Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
23-05-2020 09:47
Static task
static1
Behavioral task
behavioral1
Sample
2020-05-22_17-36-19.bin.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
2020-05-22_17-36-19.bin.exe
Resource
win10v200430
General
-
Target
2020-05-22_17-36-19.bin.exe
-
Size
448KB
-
MD5
412568f078ec521bdba6ae14b9f36823
-
SHA1
3e5a80fe286834f6d5f0aaf014a420ec40ebad7d
-
SHA256
e2c2a80cb4ecc511f30d72b3487cb9023b40a25f6bbe07a92f47230fb76544f4
-
SHA512
9e979c3873778991bfd05b22370fbab32f7ec16dd78b8c3f2b0f54ccfd26fcdfc84f881bdf4414d24228ad2a19ef00ecb062dd5e9e2e243966f1276698f1ff85
Malware Config
Extracted
C:\Users\Admin\Desktop\README_LOCK.TXT
support@covidworldcry.com
Signatures
-
Suspicious behavior: EnumeratesProcesses 28 IoCs
Processes:
2020-05-22_17-36-19.bin.exechrome.exechrome.exepid process 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1492 2020-05-22_17-36-19.bin.exe 1236 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
Processes:
NOTEPAD.EXEchrome.exepid process 1852 NOTEPAD.EXE 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe 1688 chrome.exe -
Interacts with shadow copies 2 TTPs 13 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
Processes:
vssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exevssadmin.exepid process 2028 vssadmin.exe 1704 vssadmin.exe 1760 vssadmin.exe 1568 vssadmin.exe 2024 vssadmin.exe 1328 vssadmin.exe 1180 vssadmin.exe 1604 vssadmin.exe 1924 vssadmin.exe 992 vssadmin.exe 1868 vssadmin.exe 1832 vssadmin.exe 760 vssadmin.exe -
Suspicious use of WriteProcessMemory 1023 IoCs
Processes:
2020-05-22_17-36-19.bin.exechrome.exedescription pid process target process PID 1492 wrote to memory of 992 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 992 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 992 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 992 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1704 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1704 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1704 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1704 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1868 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1868 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1868 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1868 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1832 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1832 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1832 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1832 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 760 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1180 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1180 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1180 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1180 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1604 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1604 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1604 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1604 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1568 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1568 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1568 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1568 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1924 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1924 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1924 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1924 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2024 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2024 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2024 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2024 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2028 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2028 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2028 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 2028 1492 2020-05-22_17-36-19.bin.exe vssadmin.exe PID 1492 wrote to memory of 1816 1492 2020-05-22_17-36-19.bin.exe wmic.exe PID 1492 wrote to memory of 1816 1492 2020-05-22_17-36-19.bin.exe wmic.exe PID 1492 wrote to memory of 1816 1492 2020-05-22_17-36-19.bin.exe wmic.exe PID 1492 wrote to memory of 1816 1492 2020-05-22_17-36-19.bin.exe wmic.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe cmd.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe cmd.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe cmd.exe PID 1492 wrote to memory of 1328 1492 2020-05-22_17-36-19.bin.exe cmd.exe PID 1688 wrote to memory of 1952 1688 chrome.exe chrome.exe PID 1688 wrote to memory of 1952 1688 chrome.exe chrome.exe PID 1688 wrote to memory of 1952 1688 chrome.exe chrome.exe PID 1688 wrote to memory of 2020 1688 chrome.exe chrome.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
Processes:
vssvc.exewmic.exedescription pid process Token: SeBackupPrivilege 1148 vssvc.exe Token: SeRestorePrivilege 1148 vssvc.exe Token: SeAuditPrivilege 1148 vssvc.exe Token: SeIncreaseQuotaPrivilege 1816 wmic.exe Token: SeSecurityPrivilege 1816 wmic.exe Token: SeTakeOwnershipPrivilege 1816 wmic.exe Token: SeLoadDriverPrivilege 1816 wmic.exe Token: SeSystemProfilePrivilege 1816 wmic.exe Token: SeSystemtimePrivilege 1816 wmic.exe Token: SeProfSingleProcessPrivilege 1816 wmic.exe Token: SeIncBasePriorityPrivilege 1816 wmic.exe Token: SeCreatePagefilePrivilege 1816 wmic.exe Token: SeBackupPrivilege 1816 wmic.exe Token: SeRestorePrivilege 1816 wmic.exe Token: SeShutdownPrivilege 1816 wmic.exe Token: SeDebugPrivilege 1816 wmic.exe Token: SeSystemEnvironmentPrivilege 1816 wmic.exe Token: SeRemoteShutdownPrivilege 1816 wmic.exe Token: SeUndockPrivilege 1816 wmic.exe Token: SeManageVolumePrivilege 1816 wmic.exe Token: 33 1816 wmic.exe Token: 34 1816 wmic.exe Token: 35 1816 wmic.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Windows directory 63 IoCs
Processes:
2020-05-22_17-36-19.bin.exedescription ioc process File created C:\Windows\ehome\CreateDisc\Components\tables\absthr_0.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\alloc_1.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\1cb1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th0.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\2cb2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\6c3e7934e9e70d0fb2dfeb3af2325793\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\f29b02fec13315ab58a997da84d42d39f8d01a1d.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\2th1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\046b70de3a2fd676d807d11bedad4dcd\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SoftwareDistribution\Download\f29b02fec13315ab58a997da84d42d39f8d01a1d.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\2cb1.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\Boot\PCAT\bootmgr.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb0.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\Panther\setupinfo.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_0.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_0.