Analysis
-
max time kernel
56s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-04-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe
-
Size
226KB
-
MD5
ea95c71d3c8f55d6a51ae43dd9cde9d9
-
SHA1
25460dbd2c7e996de80285971e787fb83e38d32e
-
SHA256
1aa75d1bfc89d1efdf0ee23cf3ba489d95d0fc73d1fb43358b3aa7e416b89536
-
SHA512
789a95758a1a7b680bdeb0a169834406fc68e14e9063bf6fe897ca1fb19d4b6628464a674aa9f6e0a65eff5ebeb8762ace692cd46fc39a3cb21de2ae91e77e60
-
SSDEEP
6144:J9evRcgVy2FIMB4TyQOI5JgpcvqNplce+f+hU5P4g0oa:J46gVPOT0Iw5preDk
Malware Config
Extracted
xtremerat
a411.no-ip.info
Signatures
-
Detect XtremeRAT payload 5 IoCs
Processes:
resource yara_rule behavioral1/memory/2560-51-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2560-58-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2416-67-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2560-73-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2500-87-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Executes dropped EXE 41 IoCs
Processes:
tim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exepid process 1152 tim.exe 2500 tim.exe 2896 tim.exe 1256 tim.exe 1700 tim.exe 2092 tim.exe 2068 tim.exe 2100 tim.exe 2228 tim.exe 1828 tim.exe 1956 tim.exe 2632 tim.exe 2380 tim.exe 1480 tim.exe 1476 tim.exe 440 tim.exe 2304 tim.exe 1708 tim.exe 1572 tim.exe 2016 tim.exe 2372 tim.exe 2860 tim.exe 1876 tim.exe 2596 tim.exe 2556 tim.exe 2560 tim.exe 2732 tim.exe 1988 tim.exe 1964 tim.exe 2820 tim.exe 1680 tim.exe 2640 tim.exe 764 tim.exe 1948 tim.exe 1036 tim.exe 1992 tim.exe 2144 tim.exe 1088 tim.exe 2760 tim.exe 2504 tim.exe 3000 tim.exe -
Loads dropped DLL 10 IoCs
Processes:
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exesvchost.exepid process 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe 2416 svchost.exe 2416 svchost.exe 2416 svchost.exe 2416 svchost.exe 2416 svchost.exe 2416 svchost.exe 2416 svchost.exe 2416 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/2560-45-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2560-49-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2560-51-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2560-58-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2416-67-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2560-73-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2500-87-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 22 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exedescription ioc process File opened for modification \??\PhysicalDrive0 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe File opened for modification \??\PhysicalDrive0 tim.exe -
Suspicious use of SetThreadContext 21 IoCs
Processes:
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exedescription pid process target process PID 1756 set thread context of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1152 set thread context of 2500 1152 tim.exe tim.exe PID 2896 set thread context of 1256 2896 tim.exe tim.exe PID 2092 set thread context of 2068 2092 tim.exe tim.exe PID 1700 set thread context of 2100 1700 tim.exe tim.exe PID 2228 set thread context of 1956 2228 tim.exe tim.exe PID 1828 set thread context of 2632 1828 tim.exe tim.exe PID 2380 set thread context of 1480 2380 tim.exe tim.exe PID 1476 set thread context of 440 1476 tim.exe tim.exe PID 2304 set thread context of 1708 2304 tim.exe tim.exe PID 1572 set thread context of 2016 1572 tim.exe tim.exe PID 2860 set thread context of 1876 2860 tim.exe tim.exe PID 2596 set thread context of 2556 2596 tim.exe tim.exe PID 2560 set thread context of 2732 2560 tim.exe tim.exe PID 2372 set thread context of 1988 2372 tim.exe tim.exe PID 2820 set thread context of 1680 2820 tim.exe tim.exe PID 2640 set thread context of 764 2640 tim.exe tim.exe PID 1948 set thread context of 1036 1948 tim.exe tim.exe PID 1964 set thread context of 1992 1964 tim.exe tim.exe PID 1088 set thread context of 2760 1088 tim.exe iexplore.exe PID 2504 set thread context of 3000 2504 tim.exe tim.exe -
Drops file in Windows directory 41 IoCs
Processes:
tim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exeea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exedescription ioc process File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File created C:\Windows\winar\tim.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\ tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\tim.exe tim.exe File opened for modification C:\Windows\winar\ tim.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
tim.exetim.exetim.exetim.exetim.exetim.exeea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" tim.exe -
Suspicious use of SetWindowsHookEx 21 IoCs
Processes:
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exetim.exepid process 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe 1152 tim.exe 2896 tim.exe 2092 tim.exe 1700 tim.exe 2228 tim.exe 1828 tim.exe 2380 tim.exe 1476 tim.exe 2304 tim.exe 1572 tim.exe 2860 tim.exe 2596 tim.exe 2560 tim.exe 2372 tim.exe 2820 tim.exe 2640 tim.exe 1948 tim.exe 1964 tim.exe 1088 tim.exe 2504 tim.