Analysis

  • max time kernel
    73s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/07/2024, 07:47

General

  • Target

    66b6d2334d3bfb55b12a6ccae5410aa9_JaffaCakes118.exe

  • Size

    496KB

  • MD5

    66b6d2334d3bfb55b12a6ccae5410aa9

  • SHA1

    848886340c9b9e12727e432417a7bdcdb5c39a87

  • SHA256

    123cc031ce234a0466f75a78abac4647dc0f987aacb8dcaad6ce09c2098e112b

  • SHA512

    9cd6adaeec278c69d3f597ad0ab86ef3ed3031c599e2029f56abb4592395c272c075f5ec98651fbbad82e4cc7b099c707c495324fbcddad5035f6268508430b7

  • SSDEEP

    12288:dDCPENnBV5jaHBoFvZstQW012B04Ngjw5qu8jxTQlDrLOM:dEEZBV5jCoFvZsSWG2BdN+w2+O

Malware Config

Signatures

  • Modifies security service 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 10 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 12 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • UPX packed file 22 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 44 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 20 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 5 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 16 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\66b6d2334d3bfb55b12a6ccae5410aa9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\66b6d2334d3bfb55b12a6ccae5410aa9_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\j29oAE.exe
      C:\Users\Admin\j29oAE.exe
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3980
      • C:\Users\Admin\pivid.exe
        "C:\Users\Admin\pivid.exe"
        3⤵
        • Modifies visiblity of hidden/system files in Explorer
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2676
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c tasklist&&del j29oAE.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2356
        • C:\Windows\SysWOW64\tasklist.exe
          tasklist
          4⤵
          • Enumerates processes with tasklist
          • Suspicious use of AdjustPrivilegeToken
          PID:4656
    • C:\Users\Admin\2men.exe
      C:\Users\Admin\2men.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4244
      • C:\Users\Admin\2men.exe
        "C:\Users\Admin\2men.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1056
      • C:\Users\Admin\2men.exe
        "C:\Users\Admin\2men.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1180
      • C:\Users\Admin\2men.exe
        "C:\Users\Admin\2men.exe"
        3⤵
        • Executes dropped EXE
        • Maps connected drives based on registry
        • Suspicious behavior: EnumeratesProcesses
        PID:5072
      • C:\Users\Admin\2men.exe
        "C:\Users\Admin\2men.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:1832
      • C:\Users\Admin\2men.exe
        "C:\Users\Admin\2men.exe"
        3⤵
        • Executes dropped EXE
        PID:3868
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3868 -s 80
          4⤵
          • Program crash
          PID:632
    • C:\Users\Admin\3men.exe
      C:\Users\Admin\3men.exe
      2⤵
      • Modifies security service
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:3668
      • C:\Users\Admin\3men.exe
        C:\Users\Admin\3men.exe startC:\Users\Admin\AppData\Roaming\F4A82\94EB5.exe%C:\Users\Admin\AppData\Roaming\F4A82
        3⤵
        • Executes dropped EXE
        PID:2696
      • C:\Users\Admin\3men.exe
        C:\Users\Admin\3men.exe startC:\Program Files (x86)\82ADE\lvvm.exe%C:\Program Files (x86)\82ADE
        3⤵
        • Executes dropped EXE
        PID:1016
      • C:\Program Files (x86)\LP\B59F\20A2.tmp
        "C:\Program Files (x86)\LP\B59F\20A2.tmp"
        3⤵
        • Executes dropped EXE
        PID:5500
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c tasklist&&del 66b6d2334d3bfb55b12a6ccae5410aa9_JaffaCakes118.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3368
      • C:\Windows\SysWOW64\tasklist.exe
        tasklist
        3⤵
        • Enumerates processes with tasklist
        • Suspicious use of AdjustPrivilegeToken
        PID:1496
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3868 -ip 3868
    1⤵
      PID:4808
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3660
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:1532
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3768
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2872
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1648
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1628
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SendNotifyMessage
      PID:448
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2060
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:3716
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      • Suspicious use of SendNotifyMessage
      PID:5996
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4208
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5316
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:2028
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:6108
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:5732
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:5276
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:3552
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1940
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:4972
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4676
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:392
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:3252
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:4360
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2716
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Checks SCSI registry key(s)
      • Modifies registry class
      PID:2356
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:4804
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:208
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Enumerates connected drives
      • Modifies registry class
      PID:788
    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
      1⤵
        PID:5340
      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
        1⤵
          PID:5472
        • C:\Windows\explorer.exe
          explorer.exe
          1⤵
            PID:212
          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
            1⤵
              PID:1644
            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
              1⤵
                PID:5184
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:5772
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:5004
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:2032
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:2112
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:4112
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:5484
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:5468
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:5476
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:2928
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:2028
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:2184
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:4312
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:5900
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:3740
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:2536
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:5236
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:1628
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:4048
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:5268
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:1008
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:3584
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:5704
                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:2784
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:5644
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:4896
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:5464
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:3872
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:4684
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:3916
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                            PID:5868
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                            1⤵
                                                                              PID:5884
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                              1⤵
                                                                                PID:5400
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                1⤵
                                                                                  PID:4560
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                  1⤵
                                                                                    PID:5604
                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                    1⤵
                                                                                      PID:2164
                                                                                    • C:\Windows\explorer.exe
                                                                                      explorer.exe
                                                                                      1⤵
                                                                                        PID:5040
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                        1⤵
                                                                                          PID:988
                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                          1⤵
                                                                                            PID:5268
                                                                                          • C:\Windows\explorer.exe
                                                                                            explorer.exe
                                                                                            1⤵
                                                                                              PID:5836
                                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                              1⤵
                                                                                                PID:5668
                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                1⤵
                                                                                                  PID:5096
                                                                                                • C:\Windows\explorer.exe
                                                                                                  explorer.exe
                                                                                                  1⤵
                                                                                                    PID:2028