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\Boot\DVD\PCAT\BCD.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\1th2.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\enwindow.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1cb2.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\2cb0.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\dewindow.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\Boot\DVD\EFI\BCD.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\absthr_1.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SoftwareDistribution\Download\31babaaa45cee9a47acba0207c097502\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\alloc_2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\alloc_3.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\1cb0.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th0.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\31babaaa45cee9a47acba0207c097502\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\absthr_1.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SoftwareDistribution\Download\499e9f34ae4b5b02c752dc8920c033aa\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\1th0.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\alloc_0.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SoftwareDistribution\Download\046b70de3a2fd676d807d11bedad4dcd\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\1cb2.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\2th2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th2.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\alloc_3.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\enwindow.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\d881ecfb1357f383d18f1e4fd0554eb0\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SoftwareDistribution\Download\499e9f34ae4b5b02c752dc8920c033aa\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SoftwareDistribution\Download\6c3e7934e9e70d0fb2dfeb3af2325793\cbshandler\state.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\Panther\setupinfo.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\1th1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\1th2.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2cb0.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\2th0.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\ehome\CreateDisc\Components\tables\2th1.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\absthr_2.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ehome\CreateDisc\Components\tables\dewindow.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357.corona-lock 2020-05-22_17-36-19.bin.exe -
Processes:
chrome.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118 chrome.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 0f00000001000000140000001e427a3639cce4c27e94b1777964ca289a722cad09000000010000003e000000303c06082b0601050507030106082b0601050507030206082b0601050507030406082b0601050507030306082b0601050507030806082b060105050703091400000001000000140000006daa9b0987c4d0d422ed4007374d19f191ffded31d000000010000001000000096f98b6e79a74810ce7d398a82f977780b000000010000000e000000430065007200740075006d0000000300000001000000140000006252dc40f71143a22fde9ef7348e064251b181182000000001000000100300003082030c308201f4a0030201020203010020300d06092a864886f70d0101050500303e310b300906035504061302504c311b3019060355040a1312556e697a65746f2053702e207a206f2e6f2e311230100603550403130943657274756d204341301e170d3032303631313130343633395a170d3237303631313130343633395a303e310b300906035504061302504c311b3019060355040a1312556e697a65746f2053702e207a206f2e6f2e311230100603550403130943657274756d20434130820122300d06092a864886f70d01010105000382010f003082010a0282010100ceb1c12ed34f7ccd25ce183e4fc48c6f806a73c85b51f89bd2dcbb005cb1a0fc7503ee81f088ee2352e9e615338dac2d09c576f92b398089e4974b90a5a878f873437ba461b0d858cce16c667e9cf3095e556384d5a8eff3b12e3068b3c43cd8ac6e8d995a904e34dc369a8f818850b76d964209f3d795830d414bb06a6bf8fc0f7e629f67c4ed265f10260f084ff0a45728ce8fb8ed45f66eee255daa6e39bee4932fd947a072ebfaa65bafca533fe20ec69656116ef7e966a926d87f9553ed0a8588ba4f29a5428c5eb6fc852000aa680ba11a85019cc446638288b622b1eefeaa46597ecf352cd5b6da5df748331454b6ebd96fcecd88d6ab1bda963b1d590203010001a3133011300f0603551d130101ff040530030101ff300d06092a864886f70d01010505000382010100b88dceefe714bacfeeb044926cb4393ea2846eadb82177d2d4778287e6204181eee2f811b763d11737be1976241c041a4ceb3daa676f2dd4cdfe653170c51ba6020aba607b6d58c29a49fe63320b6be33ac0acab3bb0e8d309518c1083c634e0c52be01ab66014276c32778cbcb27298cfcdcc3fb9c8244214d657fce62643a91de58090ce0354283ef73fd3f84ded6a0a3a93139b3b142313639c3fd1872779e54c51e301ad855d1a3bb1d57310a4d3f2bc6e64f55a5690a8c70e4c740f2e713bf7c847f4696f15f2115e831e9c7c52aefd02da12a8596718dbbc70dd9bb169ed80ce8940486a0e35ca29661521942ce8602a9b854a40f36b8a24ec06162c73 chrome.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\6252DC40F71143A22FDE9EF7348E064251B18118\Blob = 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 chrome.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 chrome.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 chrome.exe -
Drops Chrome extension 1 IoCs
Processes:
chrome.exedescription ioc process File created C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Extensions\aapocclcgogkmnckokdopfmhonfmgoek\0.10_0\_metadata\computed_hashes.json chrome.exe -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Opens file in notepad (likely ransom note) 1 IoCs
Processes:
NOTEPAD.EXEpid process 1852 NOTEPAD.EXE -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1328 cmd.exe -
Modifies service 2 TTPs 4 IoCs
Processes:
vssvc.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Registry Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\COM+ REGDB Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\ASR Writer vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\VSS\Diag\Shadow Copy Optimization Writer vssvc.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
2020-05-22_17-36-19.bin.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 2020-05-22_17-36-19.bin.exe -
Drops file in System32 directory 8 IoCs
Processes:
2020-05-22_17-36-19.bin.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7B2238AACCEDC3F1FFE8E7EB5F575EC9.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Windows\System32\LogFiles\Scm\4c8b01a2-11ff-4c41-848f-508ef4f00cf7.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7B2238AACCEDC3F1FFE8E7EB5F575EC9.corona-lock 2020-05-22_17-36-19.bin.exe -
Adds Run entry to start application 2 TTPs 2 IoCs
Processes:
2020-05-22_17-36-19.bin.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run 2020-05-22_17-36-19.bin.exe Set value (str) \REGISTRY\USER\S-1-5-21-910373003-3952921535-3480519689-1000\Software\Microsoft\Windows\CurrentVersion\Run\MSFEEditor = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\2020-05-22_17-36-19.bin.exe\" e" 2020-05-22_17-36-19.bin.exe -
Enumerates connected drives 3 TTPs
-
Drops file in Program Files directory 824 IoCs
Processes:
