Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-12-2024 13:05

General

  • Target

    fba7f726d95d914d00c96df6d3a466d0_JaffaCakes118.exe

  • Size

    2.2MB

  • MD5

    fba7f726d95d914d00c96df6d3a466d0

  • SHA1

    320d9fd91faf7af9f2b46abdf9cb6696d52984c8

  • SHA256

    775f7e0a12e7fd343928b2c86531094715c1b0c690b406e44cfc87b79ae46f10

  • SHA512

    3e5ba07fd89ccc380b9aea34ba29cf0c13f10376223ae1b7928f6ee28297998edef268e7d114a49b7ffd2d470b26bcfae2bdff5ff22217810f00b2180bfc68d2

  • SSDEEP

    24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZ8:0UzeyQMS4DqodCnoe+iitjWwwY

Malware Config

Extracted

Family

pony

C2

http://don.service-master.eu/gate.php

Attributes
  • payload_url

    http://don.service-master.eu/shit.exe

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 64 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 58 IoCs
  • Drops file in Windows directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fba7f726d95d914d00c96df6d3a466d0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fba7f726d95d914d00c96df6d3a466d0_JaffaCakes118.exe"
    1⤵
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:668
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3376
      • C:\Users\Admin\AppData\Local\Temp\fba7f726d95d914d00c96df6d3a466d0_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\fba7f726d95d914d00c96df6d3a466d0_JaffaCakes118.exe"
        2⤵
        • Drops file in Windows directory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:824
        • \??\c:\windows\system\explorer.exe
          c:\windows\system\explorer.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Drops file in Windows directory
          • Suspicious use of WriteProcessMemory
          PID:1640
          • \??\c:\windows\system\explorer.exe
            "c:\windows\system\explorer.exe"
            4⤵
            • Modifies WinLogon for persistence
            • Modifies visiblity of hidden/system files in Explorer
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Adds Run key to start application
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1144
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:5004
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4364
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:1968
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:2332
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              PID:4276
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4464
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3456
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:228
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:800
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1320
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:3296
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:4056
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2748
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1820
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:2948
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:4432
            • \??\c:\windows\system\spoolsv.exe
              c:\windows\system\spoolsv.exe SE
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              PID:1032
              • \??\c:\windows\system\spoolsv.exe
                "c:\windows\system\spoolsv.exe"
                6⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:3628
                • \??\c:\windows\system\explorer.exe
                  c:\windows\system\explorer.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  PID:912
                  • \??\c:\windows\system\explorer.exe
                    "c:\windows\system\explorer.exe"
                    8⤵
                      PID:4676
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:4372
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2288
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:4064
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:2808
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:1180
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:4312
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:3688
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1820
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:2340
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1628
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                PID:2164
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:3364
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:1796
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:4524
              • \??\c:\windows\system\spoolsv.exe
                c:\windows\system\spoolsv.exe SE
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                PID:3664
                • \??\c:\windows\system\spoolsv.exe
                  "c:\windows\system\spoolsv.exe"
                  6⤵
                  • Executes dropped EXE
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  PID:536
                  • \??\c:\windows\system\explorer.exe
                    c:\windows\system\explorer.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3488
                    • \??\c:\windows\system\explorer.exe
                      "c:\windows\system\explorer.exe"
                      8⤵
                        PID:3400
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:1876
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:4816
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4412
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2272
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4420
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2528
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:216
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:640
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • System Location Discovery: System Language Discovery
                  PID:1256
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2336
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:4136
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:1828
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  PID:2920
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:4572
                • \??\c:\windows\system\spoolsv.exe
                  c:\windows\system\spoolsv.exe SE
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  PID:1448
                  • \??\c:\windows\system\spoolsv.exe
                    "c:\windows\system\spoolsv.exe"
                    6⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:3968
                    • \??\c:\windows\system\explorer.exe
                      c:\windows\system\explorer.exe
                      7⤵
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:4304
                      • \??\c:\windows\system\explorer.exe
                        "c:\windows\system\explorer.exe"
                        8⤵
                          PID:3944
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:1760
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:3856
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2196
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:5104
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    PID:2080
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:2848
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:2784
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:1128
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    PID:3524
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                      • Suspicious use of SetWindowsHookEx
                      PID:4608
                  • \??\c:\windows\system\spoolsv.exe
                    c:\windows\system\spoolsv.exe SE
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • System Location Discovery: System Language Discovery
                    PID:1608
                    • \??\c:\windows\system\spoolsv.exe
                      "c:\windows\system\spoolsv.exe"
                      6⤵
                        PID:992
                        • \??\c:\windows\system\explorer.exe
                          c:\windows\system\explorer.exe
