

                                                                        MD5

                                                                        26deb637d6c8b617feba45d2dc0dd1b2

                                                                        SHA1

                                                                        ce85d52bc0bb91da2a45eb09532354f947dffaed

                                                                        SHA256

                                                                        a0f2be7f2f652d6facc9f410d6f334951926a6f553c70af78c9008be7eb1d2c5

                                                                        SHA512

                                                                        530b63bc95c188d4072700a687d76f6210420a5a2cfeb44feed2f4f6297295ffd77dd3c05fda1e49e95fe73302155e125486a191092c1e7e48f86807496f6778

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.rsrc\ICON\1

                                                                        Filesize

                                                                        24KB

                                                                        MD5

                                                                        2de7670b136d47f24d80c7a7f151f653

                                                                        SHA1

                                                                        39a7fa5b8b95822f3443115f7fe0c384d9c150a2

                                                                        SHA256

                                                                        a83bf0e6c6a8851fc88c7b14c3484d23ccb20507fedeca573991edaed998090e

                                                                        SHA512

                                                                        481f85ad50635a6190717bf9ab88012e506153c9d61e4ed51fe8917eea9dc181e067fe9485019e5ff7043751f0cf61c02ec75d3cc3cde7abd7ab9f2259621c78

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.rsrc\ICON\2.ico

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        e13ffcaf2177db81ee725f6810353bb2

                                                                        SHA1

                                                                        22d779bddc8975c33bf0d8792b9f5112c1ce3fc3

                                                                        SHA256

                                                                        2c9e04f78c511316f22b58623d520e50f0eee0f6f10c7dbae30d9a9a12971c75

                                                                        SHA512

                                                                        0f6e6fb506102dc113a0b790eb00646db9972d293510721e40f507bee7d6ab28fd62c6ff0134f9ca0a4db2ab1a6de21eb5f287dbf02f03df7d18556f373b0474

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.rsrc\ICON\3.ico

                                                                        Filesize

                                                                        9KB

                                                                        MD5

                                                                        c4fdbc7b29903470abff1c9eef4e244d

                                                                        SHA1

                                                                        930c168013322a0d9a6856bad247a51b154c6904

                                                                        SHA256

                                                                        3f390c14c71afe67588fba386ddd79b0a633024ffe66f7d7bb0d8fc3896255b5

                                                                        SHA512

                                                                        34a68824f070050e65d51f733e8bd0f4ca6fa0fe090afd0f4b7c5403d9ee9748ee627502c416f21f462cbfcd214f7b2550a70b2921f1c31b5fb454dfcc9b1712

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.rsrc\ICON\4.ico

                                                                        Filesize

                                                                        2KB

                                                                        MD5

                                                                        609fbe023f9a449fc908bdd404f3a368

                                                                        SHA1

                                                                        b10f396abc8c97afa9603a6b96d6e90d74dfc46a

                                                                        SHA256

                                                                        b5a90be91557c1a035e75ccfd641647f5a94ae1c32a32978e366ad51f8d7560e

                                                                        SHA512

                                                                        f216e04a90151c4faaf304fba41b6d2416f9350c781aaf080b84f8059e2060ccb0956728a2e1063894bd6c1557f1ae95b7d7641e85f53aa04291f333ab94107a

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.rsrc\ICON\5.ico

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        be258bd989fe9d584d49e46c99e85ba8

                                                                        SHA1

                                                                        4ac12fdfe0e33a25ef3ef48c58516c2b6ee1bf7f

                                                                        SHA256

                                                                        6203260a6a4442cc9a2a08a821d220f8017f2a9a007239d499526824010d5c3d

                                                                        SHA512

                                                                        b2428cd83164596ea9363be30f5c6f3ed19515d5d077289565043f4d27aef6d4f066fe73876f47a9ed8c62b3b5315e37fcc3ef0f2d1348cf05b7818ed7b5c612

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\.text

                                                                        Filesize

                                                                        3.7MB

                                                                        MD5

                                                                        98d36d85353694099299256726cac38b

                                                                        SHA1

                                                                        098a186d4540bc119d34b90d7d0debde86efc9ec

                                                                        SHA256

                                                                        33e8f6c848e2c0be052d1fb9cfd0c5d0899b6996dd81da729db5d78420afb56e

                                                                        SHA512

                                                                        a296a21d33cba146872901cceef0cca5585d1eb6ac4c7ac1e06e3912ce064bb1dc5ceba3e7f75c5601d3cdbbcb71b8af0c660d588c793db584ddd6174ac69a07

