Analysis

  • max time kernel
    130s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 11:53

General

  • Target

    d1df3e232d829e19548fbd1e3d22e6b0_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    d1df3e232d829e19548fbd1e3d22e6b0

  • SHA1

    4b0e9778f55522523fee9d1f816f8acc2ff333c3

  • SHA256

    88827d8157fa3794fc33a74d077922a09c60a8e8032967d43d9354299666873a

  • SHA512

    a76dbaa63e0b2e34f38c0ac7a9a2fce61c260df4ba5c23bcd50e27f96ff691171eb622873f3a9537a329cc6f01361c5c8f7e9e9aa06487030d076033dc1a087b

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZb:0UzeyQMS4DqodCnoe+iitjWwwf

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 40 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d1df3e232d829e19548fbd1e3d22e6b0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d1df3e232d829e19548fbd1e3d22e6b0_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4312
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3864
      • C:\Users\Admin\AppData\Local\Temp\d1df3e232d829e19548fbd1e3d22e6b0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\d1df3e232d829e19548fbd1e3d22e6b0_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4836
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1064
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:220
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3768
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4636
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1312
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:2496
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4664
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2344
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1884
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1588
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1008
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1272
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:5060
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:5052
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4376
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4276
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3008
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1528
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3644
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:3436
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4660
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4132
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2484
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4084
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4544
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1624
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:5072
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1612
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:636
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:644
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4336
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3296
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1880
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2472
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2688
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1536
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3512
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:544
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2256
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:1812
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2648
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4360
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4056
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4356
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4840
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2380
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4116
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4772
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4272
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:264
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:1176
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:1216
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:972
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:3776
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:628
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3476
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:4400
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:468
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                        PID:2360
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                            PID:4152
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:3308
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:1308
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:4672
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:1672
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:2716
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • Suspicious use of SetWindowsHookEx
                        PID:2920
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1500
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:552
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:4496
                          • \??\c:\windows\system\explorer.exe
                            "c:\windows\system\explorer.exe"
                            8⤵
                              PID:4516
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:4016
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • Suspicious use of SetWindowsHookEx
                          PID:4884
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        PID:4900
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:3464
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:3260
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:1184
                              • \??\c:\windows\system\explorer.exe
                                c:\windows\system\explorer.exe
                                7⤵
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:2888
                                • \??\c:\windows\system\explorer.exe
                                  "c:\windows\system\explorer.exe"
                                  8⤵
                                    PID:3964
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              • System Location Discovery: System Language Discovery
                              PID:868
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:3224
                                • \??\c:\windows\system\explorer.exe
                                  c:\windows\system\explorer.exe
                                  7⤵
                                  • Drops file in Windows directory
                                  PID:1444
                                  • \??\c:\windows\system\explorer.exe
                                    "c:\windows\system\explorer.exe"
                                    8⤵
                                      PID:4200
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:2252
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4364
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:1936
                                    • \??\c:\windows\system\explorer.exe
                                      "c:\windows\system\explorer.exe"
                                      8⤵
                                        PID:1704
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:560
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:1504
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • Drops file in Windows directory
                                        PID:1340
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:4268
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:4148
                                        • \??\c:\windows\system\explorer.exe
                                          c:\windows\system\explorer.exe
                                          7⤵
                                            PID:4744
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Executes dropped EXE
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:3044
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:4860
                                            • \??\c:\windows\system\explorer.exe
                                              c:\windows\system\explorer.exe
                                              7⤵
                                                PID:4500
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Drops file in Windows directory
                                            PID:672
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:2088
                                                • \??\c:\windows\system\explorer.exe
                                                  c:\windows\system\explorer.exe
                                                  7⤵
                                                    PID:3428
                                              • \??\c:\windows\system\spoolsv.exe
                                                c:\windows\system\spoolsv.exe SE
                                                5⤵
                                                  PID:1696
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                      PID:4220
                                                      • \??\c:\windows\system\explorer.exe
                                                        c:\windows\system\explorer.exe
                                                        7⤵
                                                          PID:1048
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2612
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                          PID:2728
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Drops file in Windows directory
                                                        PID:444
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          "c:\windows\system\spoolsv.exe"
                                                          6⤵
                                                            PID:660
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3832
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            "c:\windows\system\spoolsv.exe"
                                                            6⤵
                                                              PID:3268
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                              PID:2760
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                "c:\windows\system\spoolsv.exe"
                                                                6⤵
                                                                  PID:536
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                • Drops file in Windows directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:828