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exeea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exetim.exedescription pid process target process PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 1756 wrote to memory of 2560 1756 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe PID 2560 wrote to memory of 2416 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe svchost.exe PID 2560 wrote to memory of 2416 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe svchost.exe PID 2560 wrote to memory of 2416 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe svchost.exe PID 2560 wrote to memory of 2416 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe svchost.exe PID 2560 wrote to memory of 2416 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe svchost.exe PID 2560 wrote to memory of 2520 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2520 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2520 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2520 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2520 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2900 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2900 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2900 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2900 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2900 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2116 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2116 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2116 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2116 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2116 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2280 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2280 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2280 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2280 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2280 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2184 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2184 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2184 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2184 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 2184 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1908 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1908 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1908 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1908 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1908 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1896 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1896 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1896 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1896 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1896 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 324 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 324 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 324 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 324 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe iexplore.exe PID 2560 wrote to memory of 1152 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe tim.exe PID 2560 wrote to memory of 1152 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe tim.exe PID 2560 wrote to memory of 1152 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe tim.exe PID 2560 wrote to memory of 1152 2560 ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe PID 1152 wrote to memory of 2500 1152 tim.exe tim.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ea95c71d3c8f55d6a51ae43dd9cde9d9_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Loads dropped DLL
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"10⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe11⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe13⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"14⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe15⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"16⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"18⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"10⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe11⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"12⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"14⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"16⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"18⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
- Executes dropped EXE
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"10⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"12⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Modifies registry class
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"10⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"10⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"12⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"8⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"10⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"6⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Windows\winar\tim.exe"C:\Windows\winar\tim.exe"5⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
-
C:\Windows\winar\tim.exeC:\Windows\winar\tim.exe6⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\((Mutex)).cfgFilesize
1KB
MD5b84c6bacadd226389a422c878def902a
SHA1c8475cfd4b0ff1199a6b02fb213f4fb11886cb07
SHA2569755f94de1f241c5ac0b1fa9dee88ef18305563510a1d9adb00b3276fadade0d
SHA512c6146e0ae39aa8f5e3add6d442632dd8e6a451b86ea37676da58f39cb2a46efde3a124f750a084fb1a80560451c42241eaaefb8e5db0564d78cfc6966eee0632
-
C:\Windows\winar\tim.exeFilesize
226KB
MD5ea95c71d3c8f55d6a51ae43dd9cde9d9
SHA125460dbd2c7e996de80285971e787fb83e38d32e
SHA2561aa75d1bfc89d1efdf0ee23cf3ba489d95d0fc73d1fb43358b3aa7e416b89536
SHA512789a95758a1a7b680bdeb0a169834406fc68e14e9063bf6fe897ca1fb19d4b6628464a674aa9f6e0a65eff5ebeb8762ace692cd46fc39a3cb21de2ae91e77e60
-
\??\PIPE\srvsvcMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
memory/1152-84-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1152-81-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1152-80-0x00000000002E0000-0x00000000002E1000-memory.dmpFilesize
4KB
-