2020-05-22_17-36-19.bin.exedescription ioc process File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Lisbon.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Santa_Isabel.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Europe\Prague.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Tallinn.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\Accra.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Asuncion.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Boise.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuching.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Sao_Paulo.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Swift_Current.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\AST4ADT.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\SystemV\PST8.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\COPYRIGHT.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Grand_Turk.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-11.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Tehran.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Oslo.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Vilnius.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\La_Rioja.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Mozilla Firefox\precomplete.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\El_Aaiun.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Bishkek.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Kabul.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Ojinaga.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Urumqi.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Africa\El_Aaiun.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Dili.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Jamaica.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Mazatlan.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Toronto.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Irkutsk.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Krasnoyarsk.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Noronha.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Thunder_Bay.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Menominee.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-3.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Etc\GMT-9.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Africa\Khartoum.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Guatemala.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guyana.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Qyzylorda.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Wake.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\Rio_Gallegos.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\America\Argentina\San_Juan.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+11.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT+5.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Etc\GMT-1.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\New_York.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Tashkent.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Thule.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\North_Dakota\New_Salem.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\security\blacklist.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Cayenne.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Europe\Istanbul.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Srednekolymsk.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Argentina\La_Rioja.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Bishkek.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Kuala_Lumpur.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\America\Guayaquil.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Asia\Seoul.corona-lock 2020-05-22_17-36-19.bin.exe File opened for modification C:\Program Files\Java\jre7\lib\zi\Asia\Novokuznetsk.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files\Java\jre7\lib\zi\Pacific\Tongatapu.corona-lock 2020-05-22_17-36-19.bin.exe File created C:\Program Files (x86)\Common Files\Adobe AIR\sentinel.corona-lock 2020-05-22_17-36-19.bin.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2020-05-22_17-36-19.bin.exe"C:\Users\Admin\AppData\Local\Temp\2020-05-22_17-36-19.bin.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Drops file in Windows directory
- System policy modification
- Drops file in System32 directory
- Adds Run entry to start application
- Drops file in Program Files directory
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=c: /on=c: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=d: /on=d: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=e: /on=e: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=f: /on=f: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=g: /on=g: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=401MB2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Resize ShadowStorage /for=h: /on=h: /maxsize=unbounded2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2020-0~1.EXE >> NUL2⤵
- Deletes itself
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
- Modifies service
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\README_LOCK.TXT1⤵
- Suspicious use of FindShellTrayWindow
- Opens file in notepad (likely ransom note)
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
- Drops Chrome extension
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=81.0.4044.129 --initial-client-data=0xa4,0xa8,0xac,0x78,0xb0,0x7fef66ebd28,0x7fef66ebd38,0x7fef66ebd482⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=1928 --on-initialized-event-handle=352 --parent-handle=356 /prefetch:62⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --mojo-platform-channel-handle=1076 --ignored=" --type=renderer " /prefetch:22⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=network --enable-audio-service-sandbox --mojo-platform-channel-handle=1232 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
- Modifies system certificate store
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1904 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=4 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1960 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2384 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=7 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2456 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2540 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --extension-process --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2572 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=2792 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=gpu-process --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --gpu-preferences=MAAAAAAAAADgAAAwAAAAAAAAAAAAAAAAAABgAAAAAAAQAAAAAAAAAAAAAAAAAAAAKAAAAAQAAAAgAAAAAAAAACgAAAAAAAAAMAAAAAAAAAA4AAAAAAAAABAAAAAAAAAAAAAAAAUAAAAQAAAAAAAAAAAAAAAGAAAAEAAAAAAAAAABAAAABQAAABAAAAAAAAAAAQAAAAYAAAA= --use-gl=swiftshader-webgl --mojo-platform-channel-handle=1404 --ignored=" --type=renderer " /prefetch:22⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4008 