Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 12:49 UTC

General

  • Target

    fc561e1c7e4b1d6a659e826826d63d8e_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    fc561e1c7e4b1d6a659e826826d63d8e

  • SHA1

    215c515bee1c458a305d0e7bb66cd44d0255ba39

  • SHA256

    cbe983691178642a174fcded0c430f1daf1541a8e508f6fc69bb995fe1a8bc0b

  • SHA512

    5d31eb42e0ad20f276ccdb12be7caea5d8204dd668ccb8f443beb79099cd3fd1fa572db57778d5899ab4d39474788a31577e6f4dc9bd85f60f9e3b4df071462e

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZN:0UzeyQMS4DqodCnoe+iitjWwwZ

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 59 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc561e1c7e4b1d6a659e826826d63d8e_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fc561e1c7e4b1d6a659e826826d63d8e_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1704
      • C:\Users\Admin\AppData\Local\Temp\fc561e1c7e4b1d6a659e826826d63d8e_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fc561e1c7e4b1d6a659e826826d63d8e_JaffaCakes118.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4924
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1472
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:4132
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3632
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:716
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1760
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:1752
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:2572
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1224
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4220
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2568
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:3120
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1352
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:4308
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:228
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:1336
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1788
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1440
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3544
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:4940
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:2120
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              PID:396
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:452
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:2324
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:2348
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2996
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:540
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2244
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:628
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4964
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:744
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2956
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4084
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3736
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1812
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1368
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3308
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2172
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:5100
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1452
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2068
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:2836
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4788
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:1120
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:1432
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:3104
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3564
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:4016
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4664
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:4760
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1348
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:4644
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1404
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:4048
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:5020
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:5096
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:3840
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1048
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                          PID:4724
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3100
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:1640
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:3668
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:2924
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:3704
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:2620
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:1864
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:2588
                      • \??\c:\windows\system\explorer.exe
                        c:\windows\system\explorer.exe
                        7⤵
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:4972
                        • \??\c:\windows\system\explorer.exe
                          "c:\windows\system\explorer.exe"
                          8⤵
                            PID:1008
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      • System Location Discovery: System Language Discovery
                      PID:1624
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:1548
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:5036
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                          PID:3204
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:4796
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:1932
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          • System Location Discovery: System Language Discovery
                          PID:1240
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                              PID:4052
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Windows directory
                            PID:3892
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:468
                            • \??\c:\windows\system\spoolsv.exe
                              c:\windows\system\spoolsv.exe SE
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:4528
                              • \??\c:\windows\system\spoolsv.exe
                                "c:\windows\system\spoolsv.exe"
                                6⤵
                                  PID:4900
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:2912
                                    • \??\c:\windows\system\explorer.exe
                                      "c:\windows\system\explorer.exe"
                                      8⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3692
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • System Location Discovery: System Language Discovery
                                PID:2496
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                    PID:4996
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • Suspicious use of SetThreadContext
                                      • Drops file in Windows directory
                                      PID:2228
                                      • \??\c:\windows\system\explorer.exe
                                        "c:\windows\system\explorer.exe"
                                        8⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4252
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:3300
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3604
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • Drops file in Windows directory
                                      PID:764
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  • System Location Discovery: System Language Discovery
                                  PID:3756
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4732
                                    • \??\c:\windows\system\explorer.exe
                                      c:\windows\system\explorer.exe
                                      7⤵
                                      • Drops file in Windows directory
                                      PID:2468
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:4284
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:4444
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:4212
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:3520
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3808
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4576
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:2336
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:2820
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      • Drops file in Windows directory
                                      PID:1568
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                          PID:4464
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Windows directory
                                        PID:1728
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:4872
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Windows directory
                                          PID:3504
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                              PID:1424
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Suspicious use of SetThreadContext
                                            PID:3040
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:4848
                                                • \??\c:\windows\system\explorer.exe
                                                  c:\windows\system\explorer.exe
                                                  7⤵
                                                    PID:4876
                                              • \??\c:\windows\system\spoolsv.exe
                                                c:\windows\system\spoolsv.exe SE
                                                5⤵
                                                • Suspicious use of SetThreadContext
                                                • Drops file in Windows directory
                                                PID:3720
                                                • \??\c:\windows\system\spoolsv.exe
                                                  "c:\windows\system\spoolsv.exe"
                                                  6⤵
                                                    PID:4544
                                                • \??\c:\windows\system\spoolsv.exe
                                                  c:\windows\system\spoolsv.exe SE
                                                  5⤵
                                                  • Suspicious use of SetThreadContext
                                                  • Drops file in Windows directory
                                                  • System Location Discovery: System Language Discovery
                                                  PID:4472
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    "c:\windows\system\spoolsv.exe"
                                                    6⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:2376
                                                    • \??\c:\windows\system\explorer.exe
                                                      c:\windows\system\explorer.exe
                                                      7⤵
                                                        PID:632
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                    • Suspicious use of SetThreadContext
                                                    PID:536
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      "c:\windows\system\spoolsv.exe"
                                                      6⤵
                                                        PID:3848
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1052
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3660
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3716
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:1888
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Suspicious use of SetThreadContext
                                                      • Drops file in Windows directory
                                                      PID:448
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        "c:\windows\system\spoolsv.exe"
                                                        6⤵
                                                          PID:1732
                                                          • \??\c:\windows\system\explorer.exe
                                                            c:\windows\system\explorer.exe
                                                            7⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3060
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                        • Drops file in Windows directory
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3912
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          "c:\windows\system\spoolsv.exe"
                                                          6⤵
                                                            PID:1628
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:4376
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:872
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:3232
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:3328
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                            PID:2788
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            PID:2368
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:5032
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:1940
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3636
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:2888
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            PID:1236
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • System Location Discovery: System Language Discovery
                                                            PID:644
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:3152
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                              PID:4780
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • Drops file in Windows directory
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4276
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:5112
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                                PID:8
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                        1⤵
                                                          PID:3484

