Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    144s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2024, 07:53 UTC

General

  • Target

    JaffaCakes118_9c439ae43d2dca91ac80deff51448ff1a13929cf65022adcc40e4ddabb5978ed.exe

  • Size

    1.3MB

  • MD5

    36582a4979101409c174ce13fa15d9e1

  • SHA1

    97f68e30fb7233c1690d3c74b26d6c16d9b55030

  • SHA256

    9c439ae43d2dca91ac80deff51448ff1a13929cf65022adcc40e4ddabb5978ed

  • SHA512

    ba7f0b884de35302340027f27873f2666dbc06512cce61c5551c6505bbc9121fa450e0e653a2aafd51f0649833f5a3eeb0a7043cd3d3a08e6eec3030d7fa78a5

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 27 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 11 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 10 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 11 IoCs
  • Drops file in Program Files directory 9 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 27 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c439ae43d2dca91ac80deff51448ff1a13929cf65022adcc40e4ddabb5978ed.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9c439ae43d2dca91ac80deff51448ff1a13929cf65022adcc40e4ddabb5978ed.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1876
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Program Files directory
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2572
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1412
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Uninstall Information\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2292
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1056
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1768
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Microsoft.NET\assembly\GAC_64\taskhost.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:936
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\Windows Media Player\es-ES\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1088
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\cmd.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2912
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2164
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\SendTo\audiodg.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1652
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\Resources\Themes\Aero\es-ES\sppsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:920
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\QzqepdNQ02.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1468
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:2312
              • C:\providercommon\wininit.exe
                "C:\providercommon\wininit.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2780
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OMiKQlKjHz.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:952
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:2104
                    • C:\providercommon\wininit.exe
                      "C:\providercommon\wininit.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2528
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ixgWq8OOYW.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:1816
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:1448
                          • C:\providercommon\wininit.exe
                            "C:\providercommon\wininit.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1900
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\VbZulfStaN.bat"
                              11⤵
                                PID:2660
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  12⤵
                                    PID:2772
                                  • C:\providercommon\wininit.exe
                                    "C:\providercommon\wininit.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:2308
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\j5VZ5DKdOS.bat"
                                      13⤵
                                        PID:2300
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          14⤵
                                            PID:1176
                                          • C:\providercommon\wininit.exe
                                            "C:\providercommon\wininit.exe"
                                            14⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:1112
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\dXV640YnNf.bat"
                                              15⤵
                                                PID:1868
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  16⤵
                                                    PID:2560
                                                  • C:\providercommon\wininit.exe
                                                    "C:\providercommon\wininit.exe"
                                                    16⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2628
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vCRFnHZZKP.bat"
                                                      17⤵
                                                        PID:1696
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          18⤵
                                                            PID:2936
                                                          • C:\providercommon\wininit.exe
                                                            "C:\providercommon\wininit.exe"
                                                            18⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2848
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\cSLzsZ1i8q.bat"
                                                              19⤵
                                                                PID:2424
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  20⤵
                                                                    PID:2572
                                                                  • C:\providercommon\wininit.exe
                                                                    "C:\providercommon\wininit.exe"
                                                                    20⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:760
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\p5ITN63wlJ.bat"
                                                                      21⤵
                                                                        PID:2060
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          22⤵
                                                                            PID:2976
                                                                          • C:\providercommon\wininit.exe
                                                                            "C:\providercommon\wininit.exe"
                                                                            22⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2676
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\sT6xLp4JQ8.bat"
                                                                              23⤵
                                                                                PID:320
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  24⤵
                                                                                    PID:1448
                                                                                  • C:\providercommon\wininit.exe
                                                                                    "C:\providercommon\wininit.exe"
                                                                                    24⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:884
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6n1oUPmZQq.bat"
                                                                                      25⤵
                                                                                        PID:1660
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          26⤵
                                                                                            PID:2408
                                                                                          • C:\providercommon\wininit.exe
                                                                                            "C:\providercommon\wininit.exe"
                                                                                            26⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2172
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 7 /tr "'C:\Program Files\Uninstall Information\cmd.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2472
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\Program Files\Uninstall Information\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2616
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\Program Files\Uninstall Information\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2500
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 8 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sppsvc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2516
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sppsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2924
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 9 /tr "'C:\Program Files (x86)\Microsoft SQL Server Compact Edition\v3.5\sppsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:3020
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 10 /tr "'C:\providercommon\wininit.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1280
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:608
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1236
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 6 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_64\taskhost.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2432
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Microsoft.NET\assembly\GAC_64\taskhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2740
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "taskhostt" /sc MINUTE /mo 14 /tr "'C:\Windows\Microsoft.NET\assembly\GAC_64\taskhost.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2692
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files\Windows Media Player\es-ES\explorer.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1604
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files\Windows Media Player\es-ES\explorer.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2260
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "explorere" /sc MINUTE /mo 13 /tr "'C:\Program Files\Windows Media Player\es-ES\explorer.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1364
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 5 /tr "'C:\MSOCache\All Users\cmd.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1624
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmd" /sc ONLOGON /tr "'C:\MSOCache\All Users\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2416
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "cmdc" /sc MINUTE /mo 9 /tr "'C:\MSOCache\All Users\cmd.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1664
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsml" /sc MINUTE /mo 14 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsm.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1828
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsm.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1420
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\lsm.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2252
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 7 /tr "'C:\Users\Admin\SendTo\audiodg.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2800
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "audiodg" /sc ONLOGON /tr "'C:\Users\Admin\SendTo\audiodg.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:1992
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "audiodga" /sc MINUTE /mo 12 /tr "'C:\Users\Admin\SendTo\audiodg.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2944
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 10 /tr "'C:\Windows\Resources\Themes\Aero\es-ES\sppsvc.exe'" /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2832
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvc" /sc ONLOGON /tr "'C:\Windows\Resources\Themes\Aero\es-ES\sppsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2808
                                        • C:\Windows\system32\schtasks.exe
                                          schtasks.exe /create /tn "sppsvcs" /sc MINUTE /mo 6 /tr "'C:\Windows\Resources\Themes\Aero\es-ES\sppsvc.exe'" /rl HIGHEST /f
                                          1⤵
                                          • Process spawned unexpected child process
                                          • Scheduled Task/Job: Scheduled Task
                                          PID:2276