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Program Files (x86)\LP\B59F\20A2.tmp

                                                                                                    Filesize

                                                                                                    96KB

                                                                                                    MD5

                                                                                                    6b9ed8570a1857126c8bf99e0663926c

                                                                                                    SHA1

                                                                                                    94e08d8a0be09be35f37a9b17ec2130febfa2074

                                                                                                    SHA256

                                                                                                    888e4e571a6f78ee81d94ab56bd033d413f9160f1089073176b03c91878aae2d

                                                                                                    SHA512

                                                                                                    23211a1b71f1d05ad7f003231da826220ac4940e48071135cc3fba14708123fa0292e2e71c294a8086d8dc5f90dd32c4da3b41e6857c56f38cb325d78cb14880

                                                                                                  • C:\Users\Admin\2men.exe

                                                                                                    Filesize

                                                                                                    132KB

                                                                                                    MD5

                                                                                                    945a713b037b50442ec5d18d3dc0d55e

                                                                                                    SHA1

                                                                                                    2c8881b327a79fafcce27479b78f05487d93c802

                                                                                                    SHA256

                                                                                                    2da470571a64bcdeb56f62c916ee2bffa87ccc6c028b7c8cb0132d09bceedd2f

                                                                                                    SHA512

                                                                                                    0eab4bb5d04725cc20e463ae6959f71064674602f8ee7b3c9b2db75e928b9a0b1bdc94233dc261f6277d02e54a443b42a59b12aaebb8bbf243f0940344fbf385

                                                                                                  • C:\Users\Admin\3men.exe

                                                                                                    Filesize

                                                                                                    271KB

                                                                                                    MD5

                                                                                                    0d668203e24463de2bf228f00443b7bc

                                                                                                    SHA1

                                                                                                    eacff981d71f6648f6315e508bfd75e11683dba8

                                                                                                    SHA256

                                                                                                    509d530e99839d7dbc8fccac163420d9dc455fb478fa57fdec1b7a2ef629d7bc

                                                                                                    SHA512

                                                                                                    3251bb1341bd466e71468d72723bd5cf545dbd232327f343b44c51daae8755ed3caa02f74adbb0304912769346fa90dfa4c7036c211836e5650bdb06993ba803