                          7⤵
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:4864
                          • \??\c:\windows\system\explorer.exe
                            "c:\windows\system\explorer.exe"
                            8⤵
                            • System Location Discovery: System Language Discovery
                            PID:468
                    • \??\c:\windows\system\spoolsv.exe
                      c:\windows\system\spoolsv.exe SE
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Drops file in Windows directory
                      PID:2476
                      • \??\c:\windows\system\spoolsv.exe
                        "c:\windows\system\spoolsv.exe"
                        6⤵
                          PID:5048
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        PID:3268
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:3484
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:2648
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:4740
                      • \??\c:\windows\system\spoolsv.exe
                        c:\windows\system\spoolsv.exe SE
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        PID:5008
                        • \??\c:\windows\system\spoolsv.exe
                          "c:\windows\system\spoolsv.exe"
                          6⤵
                            PID:1928
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • System Location Discovery: System Language Discovery
                          PID:1956
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:1440
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:3308
                              • \??\c:\windows\system\explorer.exe
                                "c:\windows\system\explorer.exe"
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:4696
                        • \??\c:\windows\system\spoolsv.exe
                          c:\windows\system\spoolsv.exe SE
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Drops file in Windows directory
                          PID:4184
                          • \??\c:\windows\system\spoolsv.exe
                            "c:\windows\system\spoolsv.exe"
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:2660
                            • \??\c:\windows\system\explorer.exe
                              c:\windows\system\explorer.exe
                              7⤵
                              • Suspicious use of SetThreadContext
                              • Drops file in Windows directory
                              PID:1612
                              • \??\c:\windows\system\explorer.exe
                                "c:\windows\system\explorer.exe"
                                8⤵
                                  PID:5416
                          • \??\c:\windows\system\spoolsv.exe
                            c:\windows\system\spoolsv.exe SE
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Windows directory
                            • System Location Discovery: System Language Discovery
                            PID:3264
                            • \??\c:\windows\system\spoolsv.exe
                              "c:\windows\system\spoolsv.exe"
                              6⤵
                                PID:3380
                                • \??\c:\windows\system\explorer.exe
                                  c:\windows\system\explorer.exe
                                  7⤵
                                  • Drops file in Windows directory
                                  PID:1280
                                  • \??\c:\windows\system\explorer.exe
                                    "c:\windows\system\explorer.exe"
                                    8⤵
                                      PID:4960
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:1848
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:464
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3932
                              • \??\c:\windows\system\spoolsv.exe
                                c:\windows\system\spoolsv.exe SE
                                5⤵
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                PID:1932
                                • \??\c:\windows\system\spoolsv.exe
                                  "c:\windows\system\spoolsv.exe"
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1492
                                  • \??\c:\windows\system\explorer.exe
                                    c:\windows\system\explorer.exe
                                    7⤵
                                      PID:2980
                                • \??\c:\windows\system\spoolsv.exe
                                  c:\windows\system\spoolsv.exe SE
                                  5⤵
                                  • Suspicious use of SetThreadContext
                                  • Drops file in Windows directory
                                  PID:2436
                                  • \??\c:\windows\system\spoolsv.exe
                                    "c:\windows\system\spoolsv.exe"
                                    6⤵
                                      PID:2984
                                      • \??\c:\windows\system\explorer.exe
                                        c:\windows\system\explorer.exe
                                        7⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:372
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:5076
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2588
                                  • \??\c:\windows\system\spoolsv.exe
                                    c:\windows\system\spoolsv.exe SE
                                    5⤵
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    PID:5100
                                    • \??\c:\windows\system\spoolsv.exe
                                      "c:\windows\system\spoolsv.exe"
                                      6⤵
                                        PID:2816
                                    • \??\c:\windows\system\spoolsv.exe
                                      c:\windows\system\spoolsv.exe SE
                                      5⤵
                                      • Suspicious use of SetThreadContext
                                      • Drops file in Windows directory
                                      PID:2924
                                      • \??\c:\windows\system\spoolsv.exe
                                        "c:\windows\system\spoolsv.exe"
                                        6⤵
                                          PID:4988
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Suspicious use of SetThreadContext
                                        PID:4956
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:5328
                                          • \??\c:\windows\system\explorer.exe
                                            c:\windows\system\explorer.exe
                                            7⤵
                                            • Drops file in Windows directory
                                            PID:5368
                                      • \??\c:\windows\system\spoolsv.exe
                                        c:\windows\system\spoolsv.exe SE
                                        5⤵
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Windows directory
                                        • System Location Discovery: System Language Discovery
                                        PID:700
                                        • \??\c:\windows\system\spoolsv.exe
                                          "c:\windows\system\spoolsv.exe"
                                          6⤵
                                            PID:5448
                                        • \??\c:\windows\system\spoolsv.exe
                                          c:\windows\system\spoolsv.exe SE
                                          5⤵
                                          • Suspicious use of SetThreadContext