                                        Network

                                        • flag-us
                                          DNS
                                          raw.githubusercontent.com
                                          wininit.exe
                                          Remote address:
                                          8.8.8.8:53
                                          Request
                                          raw.githubusercontent.com
                                          IN A
                                          Response
                                          raw.githubusercontent.com
                                          IN A
                                          185.199.110.133
                                          raw.githubusercontent.com
                                          IN A
                                          185.199.108.133
                                          raw.githubusercontent.com
                                          IN A
                                          185.199.109.133
                                          raw.githubusercontent.com
                                          IN A
                                          185.199.111.133
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          741 B
                                          4.1kB
                                          9
                                          10
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          948 B
                                          4.1kB
                                          10
                                          10
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 185.199.110.133:443
                                          raw.githubusercontent.com
                                          tls
                                          wininit.exe
                                          793 B
                                          4.2kB
                                          10
                                          11
                                        • 8.8.8.8:53
                                          raw.githubusercontent.com
                                          dns
                                          wininit.exe
                                          71 B
                                          135 B
                                          1
                                          1

                                          DNS Request

                                          raw.githubusercontent.com

                                          DNS Response

                                          185.199.110.133
                                          185.199.108.133
                                          185.199.109.133
                                          185.199.111.133

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          46c4b7c80fe58cb95cb787228dc9ab91

                                          SHA1

                                          524138ae02189079f9215803d603e7aba65c0d4a

                                          SHA256

                                          6d4d69a494ea5ec5fd8a7a3e68d0c54b2fa76f51e067389026ddfbf9f7f64f72

                                          SHA512

                                          27e14eda3041f56a2235f408e42600d953f1b54892e6b76a293ff1642f720289bafae1b23958670e8aab18e69d05757729dc388e0a131b2094d43c7dce2f847a

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          f02d84eee2712ec61da571f9b62b9bd8

                                          SHA1

                                          3bf93c0abb7100301dea568271ae576ec83d7de7

                                          SHA256

                                          4026b607398b2bfad7f34aefbc5952c25a958276a72b3b0d9fe25632c8fa05b4

                                          SHA512

                                          edee9916688d42b80ebbdb07205904dc47f35f5e65b9cb9326da349c2301202faec06b73705ae609a7b5c607c3b11ee58bddce23b86c88022bf82ca37a5c7092

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          a843e95cbd4abdd9b5b10f32ec961575

                                          SHA1

                                          868c4342e811a95af60d2e48b8905d99aabd7f88

                                          SHA256

                                          0690e287f06ced29cedb97013d526d9e3af28f4102a705ef7377992bb612501d

                                          SHA512

                                          01764a5db6da743ab2dc79bed33a76ae1f263e9139fe6ca1c16cb05ec4d4ce626a01718691e7af3f9ac4438616d915c6ac09bfa2b1b68e1b55c8cd27072317ce

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          c677c02bea52b087169e887fc359d797

                                          SHA1

                                          d29f29b7f1875e30b2679cc978d4f1e725f563ed

                                          SHA256

                                          fdc47a7ba5bef1a15dc089254efe4d0e6648de85bfb54189e73425c09fec3373

                                          SHA512

                                          f34cce0c0ea1128da89fdccb90c0ec037946a1c385d260ded4b31b4e3072b34942b2e21d146dccd517d851535177c5fba53a2b9e28dbc0d21272208331004fee

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          764ac4ce33ab094db9507836a151d7de

                                          SHA1

                                          2bd7192c55a1404ec824cd58768aad76de5fd440

                                          SHA256

                                          14bef9081075c3595aa98859679f51ae20e907c8d8f8ccd4ede345c8bb5310f5

                                          SHA512

                                          b82cc36650fc9422a2d9470f2e60e7592725c7710d4ed1b33e29fd91f0bd957341d50c740e13f0034dfba1cb5f6763fdf19f3631cf0364ab34e12290f44a6830

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          73e96c7258adac4de7074cdcfecbff52

                                          SHA1

                                          1867b5ef8bf435451f21f90ff91a9c71980bd434

                                          SHA256

                                          b4beec4835c526529b4273c784da4ad2fb700c90fefd48e81f1e5cdb9da86b95

                                          SHA512

                                          ba505c93e6a5b667d8b3e522ca6be28b45bb6d6bdf0a8c9b522478a90fab21ad6e53f20be0901b6448a41b131480d837fd57a58dd3112c90880c194e6fd30abd

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          7fd484eaa1801209705ac830ccb77096

                                          SHA1

                                          15df92e8fce8d3e8f8554a55516d437f80bbcaeb

                                          SHA256

                                          267b78ee8c30030ea6f1101c8f2a735f5751f892f1c677c3bee78b9296ae4e95

                                          SHA512

                                          02265e514d984964b97054dd934006d69e6cd887cbd09bf0b921a0e8103694fe8912fd851010c7f04c5cb8b582641a97f57a193dd945871ae5d93a0d1382a2f9

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          5ef6d06d24d5d8c6ce4d88cf322c421a

                                          SHA1

                                          90786ebf590a4e8cc912a7cb2245fab1a3061e21

                                          SHA256

                                          483ad14da7b0a124b4db09fc6a17e780c980b93569521f7108271d1cbfaca7b8

                                          SHA512

                                          4bf3e89946c3c9f32ff25818e34ded208baa7dd053d37b4b87279fce0d09180762e904b69068087f7a0b34d632cf472d1027e46472a131ccff5110fe5fe2741c

                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                          Filesize

                                          342B

                                          MD5

                                          0cf4380eacc1b0e8d63f96886056d048

                                          SHA1

                                          a7523547315755b9527f88b0312ff8d2d9cac784

                                          SHA256

                                          9befd3a9be869a55eead8f5bde8c3af85add4749166708afe882ae4f3551fc3d

                                          SHA512

                                          a3e680a172f3d2e577875e36ba5319f5ab1a62cfd781a59e0deb113c02a9b060ae715cca545595bd518a5be6dcbb5239e03f3ea103a49a63a5e54495bda7757a

                                        • C:\Users\Admin\AppData\Local\Temp\6n1oUPmZQq.bat

                                          Filesize

                                          194B

                                          MD5

                                          f1139406c0571e635e0bea181d97f03b

                                          SHA1

                                          8b09584f7c49fb0eca6be24a566b6e1eb4ff26e1

                                          SHA256

                                          0806625fd024a88d47dd822dfe399049cbbcaeecd50199cfe2c1339114543dae

                                          SHA512

                                          e6465f69b32730925c672d59a22d2378f5631b19ae9bb547c080b9262bd5f21fc9fd6dbc283bd584bd804bca42975e6b302a5ecf76624e17c66e309f6ac1ab11

                                        • C:\Users\Admin\AppData\Local\Temp\CabBB75.tmp

                                          Filesize

                                          70KB

                                          MD5

                                          49aebf8cbd62d92ac215b2923fb1b9f5

                                          SHA1

                                          1723be06719828dda65ad804298d0431f6aff976

                                          SHA256

                                          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                          SHA512

                                          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                        • C:\Users\Admin\AppData\Local\Temp\OMiKQlKjHz.bat

                                          Filesize

                                          194B

                                          MD5

                                          f81c3c28b21834fed89667df466f34f6

                                          SHA1

                                          a67028b2d76566b72afa62554747195b6bed36fe

                                          SHA256

                                          d43008e17cb3e6b5b43ea4493963a75db7f188399cc2cb6eb4dacb2bbcede9f8

                                          SHA512

                                          87a97d79b01ae67f69f9ca50cbdf5997c6ab47b0a4be55010c6160a4a84cc074abcc101be28e566a6d03be10fa5cfef7544212833b46d9f8cffab5ce0ff56d34

                                        • C:\Users\Admin\AppData\Local\Temp\QzqepdNQ02.bat

                                          Filesize

                                          194B

                                          MD5

                                          30f6357027342ce302ae9e34f12c7c0f

                                          SHA1

                                          d70509e302ca1a73c81a562c4f6f6b2adc87a6e0

                                          SHA256

                                          70d7b9ca08e28fa44071e6d2fc9041f401e1ec1b51e7e88097fdbac95c26bb0d

                                          SHA512

                                          2950a5b6c74657409e5cc260f6d86d57ddbe7d9d7b322bfc5dda24aa6df19b321cae13f6217230be16326d0564269ec2c0b6b0a0d9a706204bfe32a7cbef5ec5

                                        • C:\Users\Admin\AppData\Local\Temp\TarBB87.tmp

                                          Filesize

                                          181KB

                                          MD5

                                          4ea6026cf93ec6338144661bf1202cd1

                                          SHA1

                                          a1dec9044f750ad887935a01430bf49322fbdcb7

                                          SHA256

                                          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                          SHA512

                                          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                        • C:\Users\Admin\AppData\Local\Temp\VbZulfStaN.bat

                                          Filesize

                                          194B

                                          MD5

                                          1c4df36ef4c47c2c542ccec84fa25ee6

                                          SHA1

                                          b1194dccb2313883853bc47f8eee1b2f7acf1e21

                                          SHA256

                                          21723634f70ea02617c73b284f0677df50a08d4bdf20d3651d9090a0fd846261

                                          SHA512

                                          42afb89d592f77329c4575f250ca675268948fe80d4f9502c4ea2129114e0b2c6759263966d6b107e59917a2c771e38d20b4ac6a7d1aeb48028e54058db0a333

                                        • C:\Users\Admin\AppData\Local\Temp\cSLzsZ1i8q.bat

                                          Filesize

                                          194B

                                          MD5

                                          4a2352b421faf52f9b36f7209abcfa3e

                                          SHA1

                                          7af459d3e292fcc5101c5456f433ac12d8588532

                                          SHA256

                                          b8e1bd00d279a5824515f4ea9cb0905cdbc2242a22bdd653e54ecc9f0391e321

                                          SHA512

                                          36f0425166d11f18d1a1be5a1327f5330e6d11dbfead9360c510b87bbfdf7102f1ce80dea5140302713ee7cf2c91e0c230dd5d44aa0d5dcd73c14732c6600166

                                        • C:\Users\Admin\AppData\Local\Temp\dXV640YnNf.bat

                                          Filesize

                                          194B

                                          MD5

                                          970d932e843f9808de833fee46717870

                                          SHA1

                                          9490b506b97d7fe3f436834614bb793f09abd4d3

                                          SHA256

                                          e3854331e543548db3f1e6c6c29e42d1dd4cb7baf21d437502be927c80274284

                                          SHA512

                                          310490800db55d5422a454596b71464f6d1753d35202a26fcc266338ab116a899dfff2fff1c14e052f8e6335d2721519101d3124b212e7462a32fe3af28d776b

                                        • C:\Users\Admin\AppData\Local\Temp\ixgWq8OOYW.bat

                                          Filesize

                                          194B

                                          MD5

                                          0ff9c652b483a2cc256d6f163327ee3b

                                          SHA1

                                          0f1b19b8893867924c9091300476b41753f8a5e7

                                          SHA256

                                          d24e62ed4de2e2afa9c4ea6df63b6b016282b0824ceb19ca20286f55b05ccbca

                                          SHA512

                                          0dc3e0b8764615db1b1d3f45d97aa86a03bf05d9109ffb5f78c5318dd7f3bbd7534bebc17de03a1c6eb8332e9df21dba8fbb4be151ad82f2d1f17b20f24833b5

                                        • C:\Users\Admin\AppData\Local\Temp\j5VZ5DKdOS.bat

                                          Filesize

                                          194B

                                          MD5

                                          9162c920f43d7b3f68a7f73ac0046c8d

                                          SHA1

                                          072a0ef59d0566056fe7832a524263d94a1a9bcc

                                          SHA256

                                          a64dff0802b1e4cd5bf80fc2003846b19ddbe6575e3eacd9515711f16d2eb17c

                                          SHA512

                                          cbf8ca299571deba24556bd0f1a9fb1a893a9bfb19a9e827976566a085cfa8362388957412e3576c6f9b26c4c9ea05a34b991d8fc22120c268004ee654eef460

                                        • C:\Users\Admin\AppData\Local\Temp\p5ITN63wlJ.bat

                                          Filesize

                                          194B

                                          MD5

                                          2f2217f8e2016217ef4ac792a503caaa

                                          SHA1

                                          c3849f7f3f8d9cbed150947bb64f56fe474daac1

                                          SHA256

                                          490f22dfd2e963c32736341f87ceb289c91d947ca8a1ee404c35090d2d418b6f

                                          SHA512

                                          23a7383c0f7c693af9f6b2a6e4dcabaf23e79a5ebffcd96667c8903d3fe7ddc5d365b1f6a733925b7b610a3ad27c96537e755d1f6ffec353c130183657f30d28

                                        • C:\Users\Admin\AppData\Local\Temp\sT6xLp4JQ8.bat

                                          Filesize

                                          194B

                                          MD5

                                          496ea3492c0e54e983204c12501a9452

                                          SHA1

                                          f0f9d3ab46d652cdfb5317abb5fe6ef1ce85c000

                                          SHA256

                                          ee5fc9f635af871758274516e443b9b5d29a70c2e298d47e3d90e419f3436b15

                                          SHA512

                                          9708c3fcf1539bcf1c3fa541fcfe8044ad80a5b803cb1eb61e50feb676e5acb6d2687552a368edf78763bfd2dc6100784c09ec92e5481a5891666a5716bf8ff2

                                        • C:\Users\Admin\AppData\Local\Temp\vCRFnHZZKP.bat

                                          Filesize

                                          194B

                                          MD5

                                          a46d6e649f546b98453915c0606d8aaa

                                          SHA1

                                          d4749e3d382d73abb05a883743ba1e5024ef1930

                                          SHA256

                                          928e130883813fcd298327dcb55c98a998af87fde53d18220022f0b4dbc0e83b

                                          SHA512

                                          8368c9ee9747697c9ac529a4d3f87dd797769f6332194269275a6404f91b911667e8460fbb553e311e8bb95f6c51cd7d5bfdc4840e1e47e477e989065038fd47

                                        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                          Filesize

                                          7KB

                                          MD5

                                          ff2ef5e4f31ceffb5aa2366c1f129562

                                          SHA1

                                          a4eb540aa69ca7d53bb6cc298b9211755187fad0

                                          SHA256

                                          8284e5d275097103fa74fb316f48bea0b720a71fe1afa6ffbdc68155cfc8e5e3

                                          SHA512

                                          f465426dd06255e51604ee3a659c6fb7d18023092f4056eee3bb0a1ec9cfe5468d28a44db8c66ef7458b1e0804deac320a3a47eb3d6698b03e94d9b36676e0e3

                                        • C:\providercommon\1zu9dW.bat

                                          Filesize

                                          36B

                                          MD5

                                          6783c3ee07c7d151ceac57f1f9c8bed7

                                          SHA1

                                          17468f98f95bf504cc1f83c49e49a78526b3ea03

                                          SHA256

                                          8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                          SHA512

                                          c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                        • C:\providercommon\DllCommonsvc.exe

                                          Filesize

                                          1.0MB

                                          MD5

                                          bd31e94b4143c4ce49c17d3af46bcad0

                                          SHA1

                                          f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                          SHA256

                                          b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                          SHA512

                                          f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                        • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                          Filesize

                                          197B

                                          MD5

                                          8088241160261560a02c84025d107592

                                          SHA1

                                          083121f7027557570994c9fc211df61730455bb5

                                          SHA256

                                          2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                          SHA512

                                          20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                        • memory/760-517-0x0000000000CB0000-0x0000000000DC0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/884-636-0x00000000010F0000-0x0000000001200000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/884-637-0x0000000000630000-0x0000000000642000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/936-54-0x000000001B600000-0x000000001B8E2000-memory.dmp

                                          Filesize

                                          2.9MB

                                        • memory/936-56-0x0000000001CC0000-0x0000000001CC8000-memory.dmp

                                          Filesize

                                          32KB

                                        • memory/1112-336-0x0000000000150000-0x0000000000162000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1112-335-0x0000000000A40000-0x0000000000B50000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/1900-215-0x00000000002C0000-0x00000000002D2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/1900-214-0x0000000000E90000-0x0000000000FA0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2172-697-0x00000000001C0000-0x00000000001D2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2308-275-0x00000000002A0000-0x00000000003B0000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2528-154-0x0000000000200000-0x0000000000310000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2572-17-0x00000000002F0000-0x00000000002FC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/2572-16-0x00000000002E0000-0x00000000002EC000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/2572-15-0x0000000000300000-0x000000000030C000-memory.dmp

                                          Filesize

                                          48KB

                                        • memory/2572-14-0x00000000002B0000-0x00000000002C2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2572-13-0x0000000000D30000-0x0000000000E40000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2628-397-0x00000000003D0000-0x00000000003E2000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2628-396-0x0000000000120000-0x0000000000230000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2780-95-0x0000000000540000-0x0000000000552000-memory.dmp

                                          Filesize

                                          72KB

                                        • memory/2780-94-0x0000000000330000-0x0000000000440000-memory.dmp

                                          Filesize

                                          1.1MB

                                        • memory/2848-457-0x0000000000060000-0x0000000000170000-memory.dmp

                                          Filesize

                                          1.1MB

                                        We care about your privacy.

                                        This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.