Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 14:00

General

  • Target

    af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe

  • Size

    556KB

  • MD5

    af804b4395b81caec9fbc54b945c5f2f

  • SHA1

    b4a3fed5277a21d96b37a09109519fe573d7084a

  • SHA256

    f2885293397e2fa2fb685a94c0619644015aa98860478efdd8db2b5821ba891d

  • SHA512

    19aea01695afe75568a93bd373179065f868aa9b8c054cf58cf35a4843504efc87d5fc58ad530607430f62f32bd59b9725d89952aac6991b69a1b62533aa7d8f

  • SSDEEP

    6144:9++yM3HiP/qp9LGM+yM3HCP/54pcNJcF4Y+Ox3ZP9nC+mCEjknHKuEb4naZDRS:9+niHV3VniH24+Y4Y39zntHKuEwiS

Malware Config

Extracted

Family

cybergate

Version

2.6

Botnet

Mamacitas

C2

spy2281.no-ip.org:777

Mutex

MICROSOF

Attributes
  • enable_keylogger

    true

  • enable_message_box

    false

  • ftp_directory

    ./logs/

  • ftp_interval

    30

  • injected_process

    svchost.exe

  • install_dir

    System32

  • install_file

    svchost.exe

  • install_flag

    true

  • keylogger_enable_ftp

    false

  • message_box_caption

    Try again

  • message_box_title

    Application error

  • password

    cache

  • regkey_hkcu

    USER\windows

  • regkey_hklm

    MACHINE

Signatures

  • CyberGate, Rebhip

    CyberGate is a lightweight remote administration tool with a wide array of functionalities.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 12 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:616
      • C:\Windows\system32\fontdrvhost.exe
        "fontdrvhost.exe"
        2⤵
          PID:800
        • C:\Windows\system32\dwm.exe
          "dwm.exe"
          2⤵
            PID:332
        • C:\Windows\system32\lsass.exe
          C:\Windows\system32\lsass.exe
          1⤵
            PID:672
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k DcomLaunch -p
            1⤵
              PID:784
              • C:\Windows\system32\wbem\unsecapp.exe
                C:\Windows\system32\wbem\unsecapp.exe -Embedding
                2⤵
                  PID:3172
                • C:\Windows\system32\DllHost.exe
                  C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                  2⤵
                    PID:3800
                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                    2⤵
                      PID:3888
                    • C:\Windows\System32\RuntimeBroker.exe
                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                      2⤵
                        PID:3956
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        2⤵
                          PID:4044
                        • C:\Windows\System32\RuntimeBroker.exe
                          C:\Windows\System32\RuntimeBroker.exe -Embedding
                          2⤵
                            PID:3740
                          • C:\Windows\system32\SppExtComObj.exe
                            C:\Windows\system32\SppExtComObj.exe -Embedding
                            2⤵
                              PID:5076
                            • C:\Windows\system32\DllHost.exe
                              C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
                              2⤵
                                PID:4756
                              • C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe
                                "C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca
                                2⤵
                                  PID:628
                                • C:\Windows\System32\RuntimeBroker.exe
                                  C:\Windows\System32\RuntimeBroker.exe -Embedding
                                  2⤵
                                    PID:1536
                                  • C:\Windows\System32\RuntimeBroker.exe
                                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                                    2⤵
                                      PID:4660
                                    • C:\Windows\System32\RuntimeBroker.exe
                                      C:\Windows\System32\RuntimeBroker.exe -Embedding
                                      2⤵
                                        PID:2264
                                      • C:\Windows\system32\backgroundTaskHost.exe
                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca
                                        2⤵
                                          PID:4708
                                        • C:\Windows\system32\backgroundTaskHost.exe
                                          "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                          2⤵
                                            PID:4772
                                          • C:\Windows\system32\wbem\wmiprvse.exe
                                            C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                            2⤵
                                              PID:3528
                                            • C:\Windows\System32\mousocoreworker.exe
                                              C:\Windows\System32\mousocoreworker.exe -Embedding
                                              2⤵
                                                PID:4924
                                              • C:\Windows\system32\backgroundTaskHost.exe
                                                "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                2⤵
                                                  PID:4092
                                                • C:\Windows\system32\BackgroundTransferHost.exe
                                                  "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                  2⤵
                                                    PID:4592
                                                  • C:\Windows\system32\BackgroundTransferHost.exe
                                                    "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                    2⤵
                                                      PID:904
                                                    • C:\Windows\system32\BackgroundTransferHost.exe
                                                      "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                      2⤵
                                                        PID:2220
                                                      • C:\Windows\system32\backgroundTaskHost.exe
                                                        "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                        2⤵
                                                          PID:3692
                                                        • C:\Windows\system32\BackgroundTransferHost.exe
                                                          "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                          2⤵
                                                            PID:1504
                                                          • C:\Windows\system32\BackgroundTransferHost.exe
                                                            "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                            2⤵
                                                              PID:3944
                                                            • C:\Windows\system32\BackgroundTransferHost.exe
                                                              "BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.1
                                                              2⤵
                                                                PID:2052
                                                              • C:\Windows\system32\DllHost.exe
                                                                C:\Windows\system32\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
                                                                2⤵
                                                                  PID:4700
                                                                • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                                                                  C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                                                                  2⤵
                                                                    PID:1748
                                                                  • C:\Windows\system32\backgroundTaskHost.exe
                                                                    "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                    2⤵
                                                                      PID:2964
                                                                  • C:\Windows\system32\fontdrvhost.exe
                                                                    "fontdrvhost.exe"
                                                                    1⤵
                                                                      PID:792
                                                                    • C:\Windows\system32\svchost.exe
                                                                      C:\Windows\system32\svchost.exe -k RPCSS -p
                                                                      1⤵
                                                                        PID:912
                                                                      • C:\Windows\system32\svchost.exe
                                                                        C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                                        1⤵
                                                                          PID:960
                                                                        • C:\Windows\system32\svchost.exe
                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                                                          1⤵
                                                                            PID:656
                                                                          • C:\Windows\system32\svchost.exe
                                                                            C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork -p
                                                                            1⤵
                                                                              PID:392
                                                                            • C:\Windows\System32\svchost.exe
                                                                              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                                                              1⤵
                                                                                PID:1064
                                                                              • C:\Windows\System32\svchost.exe
                                                                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                                                                1⤵
                                                                                  PID:1072
                                                                                • C:\Windows\system32\svchost.exe
                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                                                                  1⤵
                                                                                    PID:1080
                                                                                  • C:\Windows\system32\svchost.exe
                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                                                                    1⤵
                                                                                      PID:1244
                                                                                      • C:\Windows\system32\taskhostw.exe
