Analysis

  • max time kernel
    63s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-01-2025 13:28

General

  • Target

    JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe

  • Size

    273KB

  • MD5

    e8d516a1d4cea6637adea75d8c3a5741

  • SHA1

    437ad6e0c4a77d94fdd1d6de9d07e14bcd74249c

  • SHA256

    1096bbe9d20f24b9e9f72afd59f14a256fef39b444727faaf2782c20211f615a

  • SHA512

    082b9e1942beeabd9ee7866af58d90f26e6b603693c9b034d0c1c8d432dc56add6699163e31074e9c322662f4bf92d3f79643d286a41b728c779c8bbe3f49e6b

  • SSDEEP

    6144:tNhloreqX/VThJt5VufH4pqsGEaImwlmckFMEukgD5:hyzX/3/5VDqEDmYzkF0kY

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 9 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4740
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe startC:\Users\Admin\AppData\Roaming\DC494\FCE24.exe%C:\Users\Admin\AppData\Roaming\DC494
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1184
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e8d516a1d4cea6637adea75d8c3a5741.exe startC:\Program Files (x86)\9422A\lvvm.exe%C:\Program Files (x86)\9422A
      2⤵
      • System Location Discovery: System Language Discovery
      PID:208
    • C:\Program Files (x86)\LP\24BD\1EDD.tmp
      "C:\Program Files (x86)\LP\24BD\1EDD.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:3212
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:848
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4792
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4744
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:3864
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4780
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4584
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:2460
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4052
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4528
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:4908
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4780
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2516
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4232
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2460
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1264
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:1872
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:348
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2688
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:3176
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1460
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2292
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1140
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4304
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:1844
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    PID:3964
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
      PID:4084
    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
      1⤵
        PID:3472
      • C:\Windows\explorer.exe
        explorer.exe
        1⤵
          PID:4540
        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
          1⤵
            PID:1792
          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
            1⤵
              PID:4364
            • C:\Windows\explorer.exe
              explorer.exe
              1⤵
                PID:448
              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                1⤵
                  PID:1880
                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                  1⤵
                    PID:1512
                  • C:\Windows\explorer.exe
                    explorer.exe
                    1⤵
                      PID:4644
                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                      1⤵
                        PID:1312
                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                        1⤵
                          PID:1604
                        • C:\Windows\explorer.exe
                          explorer.exe
                          1⤵
                            PID:3664
                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                            1⤵
                              PID:4748
                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                              1⤵
                                PID:4012
                              • C:\Windows\explorer.exe
                                explorer.exe
                                1⤵
                                  PID:1868
                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                  1⤵
                                    PID:2216
                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                    1⤵
                                      PID:1164
                                    • C:\Windows\explorer.exe
                                      explorer.exe
                                      1⤵
                                        PID:4064
                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                        1⤵
                                          PID:2400
                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                          1⤵
                                            PID:4360
                                          • C:\Windows\explorer.exe
                                            explorer.exe
                                            1⤵
                                              PID:1444
                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                              1⤵
                                                PID:2064
                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                1⤵
                                                  PID:2904
                                                • C:\Windows\explorer.exe
                                                  explorer.exe
                                                  1⤵
                                                    PID:1840
                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                    1⤵
                                                      PID:4092
                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                      1⤵
                                                        PID:1628
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:1984
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:3460
                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                            1⤵
                                                              PID:512
                                                            • C:\Windows\explorer.exe
                                                              explorer.exe
                                                              1⤵
                                                                PID:2744
                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                1⤵
                                                                  PID:3716
                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                  1⤵
                                                                    PID:4460
                                                                  • C:\Windows\explorer.exe
                                                                    explorer.exe
                                                                    1⤵
                                                                      PID:1816
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                      1⤵
                                                                        PID:2688
                                                                      • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                        "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                        1⤵
                                                                          PID:116
                                                                        • C:\Windows\explorer.exe
                                                                          explorer.exe
                                                                          1⤵
                                                                            PID:3796
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                            1⤵
                                                                              PID:1392
                                                                            • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                              "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                              1⤵
                                                                                PID:4428
                                                                              • C:\Windows\explorer.exe
                                                                                explorer.exe
                                                                                1⤵
                                                                                  PID:4204
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                  1⤵
                                                                                    PID:3416
                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                    1⤵
                                                                                      PID:2680
                                                                                    • C:\Windows\explorer.exe
                                                                                      explorer.exe
                                                                                      1⤵
                                                                                        PID:4064
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                        1⤵
                                                                                          PID:648
                                                                                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                          1⤵
                                                                                            PID:1604
                                                                                          • C:\Windows\explorer.exe
                                                                                            explorer.exe
                                                                                            1⤵
                                                                                              PID:2012
                                                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                              1⤵
                                                                                                PID:3088
                                                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                1⤵
                                                                                                  PID:4204
                                                                                                • C:\Windows\explorer.exe
                                                                                                  explorer.exe
                                                                                                  1⤵
                                                                                                    PID:852
                                                                                                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                                    1⤵
                                                                                                      PID:2888
                                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                                      1⤵
                                                                                                        PID:4548
                                                                                                      • C:\Windows\explorer.exe
                                                                                                        explorer.exe
                                                                                                        1⤵
                                                                                                          PID:2368

                                                                                                        Network

                                                                                                        MITRE ATT&CK Enterprise v15

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Program Files (x86)\LP\24BD\1EDD.tmp

                                                                                                          Filesize

                                                                                                          96KB

                                                                                                          MD5

                                                                                                          a26219a94cdad7b6977c8d8e8464c262

                                                                                                          SHA1

                                                                                                          41b54268d8f67973e640395f1940238e915e4521

                                                                                                          SHA256

                                                                                                          7acab258a6879bf9bb647ead7beb4d32e36334d16c49fc0642ac61cf25413866

                                                                                                          SHA512

                                                                                                          4cf35e7c7211a4fe7b210b70394a31a812f9663a516c9eb54c9c1b73acee18bd37fffe2abe54149e6b450b9adbbe89cff53a3ef1b1ff1a90d39d09b16de1d75d

                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                          Filesize

                                                                                                          471B

                                                                                                          MD5

                                                                                                          a8b8e97f35e913d8380de208cbae2610

                                                                                                          SHA1

                                                                                                          1ad6c0148e1a302dee28f8171835bc2e9ac81f09

                                                                                                          SHA256

                                                                                                          11851918cc117f9802eb386e3f018460eb49861af54c5797287bca248675bc92

                                                                                                          SHA512

                                                                                                          cb995c892dc668e7b8427f99e3a054218a834fd030eec1660b96a5b12c5518b1dfd8370eea5e7bf09a9dd93caf3b6fc23f6c07269071cab13ba121710f6e5f9b

                                                                                                        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                                          Filesize

                                                                                                          412B

                                                                                                          MD5

                                                                                                          9eedb63ebd96e756897f1356bf22d3c7

                                                                                                          SHA1

                                                                                                          9cf694cc6494672748aacb818b0c3e9072bdc0f9

                                                                                                          SHA256

                                                                                                          6d0bc408456c95bfeb345f80ea1f40f7764a2d9c47ce8522edec92a57986032d

                                                                                                          SHA512

                                                                                                          f0edb818e7cbae6c66149ae99ffaffd6fa609f02937ef45fea727b542455ad75fc6f9235c5695e04de2e140d3d624d58347936bdc3604a4b357561d5cf836352

                                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                                          Filesize

                                                                                                          2KB

                                                                                                          MD5

                                                                                                          7f00c67873026b16ea8a18d75f73b912

                                                                                                          SHA1

                                                                                                          497d2a6229fabd2fb5ad5cd48ff92a471ad75020

                                                                                                          SHA256

                                                                                                          7442e3bb7ffc1ca025190cd4f2d2e30b06a7a83cc73374d12eb7e813bf75abfc

                                                                                                          SHA512

                                                                                                          a85df5377058e99cef998e6bf537c5d05fb9249e9dd4a09c6393177901ab33e828a22a93745eb4bdcfaff22cf320737ffea0d8e004f9c52599a238a9f4f28b93

                                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_SETLANG_EXE_15

                                                                                                          Filesize

                                                                                                          36KB

                                                                                                          MD5

                                                                                                          0e2a09c8b94747fa78ec836b5711c0c0

                                                                                                          SHA1

                                                                                                          92495421ad887f27f53784c470884802797025ad

                                                                                                          SHA256

                                                                                                          0c1cdbbf6d974764aad46477863059eaec7b1717a7d26b025f0f8fe24338bb36

                                                                                                          SHA512

                                                                                                          61530a33a6109467962ba51371821ea55bb36cd2abc0e7a15f270abf62340e9166e66a1b10f4de9a306b368820802c4adb9653b9a5acd6f1e825e60128fd2409

                                                                                                        • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

                                                                                                          Filesize

                                                                                                          36KB

                                                                                                          MD5

                                                                                                          ab0262f72142aab53d5402e6d0cb5d24

                                                                                                          SHA1

                                                                                                          eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

                                                                                                          SHA256

                                                                                                          20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

                                                                                                          SHA512

                                                                                                          bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

                                                                                                        • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\80GI1ZH7\microsoft.windows[1].xml

                                                                                                          Filesize

                                                                                                          97B

                                                                                                          MD5

                                                                                                          742f1cda58883699ef753f83244412ce

                                                                                                          SHA1

                                                                                                          38531f396e1d9dc9ba6bba0604149c377605f57a

                                                                                                          SHA256

                                                                                                          5ef67927e9fdebb14515728d51548c52536519b35b5a52728ca1d660d957025f

                                                                                                          SHA512

                                                                                                          11acf77cd15052ae9cf554ab666f6c1e629e174fad16659738a11bee6a53b857f375fe99701e7c14c14286193864449f5b88a208ff34f4874e8351dff6a3a6f2

                                                                                                        • C:\Users\Admin\AppData\Roaming\DC494\422A.C49

                                                                                                          Filesize

                                                                                                          996B

                                                                                                          MD5

                                                                                                          f1e0ae2ada880f256d11fad39d58e698

                                                                                                          SHA1

                                                                                                          58afe9dea4fe734367cd366b9288c0d860ddf5e9

                                                                                                          SHA256

                                                                                                          ca754b11b3a0d5eb38f1929c155516ec9f1daa0a4bb3b42e06adb5d9889d73e5

                                                                                                          SHA512

                                                                                                          087626648a6f092431e636a6b76ce662689318a6f5f7e0de250b3b61e61289c7fac84f7bd1648b7261564f57317ef3678555383bc0e9e778a8945d8b144f0e92

                                                                                                        • C:\Users\Admin\AppData\Roaming\DC494\422A.C49

                                                                                                          Filesize

                                                                                                          600B

                                                                                                          MD5

                                                                                                          3dcbb59f8766b9c83a1311c1e78b2f27

                                                                                                          SHA1

                                                                                                          5be5dda55cadd7b93b5b5022cbce82d001b292ed

                                                                                                          SHA256

                                                                                                          6c2c045932c4981894dfb9bbbe13668b2f7e99e98a4e607db41db787d1ca307e

                                                                                                          SHA512

                                                                                                          a731cd023a1911d93f0d4604b28b8d54002765ce370c2d6bf2818417fee4f429839e57e9d50b3eed1fceb17cac8a0f8ed5edfa781605eead3ea13afb849f5047

                                                                                                        • C:\Users\Admin\AppData\Roaming\DC494\422A.C49

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          e144472421bc92b695f54d2d46c0dc2b

                                                                                                          SHA1

                                                                                                          00597b4d53de00d57e47aa634a9c4c92d7df4200

                                                                                                          SHA256

                                                                                                          2eba42313aa45d8a870bc1c7348390c75bbf00cf69aeea51a83f30b81e10033c

                                                                                                          SHA512

                                                                                                          d48f4675cf55899bbff9bc07a7c095ca7b145999cc8356c78bd1d2e4d522d61e7a01a07600b74e723b79b81502edc631f4d96e68bbc511e04b91b447ccd23e57

                                                                                                        • C:\Users\Admin\AppData\Roaming\DC494\422A.C49

                                                                                                          Filesize

                                                                                                          1KB

                                                                                                          MD5

                                                                                                          3221a85e1cf3d082385143c204e8df32

                                                                                                          SHA1

                                                                                                          2d0c06320913a0e0b0a558511054074958f8a353

                                                                                                          SHA256

                                                                                                          31e08212a3877273316171772704225c2fed4b45ae746eea7624e7ab2d0fb192

                                                                                                          SHA512

                                                                                                          f23e2b2c188f9da0c66dd393dc59659dd0c118fbd2cc1d1783fe7f518c82d6d38d88104f65613efb1e22f61263007005dd20f783b90b5ba0877bdc5a98425d0c

                                                                                                        • memory/208-148-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/1140-1222-0x0000000004020000-0x0000000004021000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/1184-16-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/1184-17-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/1264-784-0x000001D8C0600000-0x000001D8C0700000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/1264-783-0x000001D8C0600000-0x000001D8C0700000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/1264-819-0x000001D8C1520000-0x000001D8C1540000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/1264-820-0x000001D8C1AA0000-0x000001D8C1AC0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/1264-788-0x000001D8C1560000-0x000001D8C1580000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/1844-1254-0x000002136CE30000-0x000002136CE50000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/1844-1224-0x000002136B900000-0x000002136BA00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/1844-1225-0x000002136B900000-0x000002136BA00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/1844-1241-0x000002136CA20000-0x000002136CA40000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/1844-1229-0x000002136CA60000-0x000002136CA80000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/1872-924-0x0000000004730000-0x0000000004731000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2292-1077-0x000002D26FA20000-0x000002D26FB20000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2292-1104-0x000002D270F40000-0x000002D270F60000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2292-1076-0x000002D26FA20000-0x000002D26FB20000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2292-1081-0x000002D270970000-0x000002D270990000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2292-1091-0x000002D270930000-0x000002D270950000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2460-491-0x0000000004A50000-0x0000000004A51000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/2516-655-0x0000021419E20000-0x0000021419E40000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2516-670-0x000002141A1F0000-0x000002141A210000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2516-658-0x0000021419BE0000-0x0000021419C00000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2516-650-0x0000020C17D00000-0x0000020C17E00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2516-649-0x0000020C17D00000-0x0000020C17E00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/2688-941-0x0000021992030000-0x0000021992050000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2688-954-0x0000021992440000-0x0000021992460000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/2688-932-0x0000021992070000-0x0000021992090000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3176-1074-0x0000000004B20000-0x0000000004B21000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3212-754-0x0000000000400000-0x000000000041B000-memory.dmp

                                                                                                          Filesize

                                                                                                          108KB

                                                                                                        • memory/3472-1404-0x00000267FCD60000-0x00000267FCD80000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3472-1373-0x00000267FBC40000-0x00000267FBD40000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3472-1410-0x00000267FD170000-0x00000267FD190000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3472-1378-0x00000267FCDA0000-0x00000267FCDC0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/3472-1375-0x00000267FBC40000-0x00000267FBD40000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3472-1374-0x00000267FBC40000-0x00000267FBD40000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/3864-335-0x0000000004180000-0x0000000004181000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/3964-1372-0x0000000004940000-0x0000000004941000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/4232-782-0x0000000004DD0000-0x0000000004DD1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/4364-1522-0x000002FFD3D00000-0x000002FFD3E00000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4528-516-0x0000027DE7FB0000-0x0000027DE7FD0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4528-508-0x0000027DE7FF0000-0x0000027DE8010000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4528-530-0x0000027DE83C0000-0x0000027DE83E0000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4540-1519-0x0000000002B20000-0x0000000002B21000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB

                                                                                                        • memory/4584-336-0x000001EA83700000-0x000001EA83800000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4584-341-0x000001EA85520000-0x000001EA85540000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4584-337-0x000001EA83700000-0x000001EA83800000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4584-338-0x000001EA83700000-0x000001EA83800000-memory.dmp

                                                                                                          Filesize

                                                                                                          1024KB

                                                                                                        • memory/4584-355-0x000001EA851E0000-0x000001EA85200000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4584-372-0x000001EA858F0000-0x000001EA85910000-memory.dmp

                                                                                                          Filesize

                                                                                                          128KB

                                                                                                        • memory/4740-15-0x0000000000400000-0x0000000000467000-memory.dmp

                                                                                                          Filesize

                                                                                                          412KB

                                                                                                        • memory/4740-13-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/4740-755-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/4740-146-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/4740-0-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/4740-3-0x0000000000400000-0x0000000000469000-memory.dmp

                                                                                                          Filesize

                                                                                                          420KB

                                                                                                        • memory/4740-2-0x0000000000400000-0x0000000000467000-memory.dmp

                                                                                                          Filesize

                                                                                                          412KB

                                                                                                        • memory/4908-646-0x00000000049E0000-0x00000000049E1000-memory.dmp

                                                                                                          Filesize

                                                                                                          4KB