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                                    Filesize

                                                                                                    471B

                                                                                                    MD5

                                                                                                    c25fa00d2d50c763284dc06088a9ce8b

                                                                                                    SHA1

                                                                                                    ded8a9c797ea71730b30317ee314050503f2a2dc

                                                                                                    SHA256

                                                                                                    47bc3bd953888b201be49187a14c2e959c2b756b725928c6bb1d9be87ebd9bf5

                                                                                                    SHA512

                                                                                                    b5b4be49ee0f75afbe48a9d9d3c39feb74d9510d45a5d315d1cdfd52f9f8c0bc1fba633667dff0ec898ba403aa025c5a3d8326e952211953eedc9217496ee526

                                                                                                  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_6372E0472AFF76BB926C97818BC773B9

                                                                                                    Filesize

                                                                                                    420B

                                                                                                    MD5

                                                                                                    f0756b7f72ae8a443bd5b7d08a2933a1

                                                                                                    SHA1

                                                                                                    c53d0d582930d3597b843de718ce76602fb9da53

                                                                                                    SHA256

                                                                                                    b1c9fd4bc1722576066cfca536a5f3539def08c5d1664f4d30b5488a1d8852fc

                                                                                                    SHA512

                                                                                                    41b122f2337a0272e7c58502f81cac24c7314e3c921f191dc636e6c82dcb62a19e112df5bce43ec45c4e4f8d788d35a4bab31e829d374ac338842c6186795d5b

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                                    Filesize

                                                                                                    2KB

                                                                                                    MD5

                                                                                                    e604cc54971c52809f94ff6ecc6cfe5f

                                                                                                    SHA1

                                                                                                    5ae38fb198e8434bfb302868927f093034b38bf2

                                                                                                    SHA256

                                                                                                    6341014f7f3fb7b837be90638b22d8869d9c7e4be399f86213ce520c1456d5ca

                                                                                                    SHA512

                                                                                                    08d38e4d364641d75ccd4a38495314a6cc1a82c11a326b65d6e123ac4e6f29791b52262317656d0ffbc22bbdd0dda85cb4ba7bcec40972d4bc5bcf063519ebeb

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\DeviceSearchCache\AppCache133661970036342995.txt

                                                                                                    Filesize

                                                                                                    74KB

                                                                                                    MD5

                                                                                                    aac3245b05bc1910dbea819bdbb1918c

                                                                                                    SHA1

                                                                                                    358654653d33540a90c30371d57dae01010137ea

                                                                                                    SHA256

                                                                                                    25564a902568c86ed5759b068f2f89fdb0b64aa19fd9718df76b385af8287dd7

                                                                                                    SHA512

                                                                                                    162110a568db0ab099c20a11d5d335eba1fc46e598072b15c6a5b1684616e8e95c64ce905ef662ab16f0d3e025d1a6c6434b582d02d28351ed17a7eefa49c351

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\TempState\StartUnifiedTileModelCache.dat

                                                                                                    Filesize

                                                                                                    22KB

                                                                                                    MD5

                                                                                                    d29e190a20da311b215f3400a15434ed

                                                                                                    SHA1

                                                                                                    a6fee823bbf6601ca10c037aa4d6a8cfb70b3d87

                                                                                                    SHA256

                                                                                                    5bdd70196fc9a19c059b2ca45b685f9f8ea0131b74ea5b5cd4b9a4e5908c9509

                                                                                                    SHA512

                                                                                                    1b5a8d2d85c4a0afbef0342f1336a1c845c57c446d56b26a9f958d25d225fb7493323ce151ac9e953b4d988ab4aab0de93b95248c13fd6276e429dffcafe98df

                                                                                                  • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\N2LIKBMF\microsoft.windows[1].xml

