Analysis

  • max time kernel
    146s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-09-2024 15:52

General

  • Target

    f0209e6306af60757a7f1b131d220fee_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    f0209e6306af60757a7f1b131d220fee

  • SHA1

    342501e2f59add7ad3d7c820e0af622fe00f0c88

  • SHA256

    955edeca22e0549d407af967e8a637c656bf27260180a32dd001300e34f3ca91

  • SHA512

    fc856e82c0f80beae938520a12e1a22b7c5ed764550ce6763f97248465e3c690ff07634469c604e73704d7ba17e0e75e3534a78a817eaf88b08a5b384521fa1b

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZL:0UzeyQMS4DqodCnoe+iitjWwwH

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 57 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0209e6306af60757a7f1b131d220fee_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f0209e6306af60757a7f1b131d220fee_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4976
      • C:\Users\Admin\AppData\Local\Temp\f0209e6306af60757a7f1b131d220fee_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\f0209e6306af60757a7f1b131d220fee_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2448
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3480
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:5012
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4416
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:5064
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:3580
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:4460
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4248
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4852
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1292
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3732
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4720
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4100
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3468
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:808
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:452
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5116
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:5000
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3048
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2984
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:436
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:3328
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:2396
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1444
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2952
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1748
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4544
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:432
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4088
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3656
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4768
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2156
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4564
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3920
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2044
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1196
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3116
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2056
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4324
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3916
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4804
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1484
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:692
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:4652
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:4568
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2992
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4336
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:4704
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4752
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2676
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2272
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4668
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:3232
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:3620
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:3864
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3684
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2496
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2896
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Suspicious use of SetWindowsHookEx
                  PID:5008
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1616
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:4700
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:4740
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:1568
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:3364
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:4452
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:636
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2944
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1360
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2444
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:2308
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                      PID:2980
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    PID:740
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                        PID:4940
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:3840
                          • \??\c:\windows\system\explorer.exe
                            "c:\windows\system\explorer.exe"
                            8⤵
                              PID:1348
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:3124
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2540
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:3628
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:1480
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:2808
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:1436
                              • \??\c:\windows\system\explorer.exe
                                c:\windows\system\explorer.exe
                                7⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:648
                                • \??\c:\windows\system\explorer.exe
                                  "c:\windows\system\explorer.exe"
                                  8⤵
                                    PID:4660
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:3164
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2240
                                • \??\c:\windows\system\explorer.exe
                                  c:\windows\system\explorer.exe
                                  7⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:2376
                                  • \??\c:\windows\system\explorer.exe
                                    "c:\windows\system\explorer.exe"
                                    8⤵
                                      PID:3660
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:3000
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2120
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    • System Location Discovery: System Language Discovery
                                    PID:2228
                                    • \??\c:\windows\system\explorer.exe
                                      "c:\windows\system\explorer.exe"
                                      8⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2484
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • System Location Discovery: System Language Discovery
                                PID:4296
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                    PID:632
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3604
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • System Location Discovery: System Language Discovery
                                  PID:3028
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:1576
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:2732
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:3412
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2900
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2908
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:3128
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:1152
                                        • \??\c:\windows\system\explorer.exe
                                          c:\windows\system\explorer.exe
                                          7⤵
                                          • Drops file in Windows directory
                                          PID:1820
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      PID:4584
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:3440
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      PID:2640
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2196
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      • System Location Discovery: System Language Discovery
                                      PID:4300
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                          PID:3772
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Suspicious use of SetThreadContext
                                        PID:4048
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:2096
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Windows directory
                                          PID:3240
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:468
                                            • \??\c:\windows\system\explorer.exe
                                              c:\windows\system\explorer.exe
                                              7⤵
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:4184
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Suspicious use of SetThreadContext
                                          PID:3632
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1296
                                            • \??\c:\windows\system\explorer.exe
                                              c:\windows\system\explorer.exe
                                              7⤵
                                                PID:2104
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Suspicious use of SetThreadContext
                                            • Drops file in Windows directory
                                            PID:1224
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:2852
                                            • \??\c:\windows\system\spoolsv.exe
                                              c:\windows\system\spoolsv.exe SE
                                              5⤵
                                              • Drops file in Windows directory
                                              PID:2684
                                              • \??\c:\windows\system\spoolsv.exe
                                                "c:\windows\system\spoolsv.exe"
                                                6⤵
                                                  PID:1280
                                                  • \??\c:\windows\system\explorer.exe
                                                    c:\windows\system\explorer.exe
                                                    7⤵
                                                      PID:4040
                                                • \??\c:\windows\system\spoolsv.exe
                                                  c:\windows\system\spoolsv.exe SE
                                                  5⤵
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5036
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                      PID:2004
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                    • Drops file in Windows directory
                                                    PID:1720
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      "c:\windows\system\spoolsv.exe"
                                                      6⤵
                                                        PID:3432
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      PID:1876
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                          PID:732
                                                          • \??\c:\windows\system\explorer.exe
                                                            c:\windows\system\explorer.exe
                                                            7⤵
                                                              PID:2860
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:3968
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:4168
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3312
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:4224
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:528
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1944
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:1540
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2616
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:1664
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3092
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                            PID:2948
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                              PID:4820
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1784
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • Drops file in Windows directory
                                                              PID:2320
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1440
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                                PID:1036
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                  PID:620
                                                        • C:\Windows\system32\svchost.exe
                                                          C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                          1⤵
                                                            PID:4532