                                          • Drops file in Windows directory
                                          PID:4592
                                          • \??\c:\windows\system\spoolsv.exe
                                            "c:\windows\system\spoolsv.exe"
                                            6⤵
                                              PID:5856
                                          • \??\c:\windows\system\spoolsv.exe
                                            c:\windows\system\spoolsv.exe SE
                                            5⤵
                                            • Suspicious use of SetThreadContext
                                            • System Location Discovery: System Language Discovery
                                            PID:3988
                                            • \??\c:\windows\system\spoolsv.exe
                                              "c:\windows\system\spoolsv.exe"
                                              6⤵
                                                PID:5180
                                                • \??\c:\windows\system\explorer.exe
                                                  c:\windows\system\explorer.exe
                                                  7⤵
                                                  • Drops file in Windows directory
                                                  PID:5136
                                            • \??\c:\windows\system\spoolsv.exe
                                              c:\windows\system\spoolsv.exe SE
                                              5⤵
                                              • Suspicious use of SetThreadContext
                                              • Drops file in Windows directory
                                              • System Location Discovery: System Language Discovery
                                              PID:1336
                                              • \??\c:\windows\system\spoolsv.exe
                                                "c:\windows\system\spoolsv.exe"
                                                6⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2644
                                            • \??\c:\windows\system\spoolsv.exe
                                              c:\windows\system\spoolsv.exe SE
                                              5⤵
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              PID:4172
                                              • \??\c:\windows\system\spoolsv.exe
                                                "c:\windows\system\spoolsv.exe"
                                                6⤵
                                                  PID:760
                                              • \??\c:\windows\system\spoolsv.exe
                                                c:\windows\system\spoolsv.exe SE
                                                5⤵
                                                • Drops file in Windows directory
                                                PID:1580
                                                • \??\c:\windows\system\spoolsv.exe
                                                  "c:\windows\system\spoolsv.exe"
                                                  6⤵
                                                    PID:5332
                                                    • \??\c:\windows\system\explorer.exe
                                                      c:\windows\system\explorer.exe
                                                      7⤵
                                                        PID:6080
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                    • System Location Discovery: System Language Discovery
                                                    PID:632
                                                  • \??\c:\windows\system\spoolsv.exe
                                                    c:\windows\system\spoolsv.exe SE
                                                    5⤵
                                                      PID:4836
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1484
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      • System Location Discovery: System Language Discovery
                                                      PID:3864
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:2200
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      PID:5068
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                      • Drops file in Windows directory
                                                      PID:3428
                                                    • \??\c:\windows\system\spoolsv.exe
                                                      c:\windows\system\spoolsv.exe SE
                                                      5⤵
                                                        PID:892
                                                      • \??\c:\windows\system\spoolsv.exe
                                                        c:\windows\system\spoolsv.exe SE
                                                        5⤵
                                                          PID:2556
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • Drops file in Windows directory
                                                          PID:1864
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:2640
                                                        • \??\c:\windows\system\spoolsv.exe
                                                          c:\windows\system\spoolsv.exe SE
                                                          5⤵
                                                            PID:1624
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                            • Drops file in Windows directory
                                                            • System Location Discovery: System Language Discovery
                                                            PID:4536
                                                          • \??\c:\windows\system\spoolsv.exe
                                                            c:\windows\system\spoolsv.exe SE
                                                            5⤵
                                                              PID:1104
                                                            • \??\c:\windows\system\spoolsv.exe
                                                              c:\windows\system\spoolsv.exe SE
                                                              5⤵
                                                                PID:1676
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                • Drops file in Windows directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:3936
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                • Drops file in Windows directory
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5200
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                • Drops file in Windows directory
                                                                PID:5840
                                                              • \??\c:\windows\system\spoolsv.exe
                                                                c:\windows\system\spoolsv.exe SE
                                                                5⤵
                                                                • System Location Discovery: System Language Discovery
                                                                PID:5660
                                                      • C:\Windows\system32\svchost.exe
                                                        C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
                                                        1⤵
                                                          PID:2132