                                                                                                    Filesize

                                                                                                    97B

                                                                                                    MD5

                                                                                                    ea673300db1c03f9f2c7f5373c6280c4

                                                                                                    SHA1

                                                                                                    722d927f8ba6fa4711c5a3a42345c24ce225a82e

                                                                                                    SHA256

                                                                                                    2718a3bd0b6e3e41c91d6345c6d160be1bb04d4c0401796541db585c5351df89

                                                                                                    SHA512

                                                                                                    4f9a0cd567f6e45e7ba2b973aa5a254c3afddde34b5861c9bfa57e92397467b76e2c8351e1a9c5bf67046072daba31848030f7ad29270f79eb30c54f3bcaeac2

                                                                                                  • C:\Users\Admin\AppData\Roaming\F4A82\2ADE.4A8

                                                                                                    Filesize

                                                                                                    600B

                                                                                                    MD5

                                                                                                    02d3cce7505aafdbfb549da064c7f473

                                                                                                    SHA1

                                                                                                    b4319785dffe33bc172aad85e54e5c6a2ada9c87

                                                                                                    SHA256

                                                                                                    19951d47e91ac2aa059661b589d00bc61f95cfc8766c24d4de00272c7fcd7b34

                                                                                                    SHA512

                                                                                                    f481d8b1ed4f495972ce353c9d75b313529864ca9c712708bf1a2f46a9bc504329dff8448635fea019f1766fe9a78b0a151e53b7d9c951db4e17bcc2e7fc4dc1

                                                                                                  • C:\Users\Admin\AppData\Roaming\F4A82\2ADE.4A8

                                                                                                    Filesize

                                                                                                    996B

                                                                                                    MD5

                                                                                                    be78604f71e87347bb2c9c30ed2df010

                                                                                                    SHA1

                                                                                                    e14e4fb6eaca79c2881578bc09b142dd17021a9e

                                                                                                    SHA256

                                                                                                    2de1b9d56c13e66d496ad668af20e5765b20300c76ba84b7931d7ebb4afd2c40

                                                                                                    SHA512

                                                                                                    0e088110f4395c1a8f87bbc8183e2a84eabbbfa4b624c5a90bc233ff4ab2d089aff1405e28709b8a9ddc1d31a4f0bc9bdf6292803d1a9f6a37f4df5d25cb6620

                                                                                                  • C:\Users\Admin\AppData\Roaming\F4A82\2ADE.4A8

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    1aad1b94bb159cd58e890466ccd5ddca

                                                                                                    SHA1

                                                                                                    d00043b2bb9e977ae44692ef90b70ec0add30419

                                                                                                    SHA256

                                                                                                    30a88909a131a2ab56a03ec6641c8c1b1caf718b44744202bfa321ea203f5072

                                                                                                    SHA512

                                                                                                    1eb6503b6f324d334b737d2f18fbf9bd9ea9e5b8ac32028fd91a3c9d2dffa909aa5cf4509337ad275e3a348e4d6f90e0d3e9f76c6d11aa1b6cfef14411746830

                                                                                                  • C:\Users\Admin\AppData\Roaming\F4A82\2ADE.4A8

                                                                                                    Filesize

                                                                                                    1KB

                                                                                                    MD5

                                                                                                    a83823270d9c3065839bd1d221378948

                                                                                                    SHA1

                                                                                                    3ff5899b46433a627ffe4ea3742afd29e098cea0

                                                                                                    SHA256

                                                                                                    6b4dcd2e1c49e76902ea7a0128c9d57519fd6bae3033c13851ef3e5eeff64261

                                                                                                    SHA512

                                                                                                    12e8ab4ef2228c4915e22436e6f90c82215f6b68ee32f020877c2e8e06e91ce84517ca311df059e0aa0a714d08fbb9e6652a0026677bd67860777ba149e0b4f1

                                                                                                  • C:\Users\Admin\j29oAE.exe

                                                                                                    Filesize

                                                                                                    176KB

                                                                                                    MD5

                                                                                                    c4a634088e095eab98183984bb7252d8

                                                                                                    SHA1

                                                                                                    c205f2c1f8040c9205c6c06accd75c0396c59781

                                                                                                    SHA256

                                                                                                    db345985313397a39cc2817134315c8db71ab4c48680e62c0358db406b0eff6a

                                                                                                    SHA512

                                                                                                    b6a30f6d5cc30bee9b9d483629f16c80c5338360cec629f9ee2a3307b73b9743fd71396e408ac72008b84f4b8fded26002c910421853253b52b8b4d530df7a8e