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4076 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4028 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4108 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4172 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4352 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=4340 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --disable-gpu-compositing --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=19 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4484 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3972 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3940 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --disable-gpu-compositing --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=22 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1288 /prefetch:12⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=1464 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --lang=en-US --service-sandbox-type=utility --enable-audio-service-sandbox --mojo-platform-channel-handle=3504 --ignored=" --type=renderer " /prefetch:82⤵
-
C:\Program Files (x86)\Google\Chrome\Application\chrome.exe"C:\Program Files (x86)\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,5025793382944344297,13817387903702670012,131072 --disable-gpu-compositing --lang=en-US --enable-auto-reload --device-scale-factor=1 --num-raster-threads=1 --renderer-client-id=25 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2504 /prefetch:12⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\Desktop\README_LOCK.TXT
-
C:\Users\Admin\Desktop\README_LOCK.TXT
-
\??\pipe\crashpad_1688_KUKODPKARTLXDTFO
-
memory/600-29-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-108-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-117-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-124-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-116-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-113-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-16-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/600-112-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-27-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-82-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-109-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-121-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-105-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-104-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-101-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-100-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-97-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-96-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-93-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-92-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-89-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-88-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-86-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/600-83-0x000000000A2C0000-0x000000000A2D1000-memory.dmpFilesize
68KB
-
memory/644-214-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-226-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-216-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-215-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-235-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-213-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-212-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-211-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-210-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-187-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-186-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-185-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-184-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-183-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-182-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-181-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-180-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-179-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-178-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-177-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-176-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-175-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-174-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-173-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-172-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-171-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-234-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-170-0x0000000009BB0000-0x0000000009BC1000-memory.dmpFilesize
68KB
-
memory/644-169-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-8-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/644-233-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-232-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-231-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-230-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-218-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-219-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-229-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-228-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-220-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-227-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-221-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-222-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-217-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-225-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-223-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/644-224-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1492-0-0x0000000002E4B000-0x0000000002E4C000-memory.dmpFilesize
4KB
-
memory/1492-1-0x0000000004510000-0x0000000004521000-memory.dmpFilesize
68KB
-
memory/1516-118-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-102-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-98-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-99-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-87-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-85-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-158-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-103-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-84-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-81-0x0000000009A80000-0x0000000009A91000-memory.dmpFilesize
68KB
-