                                                                • \??\c:\windows\system\spoolsv.exe
                                                                  "c:\windows\system\spoolsv.exe"
                                                                  6⤵
                                                                    PID:1284
                                                                    • \??\c:\windows\system\explorer.exe
                                                                      c:\windows\system\explorer.exe
                                                                      7⤵
                                                                        PID:3700
                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                    c:\windows\system\spoolsv.exe SE
                                                                    5⤵
                                                                    • Drops file in Windows directory
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:772
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      "c:\windows\system\spoolsv.exe"
                                                                      6⤵
                                                                        PID:1232
                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                      c:\windows\system\spoolsv.exe SE
                                                                      5⤵
                                                                      • Drops file in Windows directory
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:2148
                                                                      • \??\c:\windows\system\spoolsv.exe
                                                                        "c:\windows\system\spoolsv.exe"
                                                                        6⤵
                                                                          PID:740
                                                                      • \??\c:\windows\system\spoolsv.exe
                                                                        c:\windows\system\spoolsv.exe SE
                                                                        5⤵
                                                                        • Drops file in Windows directory
                                                                        • System Location Discovery: System Language Discovery
                                                                        PID:3524
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          "c:\windows\system\spoolsv.exe"
                                                                          6⤵
                                                                            PID:2952
                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                          c:\windows\system\spoolsv.exe SE
                                                                          5⤵
                                                                          • Drops file in Windows directory
                                                                          • System Location Discovery: System Language Discovery
                                                                          PID:2264
                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                            "c:\windows\system\spoolsv.exe"
                                                                            6⤵
                                                                              PID:4912
                                                                              • \??\c:\windows\system\explorer.exe
                                                                                c:\windows\system\explorer.exe
                                                                                7⤵
                                                                                  PID:3060
                                                                            • \??\c:\windows\system\spoolsv.exe
                                                                              c:\windows\system\spoolsv.exe SE
                                                                              5⤵
                                                                              • Drops file in Windows directory
                                                                              • System Location Discovery: System Language Discovery
                                                                              PID:4972
                                                                              • \??\c:\windows\system\spoolsv.exe
                                                                                "c:\windows\system\spoolsv.exe"
                                                                                6⤵
                                                                                  PID:4596
                                                                              • \??\c:\windows\system\spoolsv.exe
                                                                                c:\windows\system\spoolsv.exe SE
                                                                                5⤵
                                                                                • Drops file in Windows directory
                                                                                PID:4388
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  "c:\windows\system\spoolsv.exe"
                                                                                  6⤵
                                                                                    PID:3476
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                  • Drops file in Windows directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2144
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                  • Drops file in Windows directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4984
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                  • Drops file in Windows directory
                                                                                  PID:832
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                  • Drops file in Windows directory
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:2724
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                  • Drops file in Windows directory
                                                                                  PID:4464
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  PID:4800
                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                  5⤵
                                                                                    PID:3616
                                                                                  • \??\c:\windows\system\spoolsv.exe
                                                                                    c:\windows\system\spoolsv.exe SE
                                                                                    5⤵
                                                                                      PID:2100
                                                                                    • \??\c:\windows\system\spoolsv.exe
                                                                                      c:\windows\system\spoolsv.exe SE
                                                                                      5⤵
                                                                                        PID:1980
                                                                                      • \??\c:\windows\system\spoolsv.exe
                                                                                        c:\windows\system\spoolsv.exe SE
                                                                                        5⤵
                                                                                          PID:3492
                                                                                        • \??\c:\windows\system\spoolsv.exe
                                                                                          c:\windows\system\spoolsv.exe SE
                                                                                          5⤵
                                                                                            PID:1860
                                                                                          • \??\c:\windows\system\spoolsv.exe
                                                                                            c:\windows\system\spoolsv.exe SE
                                                                                            5⤵
                                                                                              PID:4308
                                                                                            • \??\c:\windows\system\spoolsv.exe
                                                                                              c:\windows\system\spoolsv.exe SE
                                                                                              5⤵
                                                                                                PID:5064
                                                                                              • \??\c:\windows\system\spoolsv.exe
                                                                                                c:\windows\system\spoolsv.exe SE
                                                                                                5⤵
                                                                                                  PID:4680
                                                                                                • \??\c:\windows\system\spoolsv.exe
                                                                                                  c:\windows\system\spoolsv.exe SE
                                                                                                  5⤵
                                                                                                    PID:3764
                                                                                          • C:\Windows\system32\svchost.exe
                                                                                            C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                                                            1⤵
                                                                                              PID:2240