                                                                                        taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                                                                                        2⤵
                                                                                          PID:2656
                                                                                      • C:\Windows\System32\svchost.exe
                                                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                                                                        1⤵
                                                                                          PID:1276
                                                                                        • C:\Windows\system32\svchost.exe
                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                                                                          1⤵
                                                                                            PID:1304
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                                                                            1⤵
                                                                                              PID:1336
                                                                                            • C:\Windows\system32\svchost.exe
                                                                                              C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                                                                              1⤵
                                                                                                PID:1412
                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                                                                                1⤵
                                                                                                  PID:1428
                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                  C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                                                                                  1⤵
                                                                                                    PID:1448
                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                                                                                    1⤵
                                                                                                      PID:1516
                                                                                                      • C:\Windows\system32\sihost.exe
                                                                                                        sihost.exe
                                                                                                        2⤵
                                                                                                          PID:2532
                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                        C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                                                                                        1⤵
                                                                                                          PID:1596
                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                                                                                          1⤵
                                                                                                            PID:1664
                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                                                                                            1⤵
                                                                                                              PID:1716
                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                                                                                              1⤵
                                                                                                                PID:1724
                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                                                                                                1⤵
                                                                                                                  PID:1784
                                                                                                                • C:\Windows\System32\svchost.exe
                                                                                                                  C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                                                  1⤵
                                                                                                                    PID:1876
                                                                                                                  • C:\Windows\system32\svchost.exe
                                                                                                                    C:\Windows\system32\svchost.exe -k appmodel -p -s StateRepository
                                                                                                                    1⤵
                                                                                                                      PID:2000
                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                      C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                                                                                                      1⤵
                                                                                                                        PID:1120
                                                                                                                      • C:\Windows\System32\svchost.exe
                                                                                                                        C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                                                                                                        1⤵
                                                                                                                          PID:1132
                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s Winmgmt
                                                                                                                          1⤵
                                                                                                                            PID:1804
                                                                                                                          • C:\Windows\System32\svchost.exe
                                                                                                                            C:\Windows\System32\svchost.exe -k netsvcs -p -s ShellHWDetection
                                                                                                                            1⤵
                                                                                                                              PID:2072
                                                                                                                            • C:\Windows\System32\spoolsv.exe
                                                                                                                              C:\Windows\System32\spoolsv.exe
                                                                                                                              1⤵
                                                                                                                                PID:2204
                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -s RmSvc
                                                                                                                                1⤵
                                                                                                                                  PID:2224
                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNoNetworkFirewall -p
                                                                                                                                  1⤵
                                                                                                                                    PID:2304
                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                    C:\Windows\System32\svchost.exe -k NetworkService -p -s LanmanWorkstation
                                                                                                                                    1⤵
                                                                                                                                      PID:2348
                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                      C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc
                                                                                                                                      1⤵
                                                                                                                                        PID:2552
                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s TokenBroker
                                                                                                                                        1⤵
                                                                                                                                          PID:2648
                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                          C:\Windows\system32\svchost.exe -k netsvcs -p -s IKEEXT
                                                                                                                                          1⤵
                                                                                                                                            PID:2672
                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                            C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted -p -s PolicyAgent
                                                                                                                                            1⤵
                                                                                                                                              PID:2680
                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                              C:\Windows\system32\svchost.exe -k NetworkService -p -s CryptSvc
                                                                                                                                              1⤵
                                                                                                                                                PID:2724
                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                C:\Windows\system32\svchost.exe -k netsvcs -p -s LanmanServer
                                                                                                                                                1⤵
                                                                                                                                                  PID:2820
                                                                                                                                                • C:\Windows\sysmon.exe
                                                                                                                                                  C:\Windows\sysmon.exe