                                                                      • C:\Users\Admin\Downloads\1\GoogleUpdate\_TEXT_CN

                                                                        Filesize

                                                                        4KB

                                                                        MD5

                                                                        409bf3f918f2402291cb56c2e9354b47

                                                                        SHA1

                                                                        4992a8b9c3e33a7f8659bd20066f907134f7c337

                                                                        SHA256

                                                                        97edf367117028c754aed0c10748bfa55d73a87af588af16d5b24610e1652b08

                                                                        SHA512

                                                                        f67424e16ff5ab7d434eb92fc1af93f49821229df4d0570b2541c0614b6581a3809390248ee0b03929a274fa5a72e854d281741389fd651b4af3d8a50430382b

                                                                      • C:\Users\Admin\Downloads\1\start.vbs

                                                                        Filesize

                                                                        117B

                                                                        MD5

                                                                        8099c67a9631789db03e90d7b7bf0980

                                                                        SHA1

                                                                        4fbf9f44825a1184b24a0d957b20a850f3b07c42

                                                                        SHA256

                                                                        88a4ed5c8caad58c8eda0d4ed6e36c98ce5b7545529da0cf41ffea4015b71206

                                                                        SHA512

                                                                        c2ce0931eed4925e9b808250aa1335e234470571f4e2c95ffc16af972656fb0c3c8b383327d38ec7d1a5d6290e5c6800715b14c0cb93f8ec2092f8e9c3a26043

                                                                      • C:\Users\Admin\Downloads\2.exe

                                                                        Filesize

                                                                        1.7MB

                                                                        MD5

                                                                        184f7a0b79965c535b30e74780b74d16

                                                                        SHA1

                                                                        fea3cd235e28a9dad7f6e6e6d91555c42294949d

                                                                        SHA256

                                                                        97c5f0ad6d179ddad7796bbec0cf28241be3ebd8db3e4b937ef118c59d68ee78

                                                                        SHA512

                                                                        8d4cbf95a6e918b7eeb931455b516d3b630f33dac0ceb194401d5b14eac0b464e2746d7ddca88449db6d2292e57fe909ec5c04e45a0f10ced54087012a55cd35

                                                                      • C:\Users\Admin\Downloads\2.exe

                                                                        Filesize

                                                                        1.7MB

                                                                        MD5

                                                                        184f7a0b79965c535b30e74780b74d16

                                                                        SHA1

                                                                        fea3cd235e28a9dad7f6e6e6d91555c42294949d

                                                                        SHA256

                                                                        97c5f0ad6d179ddad7796bbec0cf28241be3ebd8db3e4b937ef118c59d68ee78

                                                                        SHA512

                                                                        8d4cbf95a6e918b7eeb931455b516d3b630f33dac0ceb194401d5b14eac0b464e2746d7ddca88449db6d2292e57fe909ec5c04e45a0f10ced54087012a55cd35

                                                                      • \??\pipe\crashpad_976_YEUNJOJHGJLERKWQ

                                                                        MD5

                                                                        d41d8cd98f00b204e9800998ecf8427e

                                                                        SHA1

                                                                        da39a3ee5e6b4b0d3255bfef95601890afd80709

                                                                        SHA256

                                                                        e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

                                                                        SHA512

                                                                        cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

                                                                      • memory/2444-159-0x0000000000000000-mapping.dmp

                                                                      • memory/2452-139-0x0000000000000000-mapping.dmp

                                                                      • memory/2604-144-0x00007FF6814E0000-0x00007FF681BEA000-memory.dmp

                                                                        Filesize

                                                                        7.0MB

                                                                      • memory/2604-143-0x0000021AA3080000-0x0000021AA30A0000-memory.dmp

                                                                        Filesize

                                                                        128KB

                                                                      • memory/2604-140-0x0000000000000000-mapping.dmp

                                                                      • memory/3084-174-0x0000000000000000-mapping.dmp

                                                                      • memory/3412-155-0x00007FF644C00000-0x00007FF64530A000-memory.dmp

                                                                        Filesize

                                                                        7.0MB

                                                                      • memory/3412-161-0x00007FF644C00000-0x00007FF64530A000-memory.dmp

                                                                        Filesize

                                                                        7.0MB

                                                                      • memory/3412-151-0x0000000000000000-mapping.dmp

                                                                      • memory/3660-136-0x0000000000000000-mapping.dmp

                                                                      • memory/3712-164-0x00007FF7D67D0000-0x00007FF7D6EDA000-memory.dmp

                                                                        Filesize

                                                                        7.0MB

                                                                      • memory/4168-147-0x0000000000000000-mapping.dmp

                                                                      • memory/4924-150-0x0000000000000000-mapping.dmp