memory/1516-106-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-123-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-80-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-30-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-110-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-111-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-166-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-167-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-114-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-115-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-120-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-91-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-94-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-157-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-168-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-90-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-107-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-95-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-165-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-164-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-163-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-156-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-155-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-162-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-161-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-160-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-159-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-146-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-147-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-148-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-149-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-150-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-151-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-152-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-153-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1516-154-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1616-139-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1616-137-0x0000000009F10000-0x0000000009F21000-memory.dmpFilesize
68KB
-
memory/1616-119-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/1680-73-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-47-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-77-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-76-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-12-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/1680-24-0x0000027000040000-0x0000027000041000-memory.dmpFilesize
4KB
-
memory/1680-75-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-74-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-72-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-71-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-70-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-69-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-68-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-67-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-66-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-65-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-64-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-63-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-62-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-61-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-60-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-59-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-58-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-57-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-56-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-34-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-35-0x0000000009D90000-0x0000000009DA1000-memory.dmpFilesize
68KB
-
memory/1680-36-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-37-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-38-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-39-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-40-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-41-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-42-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-43-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-44-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-45-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-55-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-54-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-53-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-52-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-51-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-50-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-49-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-48-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-78-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1680-46-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/1688-240-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-241-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-248-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-245-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-251-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-275-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-274-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-243-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-242-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-268-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-250-0x000000001A8B0000-0x000000001A8D3000-memory.dmpFilesize
140KB
-
memory/1688-256-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-203-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-276-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-272-0x00000000218A0000-0x00000000218C3000-memory.dmpFilesize
140KB
-
memory/1688-239-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/1688-237-0x000000001F860000-0x000000001F871000-memory.dmpFilesize
68KB
-
memory/2028-4-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2028-5-0x0000000077600000-0x0000000077601000-memory.dmpFilesize
4KB
-
memory/2028-3-0x0000000000060000-0x0000000000061000-memory.dmpFilesize
4KB
-
memory/2144-207-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2160-205-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2332-271-0x0000000007FA0000-0x0000000007FB1000-memory.dmpFilesize
68KB
-
memory/2332-246-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2364-254-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2420-141-0x0000000009810000-0x0000000009821000-memory.dmpFilesize
68KB
-
memory/2420-144-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/2420-143-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/2420-127-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2420-145-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/2468-130-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2476-260-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2504-135-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2516-277-0x0000000000080000-0x00000000000800B0-memory.dmpFilesize
176B
-
memory/2516-263-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2880-189-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2924-192-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2940-194-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/2960-198-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/3024-286-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/3040-280-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B
-
memory/3064-283-0x000000013FE40FC0-0x000000013FE41110-memory.dmpFilesize
336B