                                                                                            Network

                                                                                            MITRE ATT&CK Enterprise v15

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Windows\Parameters.ini

                                                                                              Filesize

                                                                                              74B

                                                                                              MD5

                                                                                              6687785d6a31cdf9a5f80acb3abc459b

                                                                                              SHA1

                                                                                              1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                                                              SHA256

                                                                                              3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                                                              SHA512

                                                                                              5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                                                            • C:\Windows\System\explorer.exe

                                                                                              Filesize

                                                                                              2.2MB

                                                                                              MD5

                                                                                              77373d03b8d4e5fa935b6cfe4ec78eae

                                                                                              SHA1

                                                                                              061e57d3f00e984f046adb0fc928d074fcbf9f35

                                                                                              SHA256

                                                                                              c640b194e1269a828e2ef1c5612b2367d48c8feb5079052a996d1724cf19556f

                                                                                              SHA512

                                                                                              54e8c29ca110751bd22b56cf8b82476b8b52b716a6fcbf0b180e94e7d01411154b6767fc8ab13bfa6759a7c8b9185c9d6ccc3468fcf974bedafc54ca2260c169

                                                                                            • C:\Windows\System\spoolsv.exe

                                                                                              Filesize

                                                                                              2.2MB

                                                                                              MD5

                                                                                              4d8846078ef0fae06fea2cb91bfb1b05

                                                                                              SHA1

                                                                                              6bc04811e6976a9d901ad458af560c989628fb21

                                                                                              SHA256

                                                                                              46fcb0aefe8e9a8b7931c544b89d9f1438921be57688da683eed04be66d6e342

                                                                                              SHA512

                                                                                              c8ee003d2e04c132ffbed278dd2ce6670b989bcb5654a1f7e785b96a224009b6ea35ad104e1cf6d858f6b57a4acba495bae82dd2c20b8417b004775303eac925

                                                                                            • memory/220-4577-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/220-782-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/220-69-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/264-2847-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/264-2978-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/468-3015-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/536-5560-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/544-4627-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/552-3359-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/552-3186-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/628-2186-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/636-1657-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/644-2441-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/740-5748-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/740-5745-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/972-2176-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/1008-1108-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/1064-70-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/1064-64-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/1184-3566-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1184-3436-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1216-4964-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1232-5658-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1272-2209-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1284-5817-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1308-3024-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1504-4615-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1504-4775-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1528-2392-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1536-2663-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1536-2817-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1588-2199-0x0000000000440000-0x0000000000509000-memory.dmp

                                                                                              Filesize

                                                                                              804KB

                                                                                            • memory/1588-2198-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1612-2434-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1624-2421-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1672-3094-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1812-2671-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/1880-1724-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/1884-2201-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/1884-1052-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/2088-5409-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2256-1864-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/2344-2187-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2380-2698-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2472-2643-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2484-1448-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/2496-4013-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2648-1986-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/2688-1792-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/2728-5458-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2920-3106-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/2920-3102-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3008-1376-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/3224-3854-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3224-3953-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3268-5482-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3268-5487-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3296-2551-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3436-4414-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3464-3281-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3464-3286-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3476-5923-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3476-2915-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3768-900-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/3768-2177-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/3776-2856-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3776-2853-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/3964-5466-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4056-1987-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4084-2411-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4116-2091-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4132-2401-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4148-4845-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4152-5234-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4200-5729-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4220-5629-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4220-5447-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4272-2169-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4276-2307-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4312-28-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4312-21-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4312-0-0x0000000002320000-0x0000000002321000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/4312-22-0x0000000002320000-0x0000000002321000-memory.dmp

                                                                                              Filesize

                                                                                              4KB

                                                                                            • memory/4336-1658-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4356-2689-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4360-2679-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4364-4296-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4376-1308-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4400-2197-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4516-5445-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4544-1514-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4636-2372-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4636-2178-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4660-1447-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4664-1051-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4664-2189-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4772-2777-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4836-24-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4836-58-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4836-25-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4840-2039-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/4860-5161-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4884-3275-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/4912-5903-0x0000000000400000-0x000000000043E000-memory.dmp

                                                                                              Filesize

                                                                                              248KB

                                                                                            • memory/5060-1219-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB

                                                                                            • memory/5072-1586-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                                                              Filesize

                                                                                              1.8MB