                                                                                                                                                  1⤵
                                                                                                                                                    PID:2832
                                                                                                                                                  • C:\Windows\System32\svchost.exe
                                                                                                                                                    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s TrkWks
                                                                                                                                                    1⤵
                                                                                                                                                      PID:2848
                                                                                                                                                    • C:\Windows\system32\svchost.exe
                                                                                                                                                      C:\Windows\system32\svchost.exe -k netsvcs -p -s WpnService
                                                                                                                                                      1⤵
                                                                                                                                                        PID:2856
                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                        C:\Windows\system32\svchost.exe -k LocalService -p -s CDPSvc
                                                                                                                                                        1⤵
                                                                                                                                                          PID:3428
                                                                                                                                                        • C:\Windows\Explorer.EXE
                                                                                                                                                          C:\Windows\Explorer.EXE
                                                                                                                                                          1⤵
                                                                                                                                                            PID:3444
                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe
                                                                                                                                                              "C:\Users\Admin\AppData\Local\Temp\af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe"
                                                                                                                                                              2⤵
                                                                                                                                                              • Suspicious use of SetThreadContext
                                                                                                                                                              • System Location Discovery: System Language Discovery
                                                                                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                                                                                              • Suspicious use of WriteProcessMemory
                                                                                                                                                              PID:3640
                                                                                                                                                              • C:\Users\Admin\AppData\Local\Temp\af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe
                                                                                                                                                                "C:\Users\Admin\AppData\Local\Temp\af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe"
                                                                                                                                                                3⤵
                                                                                                                                                                • Adds policy Run key to start application
                                                                                                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                                • Adds Run key to start application
                                                                                                                                                                • Drops file in System32 directory
                                                                                                                                                                • System Location Discovery: System Language Discovery
                                                                                                                                                                • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                • Suspicious use of FindShellTrayWindow
                                                                                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                                                                                PID:4260
                                                                                                                                                                • C:\Windows\SysWOW64\explorer.exe
                                                                                                                                                                  explorer.exe
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Boot or Logon Autostart Execution: Active Setup
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  PID:2444
                                                                                                                                                                • C:\Users\Admin\AppData\Local\Temp\af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe
                                                                                                                                                                  "C:\Users\Admin\AppData\Local\Temp\af804b4395b81caec9fbc54b945c5f2f_JaffaCakes118.exe"
                                                                                                                                                                  4⤵
                                                                                                                                                                  • Checks computer location settings
                                                                                                                                                                  • System Location Discovery: System Language Discovery
                                                                                                                                                                  • Modifies registry class
                                                                                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                  • Suspicious behavior: GetForegroundWindowSpam
                                                                                                                                                                  • Suspicious use of AdjustPrivilegeToken
                                                                                                                                                                  PID:3240
                                                                                                                                                                  • C:\Users\Admin\AppData\Roaming\System32\svchost.exe
                                                                                                                                                                    "C:\Users\Admin\AppData\Roaming\System32\svchost.exe"
                                                                                                                                                                    5⤵
                                                                                                                                                                    • Executes dropped EXE
                                                                                                                                                                    • Suspicious use of SetThreadContext
                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                                                                                    PID:4500
                                                                                                                                                                    • C:\Users\Admin\AppData\Roaming\System32\svchost.exe
                                                                                                                                                                      "C:\Users\Admin\AppData\Roaming\System32\svchost.exe"
                                                                                                                                                                      6⤵
                                                                                                                                                                      • Executes dropped EXE
                                                                                                                                                                      PID:924
                                                                                                                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 924 -s 536
                                                                                                                                                                        7⤵
                                                                                                                                                                        • Program crash
                                                                                                                                                                        • Checks processor information in registry
                                                                                                                                                                        • Enumerates system info in registry
                                                                                                                                                                        • Suspicious behavior: EnumeratesProcesses
                                                                                                                                                                        PID:2896
                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                            C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc
                                                                                                                                                            1⤵