                                                        Network

                                                        MITRE ATT&CK Enterprise v15

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Windows\Parameters.ini

                                                          Filesize

                                                          74B

                                                          MD5

                                                          6687785d6a31cdf9a5f80acb3abc459b

                                                          SHA1

                                                          1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9

                                                          SHA256

                                                          3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b

                                                          SHA512

                                                          5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

                                                        • C:\Windows\System\explorer.exe

                                                          Filesize

                                                          2.2MB

                                                          MD5

                                                          a37cc1d295141bb874aab0977b913be9

                                                          SHA1

                                                          14a64d93dbde035f02011c51bbebf97531746405

                                                          SHA256

                                                          db2b1e6330b991d8f81598d25827422f734de6536ab2018f51be3952c638ad11

                                                          SHA512

                                                          12b9ce2e16fbf43f649e2f22d8fe30761000e4e426e1a780d08004b6e8ddb4a22699013569d924a31f2e722482986527e42d0bdf8d71c5708a3ae0db5ca1d220

                                                        • C:\Windows\System\spoolsv.exe

                                                          Filesize

                                                          2.2MB

                                                          MD5

                                                          09a3dd46e0535d3a444aadc0f87154aa

                                                          SHA1

                                                          8380a4b35d5c0b24bcab85f0e3c2606acee4d0fe

                                                          SHA256

                                                          eb6f0c9e5cf75d69c9e794f6e07407ca1c3dd4ed633424c95d07b03a1674a0e2

                                                          SHA512

                                                          04d6b9e68a29892f79bed6a3b37c3fce6789bf1312f0f4c7b11ae59a0db075805d0db7bfe91d32a906365eb032c8fa72751f9396bedbdcb51892f4c48f1d60ff

                                                        • memory/216-2254-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/228-2435-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/464-4485-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/464-4633-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/468-5177-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/536-2841-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/536-3026-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/640-2887-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/640-2892-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/668-0-0x0000000002480000-0x0000000002481000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/668-55-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/668-46-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/668-47-0x0000000002480000-0x0000000002481000-memory.dmp

                                                          Filesize

                                                          4KB

                                                        • memory/800-1196-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/824-92-0x0000000000440000-0x0000000000509000-memory.dmp

                                                          Filesize

                                                          804KB

                                                        • memory/824-94-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/824-49-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/824-50-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/992-3423-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/992-3247-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1032-1467-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1128-3092-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1128-3096-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1144-4413-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1144-111-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1144-843-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1180-1640-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1256-2255-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1320-2446-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1440-3440-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1440-3554-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1448-2423-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1492-4852-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1628-2684-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1640-110-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1640-105-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1760-2434-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1796-1870-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/1820-2673-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1820-2466-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1820-2670-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/1876-2083-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2164-1805-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2272-2870-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2288-2642-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2288-2637-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2332-3781-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2336-2901-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2340-1804-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2660-3834-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2660-3701-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2748-1363-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2808-2650-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2816-5239-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2848-3082-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2920-2410-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2948-1376-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/2984-5311-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/2984-5125-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3296-1277-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3364-2694-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3380-4139-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3380-4214-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3400-4550-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3456-2436-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3456-1100-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3484-3263-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3484-3266-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3628-2834-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3628-2631-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3664-2007-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3688-1728-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/3856-3061-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3856-3065-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3944-4874-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3968-3053-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/3968-3214-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4064-1639-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4136-2342-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4276-1099-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4276-2425-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4364-2586-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4372-1528-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4412-2084-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4420-2152-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/4432-2478-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4464-2424-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4524-2753-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4572-2929-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4572-2932-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4608-3184-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4676-4151-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4696-5232-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4740-3272-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4816-2862-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/4988-5275-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5004-2415-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/5004-954-0x0000000000400000-0x00000000005D3000-memory.dmp

                                                          Filesize

                                                          1.8MB

                                                        • memory/5048-3257-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5048-3253-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5104-3071-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5104-3075-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5180-5750-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5180-5934-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5328-5541-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5328-5703-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5332-5954-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5416-5558-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB

                                                        • memory/5856-5640-0x0000000000400000-0x000000000043E000-memory.dmp

                                                          Filesize

                                                          248KB