memory/1152-78-0x00000000004B0000-0x00000000004B1000-memory.dmpFilesize
4KB
-
memory/1152-77-0x0000000000240000-0x0000000000250000-memory.dmpFilesize
64KB
-
memory/1152-74-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1476-629-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1572-673-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1700-160-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1756-48-0x00000000029B0000-0x00000000029B1000-memory.dmpFilesize
4KB
-
memory/1756-14-0x00000000003F0000-0x00000000003F1000-memory.dmpFilesize
4KB
-
memory/1756-40-0x0000000002950000-0x0000000002951000-memory.dmpFilesize
4KB
-
memory/1756-39-0x0000000002960000-0x0000000002961000-memory.dmpFilesize
4KB
-
memory/1756-38-0x00000000027E0000-0x00000000027E1000-memory.dmpFilesize
4KB
-
memory/1756-1-0x0000000000390000-0x0000000000395000-memory.dmpFilesize
20KB
-
memory/1756-46-0x00000000029C0000-0x00000000029C1000-memory.dmpFilesize
4KB
-
memory/1756-3-0x0000000000300000-0x0000000000301000-memory.dmpFilesize
4KB
-
memory/1756-50-0x00000000029E0000-0x00000000029E1000-memory.dmpFilesize
4KB
-
memory/1756-0-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1756-52-0x00000000029D0000-0x00000000029D1000-memory.dmpFilesize
4KB
-
memory/1756-7-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/1756-44-0x0000000002990000-0x0000000002991000-memory.dmpFilesize
4KB
-
memory/1756-37-0x0000000002940000-0x0000000002941000-memory.dmpFilesize
4KB
-
memory/1756-36-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/1756-34-0x00000000027A0000-0x00000000027A1000-memory.dmpFilesize
4KB
-
memory/1756-33-0x00000000027B0000-0x00000000027B1000-memory.dmpFilesize
4KB
-
memory/1756-32-0x0000000002780000-0x0000000002781000-memory.dmpFilesize
4KB
-
memory/1756-31-0x0000000002790000-0x0000000002791000-memory.dmpFilesize
4KB
-
memory/1756-30-0x0000000002760000-0x0000000002761000-memory.dmpFilesize
4KB
-
memory/1756-29-0x0000000002770000-0x0000000002771000-memory.dmpFilesize
4KB
-
memory/1756-28-0x0000000002620000-0x0000000002621000-memory.dmpFilesize
4KB
-
memory/1756-27-0x0000000002750000-0x0000000002751000-memory.dmpFilesize
4KB
-
memory/1756-26-0x0000000002600000-0x0000000002601000-memory.dmpFilesize
4KB
-
memory/1756-25-0x0000000002610000-0x0000000002611000-memory.dmpFilesize
4KB
-
memory/1756-24-0x00000000005E0000-0x00000000005E1000-memory.dmpFilesize
4KB
-
memory/1756-23-0x00000000025F0000-0x00000000025F1000-memory.dmpFilesize
4KB
-
memory/1756-22-0x00000000005C0000-0x00000000005C1000-memory.dmpFilesize
4KB
-
memory/1756-21-0x00000000005D0000-0x00000000005D1000-memory.dmpFilesize
4KB
-
memory/1756-20-0x00000000005A0000-0x00000000005A1000-memory.dmpFilesize
4KB
-
memory/1756-19-0x00000000005B0000-0x00000000005B1000-memory.dmpFilesize
4KB
-
memory/1756-18-0x0000000000580000-0x0000000000581000-memory.dmpFilesize
4KB
-
memory/1756-16-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/1756-15-0x0000000000570000-0x0000000000571000-memory.dmpFilesize
4KB
-
memory/1756-12-0x00000000002B0000-0x00000000002B1000-memory.dmpFilesize
4KB
-
memory/1756-41-0x0000000002980000-0x0000000002981000-memory.dmpFilesize
4KB
-
memory/1756-13-0x0000000000510000-0x0000000000511000-memory.dmpFilesize
4KB
-
memory/1756-11-0x00000000003E0000-0x00000000003E1000-memory.dmpFilesize
4KB
-
memory/1756-54-0x0000000003360000-0x0000000003361000-memory.dmpFilesize
4KB
-
memory/1756-53-0x0000000003370000-0x0000000003371000-memory.dmpFilesize
4KB
-
memory/1756-55-0x0000000003390000-0x0000000003391000-memory.dmpFilesize
4KB
-
memory/1756-56-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/1756-57-0x0000000003380000-0x0000000003381000-memory.dmpFilesize
4KB
-
memory/1756-9-0x00000000002A0000-0x00000000002A1000-memory.dmpFilesize
4KB
-
memory/1756-8-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/1756-6-0x0000000000220000-0x0000000000221000-memory.dmpFilesize
4KB
-
memory/1756-43-0x00000000029A0000-0x00000000029A1000-memory.dmpFilesize
4KB
-
memory/1756-5-0x00000000003A0000-0x00000000003A1000-memory.dmpFilesize
4KB
-
memory/1756-42-0x0000000002970000-0x0000000002971000-memory.dmpFilesize
4KB
-
memory/1756-35-0x00000000027D0000-0x00000000027D1000-memory.dmpFilesize
4KB
-
memory/1756-17-0x0000000000590000-0x0000000000591000-memory.dmpFilesize
4KB
-
memory/1756-10-0x0000000000290000-0x0000000000291000-memory.dmpFilesize
4KB
-
memory/1828-591-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2092-130-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2228-585-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2304-647-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2380-617-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2416-65-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2416-67-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2500-87-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2560-58-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2560-73-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2560-51-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2560-49-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2560-72-0x0000000002F60000-0x0000000002FEE000-memory.dmpFilesize
568KB
-
memory/2560-45-0x0000000000C80000-0x0000000000C96000-memory.dmpFilesize
88KB
-
memory/2860-701-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2896-108-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB
-
memory/2896-98-0x00000000002D0000-0x00000000002D1000-memory.dmpFilesize
4KB
-
memory/2896-95-0x00000000003C0000-0x00000000003C1000-memory.dmpFilesize
4KB
-
memory/2896-94-0x00000000003B0000-0x00000000003B1000-memory.dmpFilesize
4KB
-
memory/2896-91-0x0000000000400000-0x000000000048E000-memory.dmpFilesize
568KB