                                                                                                                                                              PID:3616
                                                                                                                                                            • C:\Windows\System32\svchost.exe
                                                                                                                                                              C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
                                                                                                                                                              1⤵
                                                                                                                                                                PID:1128
                                                                                                                                                              • C:\Windows\system32\svchost.exe
                                                                                                                                                                C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:4300
                                                                                                                                                                • C:\Windows\system32\svchost.exe
                                                                                                                                                                  C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s WinHttpAutoProxySvc
                                                                                                                                                                  1⤵
                                                                                                                                                                    PID:64
                                                                                                                                                                  • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
                                                                                                                                                                    "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" /service
                                                                                                                                                                    1⤵
                                                                                                                                                                      PID:3228
                                                                                                                                                                    • C:\Windows\System32\svchost.exe
                                                                                                                                                                      C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                                                                                                                                                      1⤵
                                                                                                                                                                        PID:4008
                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
                                                                                                                                                                        1⤵
                                                                                                                                                                          PID:2516
                                                                                                                                                                        • C:\Windows\system32\svchost.exe
                                                                                                                                                                          C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s NgcCtnrSvc
                                                                                                                                                                          1⤵
                                                                                                                                                                            PID:5020
                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s Appinfo
                                                                                                                                                                            1⤵
                                                                                                                                                                              PID:868
                                                                                                                                                                            • C:\Windows\system32\svchost.exe
                                                                                                                                                                              C:\Windows\system32\svchost.exe -k appmodel -p -s camsvc
                                                                                                                                                                              1⤵
                                                                                                                                                                                PID:1388
                                                                                                                                                                              • C:\Windows\System32\svchost.exe
                                                                                                                                                                                C:\Windows\System32\svchost.exe -k WerSvcGroup
                                                                                                                                                                                1⤵
                                                                                                                                                                                  PID:1624
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 924 -ip 924
                                                                                                                                                                                    2⤵
                                                                                                                                                                                    • Suspicious use of NtCreateProcessExOtherParentProcess
                                                                                                                                                                                    • System Location Discovery: System Language Discovery
                                                                                                                                                                                    PID:4884
                                                                                                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                                                                                                    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4884 -ip 4884
                                                                                                                                                                                    2⤵
                                                                                                                                                                                      PID:1504
                                                                                                                                                                                  • C:\Windows\System32\WaaSMedicAgent.exe
                                                                                                                                                                                    C:\Windows\System32\WaaSMedicAgent.exe 284f6c91774a26277ac26c5bbe37c215 YK5En+DN+U+j0VRyVDpmcw.0.1.0.0.0
                                                                                                                                                                                    1⤵
                                                                                                                                                                                      PID:3416
                                                                                                                                                                                      • C:\Windows\System32\Conhost.exe
                                                                                                                                                                                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                        2⤵
                                                                                                                                                                                          PID:952
                                                                                                                                                                                      • C:\Windows\system32\svchost.exe
                                                                                                                                                                                        C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                                                                                                                                                                                        1⤵
                                                                                                                                                                                          PID:1944
                                                                                                                                                                                        • C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                          C:\Windows\servicing\TrustedInstaller.exe
                                                                                                                                                                                          1⤵
                                                                                                                                                                                            PID:4580
                                                                                                                                                                                          • C:\Windows\system32\svchost.exe
                                                                                                                                                                                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                                                                                                                                            1⤵
                                                                                                                                                                                              PID:2636