                                                                                                  • C:\Users\Admin\pivid.exe

                                                                                                    Filesize

                                                                                                    176KB

                                                                                                    MD5

                                                                                                    452eb9c5cdb2ee6bce1499f24adf8829

                                                                                                    SHA1

                                                                                                    efc2de71913be529ece1b2a9e789b3d00c1e6828

                                                                                                    SHA256

                                                                                                    d144f43e69048a993564e125aaef45518413f17cbc0a8c02512fcebd4e0a04e0

                                                                                                    SHA512

                                                                                                    b27cd9b24386a918222312a5ba524030ba3653972fe1e1559922e2badae829b5b56fdf4775de99d4ff40fea615d7da07f45a9ed5105a2a3b64b3eed59b43d266

                                                                                                  • memory/448-546-0x00000000042F0000-0x00000000042F1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/1016-209-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                                    Filesize

                                                                                                    424KB

                                                                                                  • memory/1056-49-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1056-50-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1056-72-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1056-47-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1180-53-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                  • memory/1180-51-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                  • memory/1180-55-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                  • memory/1180-54-0x0000000000400000-0x000000000040E000-memory.dmp

                                                                                                    Filesize

                                                                                                    56KB

                                                                                                  • memory/1628-384-0x00000203B7560000-0x00000203B7580000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1628-397-0x00000203B7520000-0x00000203B7540000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1628-380-0x00000203B6400000-0x00000203B6500000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1628-412-0x00000203B7930000-0x00000203B7950000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/1628-379-0x00000203B6400000-0x00000203B6500000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/1832-63-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1832-65-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1832-67-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/1832-93-0x0000000000400000-0x0000000000407000-memory.dmp

                                                                                                    Filesize

                                                                                                    28KB

                                                                                                  • memory/2028-862-0x0000000004BD0000-0x0000000004BD1000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/2696-96-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                                    Filesize

                                                                                                    424KB

                                                                                                  • memory/2872-377-0x0000000002A60000-0x0000000002A61000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/3668-94-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                                    Filesize

                                                                                                    424KB

                                                                                                  • memory/3668-854-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                                    Filesize

                                                                                                    424KB

                                                                                                  • memory/3668-207-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                                    Filesize

                                                                                                    424KB

                                                                                                  • memory/3716-549-0x000001F202500000-0x000001F202600000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/3716-548-0x000001F202500000-0x000001F202600000-memory.dmp

                                                                                                    Filesize

                                                                                                    1024KB

                                                                                                  • memory/3716-553-0x000001F2032D0000-0x000001F2032F0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3716-583-0x000001F2038A0000-0x000001F2038C0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/3716-567-0x000001F203290000-0x000001F2032B0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5072-58-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                                                    Filesize

                                                                                                    152KB

                                                                                                  • memory/5072-62-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                                                    Filesize

                                                                                                    152KB

                                                                                                  • memory/5072-61-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                                                    Filesize

                                                                                                    152KB

                                                                                                  • memory/5072-60-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                                                    Filesize

                                                                                                    152KB

                                                                                                  • memory/5072-92-0x0000000000400000-0x0000000000426000-memory.dmp

                                                                                                    Filesize

                                                                                                    152KB

                                                                                                  • memory/5316-725-0x000001D76EB20000-0x000001D76EB40000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5316-756-0x000001D76F100000-0x000001D76F120000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5316-736-0x000001D76EAE0000-0x000001D76EB00000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5500-825-0x0000000000400000-0x000000000041C000-memory.dmp

                                                                                                    Filesize

                                                                                                    112KB

                                                                                                  • memory/5732-868-0x0000021644FC0000-0x0000021644FE0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5732-880-0x0000021644F80000-0x0000021644FA0000-memory.dmp

                                                                                                    Filesize

                                                                                                    128KB

                                                                                                  • memory/5996-717-0x0000000004670000-0x0000000004671000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB