Analysis

  • max time kernel
    79s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2025 22:28

General

  • Target

    JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe

  • Size

    283KB

  • MD5

    764e6ac82c655b99e1e1a65509aaa5d8

  • SHA1

    cb9e9b8f0e3838b8d2a03667824543258c6022f1

  • SHA256

    46bae6af43a38569c5df3e5b9af31ff1d81f65618af3582a72972f3e781c0012

  • SHA512

    f657903cb244916e6445c2e7132177ef2b49820cfa46821cd0642aad811528654a60d2c124c1a458dfcf20520789ec99f9ff9fc3695bb5225f424c77c3fec9dd

  • SSDEEP

    6144:hM/p8WlpgPns4repj7KPWJhk0xIuJl/jNQw8rCPF0gF:hfmgE4rexOPWvEuJBjmw8rqF

Malware Config

Signatures

  • Cycbot

    Cycbot is a backdoor and trojan written in C++..

  • Cycbot family
  • Detects Cycbot payload 6 IoCs

    Cycbot is a backdoor and trojan written in C++.

  • Modifies security service 2 TTPs 1 IoCs
  • Pony family
  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 12 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Disables taskbar notifications via registry modification
  • Executes dropped EXE 1 IoCs
  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Unsecured Credentials: Credentials In Files 1 TTPs

    Steal credentials from unsecured files.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 8 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies Internet Explorer settings 1 TTPs 20 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 64 IoCs
  • Suspicious use of SendNotifyMessage 64 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • System policy modification 1 TTPs 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe"
    1⤵
    • Modifies security service
    • Adds Run key to start application
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2852
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe startC:\Users\Admin\AppData\Roaming\A04B2\9E42C.exe%C:\Users\Admin\AppData\Roaming\A04B2
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2000
    • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe
      C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_764e6ac82c655b99e1e1a65509aaa5d8.exe startC:\Program Files (x86)\B203E\lvvm.exe%C:\Program Files (x86)\B203E
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2404
    • C:\Program Files (x86)\LP\2CCA\C20.tmp
      "C:\Program Files (x86)\LP\2CCA\C20.tmp"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:4988
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1096
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:4380
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4132
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1144
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2028
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4384
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Suspicious use of SendNotifyMessage
    PID:4036
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2356
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5032
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    • Suspicious use of SendNotifyMessage
    PID:4784
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2712
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2556
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:2848
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3820
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:544
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1360
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:5004
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of SetWindowsHookEx
    PID:4484
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:2404
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2380
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2548
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:100
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3416
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4444
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:432
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:4264
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:5012
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:1212
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3632
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:2844
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    • Modifies registry class
    PID:4112
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3620
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3420
  • C:\Windows\explorer.exe
    explorer.exe
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Enumerates connected drives
    • Checks SCSI registry key(s)
    PID:3512
  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3808
  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
    1⤵
      PID:4220
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
        PID:4788
      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
        1⤵
          PID:3532
        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
          1⤵
            PID:3780
          • C:\Windows\explorer.exe
            explorer.exe
            1⤵
              PID:3908
            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
              1⤵
                PID:2232
              • C:\Windows\explorer.exe
                explorer.exe
                1⤵
                  PID:4288
                • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                  "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                  1⤵
                    PID:1160
                  • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                    "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                    1⤵
                      PID:4084
                    • C:\Windows\explorer.exe
                      explorer.exe
                      1⤵
                        PID:1572
                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                        1⤵
                          PID:3952
                        • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                          "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                          1⤵
                            PID:2908
                          • C:\Windows\explorer.exe
                            explorer.exe
                            1⤵
                              PID:748
                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                              1⤵
                                PID:3360
                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                1⤵
                                  PID:2040
                                • C:\Windows\explorer.exe
                                  explorer.exe
                                  1⤵
                                    PID:1112
                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                    1⤵
                                      PID:1172
                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                      1⤵
                                        PID:2292
                                      • C:\Windows\explorer.exe
                                        explorer.exe
                                        1⤵
                                          PID:2712
                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                          1⤵
                                            PID:964
                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                            1⤵
                                              PID:4032
                                            • C:\Windows\explorer.exe
                                              explorer.exe
                                              1⤵
                                                PID:2208
                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                1⤵
                                                  PID:2404
                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                  1⤵
                                                    PID:4088
                                                  • C:\Windows\explorer.exe
                                                    explorer.exe
                                                    1⤵
                                                      PID:2320
                                                    • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                      "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                      1⤵
                                                        PID:224
                                                      • C:\Windows\explorer.exe
                                                        explorer.exe
                                                        1⤵
                                                          PID:3444
                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                          1⤵
                                                            PID:4016
                                                          • C:\Windows\explorer.exe
                                                            explorer.exe
                                                            1⤵
                                                              PID:4280
                                                            • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                              "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                              1⤵
                                                                PID:4884
                                                              • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                1⤵
                                                                  PID:1360
                                                                • C:\Windows\explorer.exe
                                                                  explorer.exe
                                                                  1⤵
                                                                    PID:4012
                                                                  • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                    "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                    1⤵
                                                                      PID:4112
                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                      1⤵
                                                                        PID:4108
                                                                      • C:\Windows\explorer.exe
                                                                        explorer.exe
                                                                        1⤵
                                                                          PID:4020
                                                                        • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                          "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                          1⤵
                                                                            PID:2712
                                                                          • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                            "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                            1⤵
                                                                              PID:1244
                                                                            • C:\Windows\explorer.exe
                                                                              explorer.exe
                                                                              1⤵
                                                                                PID:2440
                                                                              • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                1⤵
                                                                                  PID:532
                                                                                • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                  "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                  1⤵
                                                                                    PID:2876
                                                                                  • C:\Windows\explorer.exe
                                                                                    explorer.exe
                                                                                    1⤵
                                                                                      PID:4308
                                                                                    • C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
                                                                                      "C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca
                                                                                      1⤵
                                                                                        PID:2964
                                                                                      • C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
                                                                                        "C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca
                                                                                        1⤵
                                                                                          PID:688
                                                                                        • C:\Windows\explorer.exe
                                                                                          explorer.exe
                                                                                          1⤵
                                                                                            PID:4104

                                                                                          Network

                                                                                          MITRE ATT&CK Enterprise v15

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\Program Files (x86)\LP\2CCA\C20.tmp

                                                                                            Filesize

                                                                                            100KB

                                                                                            MD5

                                                                                            78990d6cbe646d20d434a721010122b1

                                                                                            SHA1

                                                                                            8e69473f1484fba63ee3a42351e3cfe0262c3a48

                                                                                            SHA256

                                                                                            c1a9e3495ea75b9a59149f296915d34165d687edf71173770c67b74ca323421e

                                                                                            SHA512

                                                                                            7112f94f2f2b63e68e82f8550142ecca0f71d24deb75f788f6567c6024b2007cfec8f86109a92b589889be17a3f654ed3ac4cbebea704e118a859b92fff3dada

                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                            Filesize

                                                                                            471B

                                                                                            MD5

                                                                                            bae977366963bb7100ebf1732c8af5a3

                                                                                            SHA1

                                                                                            c654956e9ce8faf3901cb5f8dbb6e11a41917aaa

                                                                                            SHA256

                                                                                            6a54bce97c677b4874fd5cbdbeb297304e3662f6c4624a5ff345ea0bb6590d86

                                                                                            SHA512

                                                                                            89c81dfad870c8e9f51ee8e9c0ee4556106fb14f87fc74bd928624a5fed8121c001c044d40ce853e524061ec191c232eee58a06307deadad98d0f65046509caa

                                                                                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E2C6CBAF0AF08CF203BA74BF0D0AB6D5_CBDCCBFE4F7A916411C1E69BDD97BB04

                                                                                            Filesize

                                                                                            412B

                                                                                            MD5

                                                                                            8872076141d0b8e6813ae062eee711dc

                                                                                            SHA1

                                                                                            cb5287890dbfa24a1647565392d463713909ad59

                                                                                            SHA256

                                                                                            55c48b2d5bdeb46258bf64efe5325118e2ee27403fde5fdfde243769724e80d0

                                                                                            SHA512

                                                                                            88cdb1aaa269bc5166157b89f0bc8a2b917027cccbc807df5c386d0ac0c1dbbfc3a69937eb8a15e2631bf77582e73f080bb49b10629dae2b69d7aad28b6664e0

                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\AC\TokenBroker\Cache\fbaf94e759052658216786bfbabcdced1b67a5c2.tbres

                                                                                            Filesize

                                                                                            2KB

                                                                                            MD5

                                                                                            aa392b57ae286db5dd27c934fdc2d051

                                                                                            SHA1

                                                                                            1add9b917c30ac6d0161a971f0b76ee3031284cf

                                                                                            SHA256

                                                                                            3813a7c8943b80432a98e1b2d3b9e4afa8daeac454787b5b3421eb8444408d55

                                                                                            SHA512

                                                                                            d7f5a57bca6814c89a4b2f9ba582d4f058a32610c436fb71259fa40ffdc0345862798961005b6834c0ad4bb34759c7121bb4ef7725d9269572791f96e4e44aca

                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Office_SETLANG_EXE_15

                                                                                            Filesize

                                                                                            36KB

                                                                                            MD5

                                                                                            0e2a09c8b94747fa78ec836b5711c0c0

                                                                                            SHA1

                                                                                            92495421ad887f27f53784c470884802797025ad

                                                                                            SHA256

                                                                                            0c1cdbbf6d974764aad46477863059eaec7b1717a7d26b025f0f8fe24338bb36

                                                                                            SHA512

                                                                                            61530a33a6109467962ba51371821ea55bb36cd2abc0e7a15f270abf62340e9166e66a1b10f4de9a306b368820802c4adb9653b9a5acd6f1e825e60128fd2409

                                                                                          • C:\Users\Admin\AppData\Local\Packages\Microsoft.Windows.Search_cw5n1h2txyewy\LocalState\AppIconCache\100\Microsoft_Windows_Explorer

                                                                                            Filesize

                                                                                            36KB

                                                                                            MD5

                                                                                            ab0262f72142aab53d5402e6d0cb5d24

                                                                                            SHA1

                                                                                            eaf95bb31ae1d4c0010f50e789bdc8b8e3116116

                                                                                            SHA256

                                                                                            20a108577209b2499cfdba77645477dd0d9771a77d42a53c6315156761efcfbb

                                                                                            SHA512

                                                                                            bf9580f3e5d1102cf758503e18a2cf98c799c4a252eedf9344f7c5626da3a1cf141353f01601a3b549234cc3f2978ad31f928068395b56f9f0885c07dbe81da1

                                                                                          • C:\Users\Admin\AppData\Local\Packages\microsoft.windows.search_cw5n1h2txyewy\AC\Microsoft\Internet Explorer\DOMStore\80AM9X7C\microsoft.windows[1].xml

                                                                                            Filesize

                                                                                            96B

                                                                                            MD5

                                                                                            c839a1973d3feaead377ea2dad131fe6

                                                                                            SHA1

                                                                                            252758616792b9b2f10bc460c84b1c1eba75ea04

                                                                                            SHA256

                                                                                            efecd8d483398a6cb569af17e66cb0ba1ca4b9c65f4a697fc7642cc007fc3ccd

                                                                                            SHA512

                                                                                            fee6ca3d2ae272b0f1f291e98830215f2ac138747651be78325ab7c1ba3f01f72cbfed4c886853caba45f16c59c78543a87a5f872b2c1f85bffa3a4e11bf50e1

                                                                                          • C:\Users\Admin\AppData\Roaming\A04B2\203E.04B

                                                                                            Filesize

                                                                                            996B

                                                                                            MD5

                                                                                            a24d0f04a21c915b341fad65af10233d

                                                                                            SHA1

                                                                                            0e8cf0d0e8c15a42e2ebede2be8cd80ba44acf3d

                                                                                            SHA256

                                                                                            1d5de443837700cf0e3ea69f284302a25332a62fa2fafa88018e660ebe041ea3

                                                                                            SHA512

                                                                                            07e8af161e4b40df71cef1148788acbbef1be64edf62539b86c8c643de34ee9a60261defc86959f5d51d30aa9549536f22dbe4e73ceb91f557632efb423546a7

                                                                                          • C:\Users\Admin\AppData\Roaming\A04B2\203E.04B

                                                                                            Filesize

                                                                                            600B

                                                                                            MD5

                                                                                            3384950ad41914470d8ac8c0cbda5c69

                                                                                            SHA1

                                                                                            352bf5bdc977790a223eaadc8a5ec57dfde75ef2

                                                                                            SHA256

                                                                                            b64ef57e2179e5d17294961e1357e6c6c470bf5e66c346756d0faeacb62790be

                                                                                            SHA512

                                                                                            6712c055a1ca3c7f082e327732957a942c22eee98c861a31656c2fd0d3b15a073ac4e6ff93b297dbabf30bc915345f7097ef51b83d6611817ace52e54eda217b

                                                                                          • C:\Users\Admin\AppData\Roaming\A04B2\203E.04B

                                                                                            Filesize

                                                                                            1KB

                                                                                            MD5

                                                                                            1a502a0f5af770d1b87caa62f85d7a96

                                                                                            SHA1

                                                                                            3aae8dd526d417d6a9c6eb805e038a50aed94b7c

                                                                                            SHA256

                                                                                            baefb70719b647774644d3b700095688c997b631c09d1a64b8b03d51503b0be3

                                                                                            SHA512

                                                                                            ee8fedf0648f0ed82414e02e54d15ae9699a4b3cee82b49e9826c6ee6bb95fd99ec1a370c726e1133d0b5c969dcec9748df5561d00df53bbdeb7ab01909cf03d

                                                                                          • memory/100-1186-0x0000000004BF0000-0x0000000004BF1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/432-1339-0x00000000040D0000-0x00000000040D1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/544-753-0x00000268E94F0000-0x00000268E9510000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/544-765-0x00000268E94B0000-0x00000268E94D0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/544-749-0x00000268E8600000-0x00000268E8700000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/544-776-0x00000268E9AC0000-0x00000268E9AE0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/1144-288-0x0000000004A70000-0x0000000004A71000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/1212-1487-0x0000000000DA0000-0x0000000000DA1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/1360-898-0x0000000004040000-0x0000000004041000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2000-15-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/2000-14-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/2404-1047-0x0000000004550000-0x0000000004551000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2404-125-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/2548-1054-0x000001B4DB140000-0x000001B4DB160000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2548-1050-0x000001B4DA000000-0x000001B4DA100000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/2548-1051-0x000001B4DA000000-0x000001B4DA100000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/2548-1074-0x000001B4DB100000-0x000001B4DB120000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2548-1049-0x000001B4DA000000-0x000001B4DA100000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/2548-1085-0x000001B4DB510000-0x000001B4DB530000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2556-595-0x00000205E5400000-0x00000205E5500000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/2556-596-0x00000205E5400000-0x00000205E5500000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/2556-618-0x00000205E68E0000-0x00000205E6900000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2556-605-0x00000205E5FD0000-0x00000205E5FF0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2556-600-0x00000205E6320000-0x00000205E6340000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2844-1520-0x00000234B56A0000-0x00000234B56C0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2844-1495-0x00000234B50C0000-0x00000234B50E0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2844-1508-0x00000234B5080000-0x00000234B50A0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/2848-747-0x0000000004410000-0x0000000004411000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/2852-714-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/2852-1-0x0000000000400000-0x0000000000468000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/2852-2-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/2852-11-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/2852-13-0x0000000000400000-0x0000000000468000-memory.dmp

                                                                                            Filesize

                                                                                            416KB

                                                                                          • memory/2852-123-0x0000000000400000-0x000000000046A000-memory.dmp

                                                                                            Filesize

                                                                                            424KB

                                                                                          • memory/4036-443-0x00000000043A0000-0x00000000043A1000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4384-294-0x000001E983520000-0x000001E983540000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4384-290-0x000001E982600000-0x000001E982700000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/4384-291-0x000001E982600000-0x000001E982700000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/4384-316-0x000001E9838E0000-0x000001E983900000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4384-302-0x000001E9831D0000-0x000001E9831F0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4384-289-0x000001E982600000-0x000001E982700000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/4444-1204-0x00000250D3670000-0x00000250D3690000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4444-1215-0x00000250D3C80000-0x00000250D3CA0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4444-1192-0x00000250D36B0000-0x00000250D36D0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4444-1189-0x00000250D2750000-0x00000250D2850000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/4484-936-0x0000026724F60000-0x0000026724F80000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4484-904-0x0000026724B90000-0x0000026724BB0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4484-899-0x0000025F22A40000-0x0000025F22B40000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/4484-900-0x0000025F22A40000-0x0000025F22B40000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/4484-915-0x0000026724B50000-0x0000026724B70000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/4784-594-0x0000000004770000-0x0000000004771000-memory.dmp

                                                                                            Filesize

                                                                                            4KB

                                                                                          • memory/4988-707-0x0000000000400000-0x000000000041D000-memory.dmp

                                                                                            Filesize

                                                                                            116KB

                                                                                          • memory/5012-1372-0x0000024AD3080000-0x0000024AD30A0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/5012-1359-0x0000024AD2C70000-0x0000024AD2C90000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/5012-1345-0x0000024AD2CB0000-0x0000024AD2CD0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/5032-445-0x0000022130720000-0x0000022130820000-memory.dmp

                                                                                            Filesize

                                                                                            1024KB

                                                                                          • memory/5032-450-0x0000022131880000-0x00000221318A0000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/5032-459-0x0000022131840000-0x0000022131860000-memory.dmp

                                                                                            Filesize

                                                                                            128KB

                                                                                          • memory/5032-471-0x0000022131C50000-0x0000022131C70000-memory.dmp

                                                                                            Filesize

                                                                                            128KB