                                                                                                                                                                                            Network

                                                                                                                                                                                            MITRE ATT&CK Enterprise v15

                                                                                                                                                                                            Replay Monitor

                                                                                                                                                                                            Loading Replay Monitor...

                                                                                                                                                                                            Downloads

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XX--XX--XX.txt

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              240KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              9eaf9c54897df5a0ef8fde576b608e6a

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              f82ef4eb6826f906b9b9bd3acd34391d2e059c39

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              21bb97a5d2439fea315b61a9591da3478f8d035193cbdbc8d73996b5942201ac

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              f275839e40c0f905f56f94513beeb12a3601c5da0694d2f96a2ee9b7ec73e208615ff0602ae1fd1167bcc6d27e04318091979a0672e252cbe96d914f61b8a733

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              6cac44900e872c60d803b6ee6bfb297e

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              a254f465d2f83a48775713abf9bb00320b00a79e

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              417d6b7baf28abc4175158bfb1cce5ea8f42274a0a0548ef64d4b3c1ce875792

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              78352c98fdf1d80c10daa5c6331f046e8b0348451578d1a8e5c2bf82380f0f2c1a7dec65760dc18576e3f47af505d249b458a2eefffbb0e48488643aee29e8bd

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              5712a367a587f81093a0c7357ebbba25

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              1fce2025508f5eefd1119e1b49391c19120b5044

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              6082fd06b4eb299da47896b17f37cb8b256ea3133dbd7e2a8058a25000498567

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              546374a0df4ce257a8241eb1032cf2f4f54da28b4fb44d46b1a50dde4a8fca39d94b3115cd5a20f96c311729770f3a4ff352a68811a04e61db4d934a89dde578

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              261c39d517c93d0f5bc27e6ddde5c3ee

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              92ab6a50edd9521255550ce6db75417d890e6d42

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              b41673e3fd0770f2baf254b25df60e2524eacf150f979556d1527b3efaf47036

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              691d7aec679c16b7ac75a686f470771bee2fbfd712680a42b1733ca1a73cfa0923dc8f77dce1d9a53890483278f19a954f21112ab10bb54afdb1cb7545b0e3d2

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              3068a48dfdf5907532a2275939cb0a47

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              db72df322ce51db7618d7746189bcf67ea9eb2cc

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              a669243e39dbdd443826e141682cc4423ec50f2ae1ca2d2701030f6e0fd9bb41

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              be61970a4a580ed93c5760e98628b950e8bbd4fa4d57da336d6d49bfe5d5b568b7b9f556f8c7beec41121f61f52d6ca4dd31e3888f500f40829cf6e38d06fd00

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              de31501e36adc8c12911b3b2424d0b56

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              eed69b1315ffbafa653980a4712a9a341d2f8c53

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              9fa5488bd941bfbdacfa6414e8326d8478981b15e99e438eb77708ad055ed483

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              0b6b6b33805c3dc5813f1a50f1d3030e0857a8a926ba8e565cb3d57383cf8ef8c4fbc4baad74a1a8e50c1ebfc566392d3a89474d0d7387238181f4ff91b5f3b3

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              5be815a58fad767f50eaaa58e8c48cc9

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              0ac60e81d0d930eceb106d3e7e9859678aa476ff

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              e4a0428d62a36b5d4d8b8394f39acd946a79005cf4e83eabc63f55148196e109