                                                        Network

                                                        • flag-us
                                                          DNS
                                                          8.8.8.8.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          8.8.8.8.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                          8.8.8.8.in-addr.arpa
                                                          IN PTR
                                                          dnsgoogle
                                                        • flag-us
                                                          DNS
                                                          228.249.119.40.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          228.249.119.40.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          172.210.232.199.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          172.210.232.199.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          95.221.229.192.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          95.221.229.192.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          136.32.126.40.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          136.32.126.40.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          50.23.12.20.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          50.23.12.20.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          206.23.85.13.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          206.23.85.13.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          240.221.184.93.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          240.221.184.93.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          172.214.232.199.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          172.214.232.199.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        • flag-us
                                                          DNS
                                                          13.227.111.52.in-addr.arpa
                                                          Remote address:
                                                          8.8.8.8:53
                                                          Request
                                                          13.227.111.52.in-addr.arpa
                                                          IN PTR
                                                          Response
                                                        No results found
                                                        • 8.8.8.8:53
                                                          8.8.8.8.in-addr.arpa
                                                          dns
                                                          66 B
                                                          90 B
                                                          1
                                                          1

                                                          DNS Request

                                                          8.8.8.8.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          228.249.119.40.in-addr.arpa
                                                          dns
                                                          73 B
                                                          159 B
                                                          1
                                                          1

                                                          DNS Request

                                                          228.249.119.40.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          172.210.232.199.in-addr.arpa
                                                          dns
                                                          74 B
                                                          128 B
                                                          1
                                                          1

                                                          DNS Request

                                                          172.210.232.199.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          95.221.229.192.in-addr.arpa
                                                          dns
                                                          73 B
                                                          144 B
                                                          1
                                                          1

                                                          DNS Request

                                                          95.221.229.192.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          136.32.126.40.in-addr.arpa
                                                          dns
                                                          72 B
                                                          158 B
                                                          1
                                                          1

                                                          DNS Request

                                                          136.32.126.40.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          50.23.12.20.in-addr.arpa
                                                          dns
                                                          70 B
                                                          156 B
                                                          1
                                                          1

                                                          DNS Request

                                                          50.23.12.20.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          206.23.85.13.in-addr.arpa
                                                          dns
                                                          71 B
                                                          145 B
                                                          1
                                                          1

                                                          DNS Request

                                                          206.23.85.13.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          240.221.184.93.in-addr.arpa
                                                          dns
                                                          73 B
                                                          144 B
                                                          1
                                                          1

                                                          DNS Request

                                                          240.221.184.93.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          172.214.232.199.in-addr.arpa
                                                          dns
                                                          74 B
                                                          128 B
                                                          1
                                                          1

                                                          DNS Request

                                                          172.214.232.199.in-addr.arpa

                                                        • 8.8.8.8:53
                                                          13.227.111.52.in-addr.arpa
                                                          dns
                                                          72 B
                                                          158 B
                                                          1
                                                          1

                                                          DNS Request

                                                          13.227.111.52.in-addr.arpa

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Windows\Parameters.ini

                                                          Filesize

                                                          74B

                                                          MD5

                                                          6687785d6a31cdf9a5f80acb3abc459b

                                                          SHA1

                                                          1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                          SHA256

                                                          3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                          SHA512

                                                          5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                        • C:\Windows\System\explorer.exe

                                                          Filesize

                                                          2.2MB

                                                          MD5

                                                          327232c930630527171b31c28f615074

                                                          SHA1

                                                          678e736a9f770f88ca93b3e515c39552cd9f5b3b

                                                          SHA256

                                                          a7b34abf50a09e9ba2af53e75999dabf1d3687e571e2e56683d8fb12024a08ab

                                                          SHA512

                                                          bfa10cd689befbe4e77d9f8ffe07426b35c4d86e314a08534d39eee709c53b452a4f51c3af9daf20631d9ee73a0e3a334744a7c901ab016206fcdace65276b2b

                                                        • C:\Windows\System\spoolsv.exe

                                                          Filesize

                                                          2.2MB

                                                          MD5

                                                          b5a74dfef5a3b42b63385f5c037e92fa

                                                          SHA1

                                                          f03d34fa22f0f8050293f4d9d6062b969312134b

                                                          SHA256

                                                          cd38f80855a9d900c75a6218fc8b2b60f3780cbbfb78127a414c8bdfdf4cee24

                                                          SHA512

                                                          0001394b519e856092acd13774ad6fa11ad9f2e970b54c81fb5064186c763ff6d1872c1e55b0ffd56eaac4326e146f0523c6e273c605665a302b479c5fce7fd2

                                                        • memory/228-2541-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/396-1566-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/452-2888-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/452-2666-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/468-3371-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/468-3366-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/540-2675-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/628-2686-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/716-2648-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/744-2698-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1008-5501-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1224-2414-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1336-1398-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1348-2932-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1348-2937-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1352-2533-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1368-1910-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1404-2947-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1404-2942-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1424-5614-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1424-5617-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1432-4889-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1440-1399-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1452-2048-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1472-79-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1472-84-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1548-3334-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1628-6111-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1628-6115-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1640-3123-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1640-3128-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1732-6104-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1752-4080-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1788-2552-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1812-2720-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1888-6036-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1932-3349-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1932-3352-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2120-2575-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2172-1996-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2244-1648-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2348-4605-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2376-5936-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2568-2422-0x0000000000440000-0x0000000000509000-memory.dmp

                                                          Filesize

                                                          804KB

                                                        • memory/2568-2426-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2572-1069-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2572-2415-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2588-3253-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2620-3144-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2836-2049-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2924-3139-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2924-3134-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2956-1792-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2996-1647-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3100-2425-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3104-2166-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3120-1241-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3204-3341-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3308-2729-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3544-2563-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3564-2916-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3564-2912-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3632-955-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3632-2406-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3660-6026-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3660-6030-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3692-5578-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3736-1909-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3808-5676-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3808-5491-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3840-3211-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4016-2254-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4048-2399-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4052-3361-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4084-2707-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4132-869-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4132-85-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4132-4729-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4220-2428-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4220-1140-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4252-5608-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4308-1332-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4444-5337-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4464-5585-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4544-5796-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4644-2398-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4664-2922-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4724-5143-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4732-4879-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4760-2321-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4788-2906-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4848-5734-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4872-5597-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4900-3626-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4924-39-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4924-73-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4924-40-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4940-1470-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4964-1710-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4972-0-0x0000000002360000-0x0000000002361000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4972-36-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4972-43-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4972-37-0x0000000002360000-0x0000000002361000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/4996-3719-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4996-3834-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5020-3056-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5096-2413-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        We care about your privacy.

                                                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.