                                                          Network

                                                          MITRE ATT&CK Enterprise v15

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Windows\Parameters.ini

                                                            Filesize

                                                            74B

                                                            MD5

                                                            6687785d6a31cdf9a5f80acb3abc459b

                                                            SHA1

                                                            1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                            SHA256

                                                            3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                            SHA512

                                                            5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                          • C:\Windows\System\explorer.exe

                                                            Filesize

                                                            2.2MB

                                                            MD5

                                                            d62c324203a270214426d33b65e8463c

                                                            SHA1

                                                            f236ff00a1277854d4c6add4c50b0ad18b27a8f7

                                                            SHA256

                                                            410a16fbb72cff2cd4c20d9b6fc9066542b3296b760ac8a2ed10a6391eaf3487

                                                            SHA512

                                                            33751559b3f02ca504055bd6741c956a9cfbb159675b2c9fafd50397e92c59715b2d2ac4ac4d4ad4eae8f2f2b69fcc97c0e05bd4a4c72673b774dfb24685f0da

                                                          • C:\Windows\System\spoolsv.exe

                                                            Filesize

                                                            2.2MB

                                                            MD5

                                                            4ceef431a47270127281a696c626f6bb

                                                            SHA1

                                                            0b94c0ff969e0618095f163a70bd8b63b040bc36

                                                            SHA256

                                                            bd68d53280726b030b50766a04d53c3e0ad2e981584f081a8f3675beef9aff81

                                                            SHA512

                                                            63e819afdaf963aa3d09b45d8edba3331632024ee31c82498dd0977446d18031c0530bcacf631e458a03f94ad0e9b98e0eaa4485081b49aa7a2ae6d23c91c203

                                                          • memory/432-1630-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/436-2545-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/436-2802-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/452-1355-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/468-5414-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/468-5513-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/632-4492-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/692-3058-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/692-2824-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/808-2435-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1152-5166-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1152-5347-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1196-1862-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/1280-5659-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1292-1092-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/1292-2374-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/1296-5648-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1348-5176-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1436-3488-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1444-1553-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/1480-3298-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1484-2129-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/1568-3124-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1568-3119-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1576-4834-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1576-4712-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/1748-1629-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2044-2693-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2056-1919-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2096-5320-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2120-4002-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2156-1779-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2196-5290-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2272-2932-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2396-4269-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2444-3152-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2444-3147-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2448-68-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2448-30-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2448-29-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2484-5615-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2496-2971-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2540-3290-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2540-3293-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2676-2252-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2896-2356-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2900-5143-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2900-5071-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2944-3140-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2952-2560-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2980-3215-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/2984-1427-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2988-0-0x00000000008C0000-0x00000000008C1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2988-27-0x00000000008C0000-0x00000000008C1000-memory.dmp

                                                            Filesize

                                                            4KB

                                                          • memory/2988-26-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2988-32-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/2992-2130-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3048-2457-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/3116-2702-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/3440-5184-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/3468-1284-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3480-84-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3480-79-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3620-2321-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3656-1707-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3660-5312-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/3684-2335-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3732-2357-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/3916-2001-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/3920-1861-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4088-2663-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4248-2337-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4248-1026-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4324-2713-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4336-2913-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4416-2325-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4416-895-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4452-3132-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4460-3893-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4544-2650-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4564-2683-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4568-4722-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4660-5261-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4668-2320-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4700-5081-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4704-2205-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4720-1168-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/4768-2671-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4852-2336-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4852-2333-0x0000000000440000-0x0000000000509000-memory.dmp

                                                            Filesize

                                                            804KB

                                                          • memory/4940-3379-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/4940-3281-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5000-1356-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                            Filesize

                                                            1.8MB

                                                          • memory/5008-3255-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5008-3113-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5012-85-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5012-844-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5012-4509-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5064-2532-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB

                                                          • memory/5116-2447-0x0000000000400000-0x000000000043E000-memory.dmp

                                                            Filesize

                                                            248KB