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              3d96b42eca748ba1c09b50a8edb1d2e7e92efe81586bdcc5d2f7e8ae40c1876aa0f213acac05e69ed4f0552dac38df7f3c828f5b7e3aee19e2f819a4280158a4

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              1becab8657c003615fc66a8187114d67

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              6f42622828ff841dd7fa0b331283400a372df422

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              971f5d2a1c19418618e85bd192bfe01cb064304a30d64d2425c05357d9fb4685

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              522e4fdfd4a55144588855f582ee78842fb34e01f1afafdc407bd92bee92ca3eec1fed53956e2c357e92a35ea11b063bc16fc91921f5c3b5fb24beb0bfa4225e

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              cebdbf447096913dcae1de4a1e6608be

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              4add59d07bd57d8dbe72e31b01f07747774638de

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              d9267e1b18fbc25aef761ff04ed842cc6877fc8d46884595afb3101790f7ab8a

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              14a7a5dc3129cd7801865fe71e0e83cbb7259cd793b2f48017687a44216abf39e0bc129bfa9eb1881fd0c5995c797957720cdf287a88339067537aa2f465e565

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              e1f97d19f8e76122a7d0bea98d1742b3

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              3e32ca30c887f5249724459c63873fbfe9a27f18

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              87369ffec55988419b9cd97d972ec07338da7d46e97698eb75a310093a7b5121

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              a900e74edeeeb7cd4bc56cfbcc6bff5317f3ae101f2aa5914fcf60fa297d4bf026f4c51461c2a277e7a1f983fde0eb71a2aabfcca02daf3d4b56eb8ad1e54486

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              16f6228c8f44f83ecdeb3ec5ae043b2b

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              c1741a3daf7114faffe8c60d458a1b5f044196b9

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              d17d9465b3e8f4bd80d60a3b832868a7b1e7d3d4f7fdc87d0cce5912b8969634

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              e9ce3d98fad5949af52f7517dbe02a9404058b4d133b46073f1902d6f54e4a224025fb2da2fe60dc6af8c97fc1b5129213ac3bebfa8378dae141695b9309da1b

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              5c33ce1daf8949bb613428782e3a5abc

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              8f41820d57fbcb974302ed12166397b2c431a83a

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              3895847ea4e033b26a77f638a2fc9a64729fbd1e2cd5f08ef01cca3e6c3308cd

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              638ef280c7fc4c5b6acc6ed0442ab698bd01b2630b76af95592950c554033187fa09cff3c49e37411d6febe3f1d4720bb431340fe734794f694213877d5e92c4

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              c7009d51f538014f97e1011c148ea5aa

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              c07d93b3b27b201c18b84e36e64da85960acdfc2

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              639e09ff19ce0c0fcc5ab49d6bff5362a170aa4097cd338a5962596ce514e88b

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              23f6faac1b371b8815571407df0069eec86a3fb2791c8716fc0d25d6dcd5ac7e9119fb7a5f910e71546101f9e9ce436638948190203b0bbd574119a641750fa3

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              ac410315a04930bc20b3b0a841567660

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              bffdba62dd03e754a7ba872f17c470a931bbb486

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              ad27b07c10b03c82411fa386ed819396f2f7fde1a56994ae59e6b429ee4f2fa4

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              a7fb36cfd3bb3f090f26dc567ec4c82ba0be570028c7a41e4ecab952f31810f25d771f99eb264571d3f731e8f5a092998e44bf64f1d5baaeb7a5bfac44c331fd

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              d960b71f171c4f144ebaa72568b033b1

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              f9f25d2b1fdb39ed52ac17c2e182f88df328b8f1

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              2e9dc68a7495790365fd9ebc61d4cd631613e62afc7c2a38ab020c93e8b76b17

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              641e8b1e919ba1be917592c9b098a113ca0e294733bc132106066dca06459490b8084612aa1f8611715bfc6abe4a2e29ba136daebee9d9a1ef187cdccb7fd953

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              5f9fffc5bdae5a6acb747fab62b9f2a6

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              e77c69102e4f2785bd676c4fbbaba9d949df2439

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              cab28892e31de35c7e70d89b604850f9d83eaa89ad8c46461cba58eeb743fee0

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              424d2180bb92315bede305a32d14831a8f9670a47ca04558917cf5cab7fb3ae284a549633b5e2686043ad38dd49029295caaa217d8fc1715d50d02cdcd1d5600

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              75bb059d87af0edf761358f8e119b470

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              93fbc08b08ec258153f046f4f87dfc618f248bc3

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              cc1cd819a7e38516914ed2ed7f324c14ebb12e6c8adee86d9c8e35e1cdb4ae00

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              803353efd57098358cd7ace5f9b9134831781250555f0e8b9ca75a4db8221a7f19d397344a675c3157814c6489cc01e45500ff17210c18831145c87e74313721

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              053cc589dff62ea5a8b47891e967823c

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              690b2e2e7b402e276fb7f325410320a8c5963816

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              5c01168420d5329a0c3d2add08fb0a1d665c2d59f29ebeb781a5c470c11d5398

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              260883258347df5af35c8eb20bb808bf609b223ef51dc8d36942ac0b50266a5b91a254f721faeedba4020629917d0320a1c72a80e1a3e12c29f23035576f87e4

                                                                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\XxX.xXx

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              8B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              a4fadd66616520dc7f06a7602808da42

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              888144e1f9bdf284f9d3bf75e581cfa516976eb5

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              ac30028dd2c55213e9f0362b3e9c3968c1c3a320638745af046d0201e3b633ae

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              a51026ad5470a4854290937f0bef1693a2c07a917e5547b9b1d46957a2c3e259172556885bf8b85c2c2aaf6fed265f9d5ef3b1a18035c51d327b0a93136d77b3

                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\System32\svchost.exe

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              556KB

                                                                                                                                                                                              MD5

                                                                                                                                                                                              af804b4395b81caec9fbc54b945c5f2f

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              b4a3fed5277a21d96b37a09109519fe573d7084a

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              f2885293397e2fa2fb685a94c0619644015aa98860478efdd8db2b5821ba891d

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              19aea01695afe75568a93bd373179065f868aa9b8c054cf58cf35a4843504efc87d5fc58ad530607430f62f32bd59b9725d89952aac6991b69a1b62533aa7d8f

                                                                                                                                                                                            • C:\Users\Admin\AppData\Roaming\logs.dat

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              15B

                                                                                                                                                                                              MD5

                                                                                                                                                                                              e21bd9604efe8ee9b59dc7605b927a2a

                                                                                                                                                                                              SHA1

                                                                                                                                                                                              3240ecc5ee459214344a1baac5c2a74046491104

                                                                                                                                                                                              SHA256

                                                                                                                                                                                              51a3fe220229aa3fdddc909e20a4b107e7497320a00792a280a03389f2eacb46

                                                                                                                                                                                              SHA512

                                                                                                                                                                                              42052ad5744ad76494bfa71d78578e545a3b39bfed4c4232592987bd28064b6366a423084f1193d137493c9b13d9ae1faac4cf9cc75eb715542fa56e13ca1493

                                                                                                                                                                                            • memory/924-492-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/924-605-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/2444-622-0x0000000024080000-0x00000000240E2000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              392KB

                                                                                                                                                                                            • memory/2444-78-0x0000000024080000-0x00000000240E2000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              392KB

                                                                                                                                                                                            • memory/2444-17-0x00000000003F0000-0x00000000003F1000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              4KB

                                                                                                                                                                                            • memory/2444-16-0x0000000000330000-0x0000000000331000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              4KB

                                                                                                                                                                                            • memory/3640-0-0x0000000000400000-0x000000000048B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              556KB

                                                                                                                                                                                            • memory/3640-6-0x0000000000400000-0x000000000048B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              556KB

                                                                                                                                                                                            • memory/4260-32-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/4260-149-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/4260-73-0x0000000024080000-0x00000000240E2000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              392KB

                                                                                                                                                                                            • memory/4260-12-0x0000000024010000-0x0000000024072000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              392KB

                                                                                                                                                                                            • memory/4260-8-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/4260-7-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/4260-5-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/4260-3-0x0000000000400000-0x0000000000458000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              352KB

                                                                                                                                                                                            • memory/4500-493-0x0000000000400000-0x000000000048B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              556KB

                                                                                                                                                                                            • memory/4500-487-0x0000000000400000-0x000000000048B000-memory.dmp

                                                                                                                                                                                              Filesize

                                                                                                                                                                                              556KB