Analysis
-
max time kernel
152s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 13:00
Behavioral task
behavioral1
Sample
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe
-
Size
19KB
-
MD5
fa58cabbd68d1e46518aee4da3c88474
-
SHA1
d95d0b8d4df44fe546359558b350ded16548e7ee
-
SHA256
0e445703baf044431ce9a8c9c4198c56b285ad2108ace100b2469e3acb1971d9
-
SHA512
ff33fc2fe86728e759b47a3afe23ff15e35f31ef1b5fd55b2fe046afbbc1eab7c9937f542c142f4996001e799a1e2fcf4a10d2ad1f9918acde8ace0ee103d603
-
SSDEEP
384:EHKZfuH87GowDqGoMwevqxP6k6zIDwPVBSwdoCZ/wNJj7R:ZZfuHUvwDKP6kMpfdqN3
Malware Config
Signatures
-
Detect XtremeRAT payload 62 IoCs
Processes:
resource yara_rule behavioral1/memory/2072-12-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2556-14-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2396-19-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2556-17-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2396-23-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2196-24-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2196-26-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2580-28-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2580-32-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1260-33-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1260-36-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/112-37-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/112-41-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2076-42-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2076-45-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1816-46-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1816-50-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1564-51-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1564-54-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1964-55-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1964-58-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/560-60-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/560-62-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2864-64-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2864-66-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2964-68-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2964-73-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2900-74-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2900-79-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2776-80-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2776-82-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1696-84-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1696-88-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2192-89-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2192-91-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2344-93-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2344-97-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2832-98-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2832-101-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/268-102-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/268-106-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1824-107-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1824-109-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1400-111-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1400-115-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2308-116-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2308-118-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1608-120-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/1608-123-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2308-125-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/2308-127-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3116-129-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3116-133-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3236-134-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3352-138-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3236-136-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3352-142-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3476-143-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3476-145-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3588-147-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3588-151-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat behavioral1/memory/3712-152-0x0000000000C80000-0x0000000000C95000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Modifies Installed Components in the registry 2 TTPs 64 IoCs
Processes:
server.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exefa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\server.exe restart" server.exe -
Executes dropped EXE 31 IoCs
Processes:
server.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exepid process 2556 server.exe 2396 server.exe 2196 server.exe 2580 server.exe 1260 server.exe 112 server.exe 2076 server.exe 1816 server.exe 1564 server.exe 1964 server.exe 560 server.exe 2864 server.exe 2964 server.exe 2900 server.exe 2776 server.exe 1696 server.exe 2192 server.exe 2344 server.exe 2832 server.exe 268 server.exe 1824 server.exe 1400 server.exe 2308 server.exe 1608 server.exe 2308 server.exe 3116 server.exe 3236 server.exe 3352 server.exe 3476 server.exe 3588 server.exe 3712 server.exe -
Loads dropped DLL 2 IoCs
Processes:
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exepid process 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe -
Processes:
resource yara_rule behavioral1/memory/2072-0-0x0000000000C80000-0x0000000000C95000-memory.dmp upx \Windows\InstallDir\server.exe upx behavioral1/memory/2072-12-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2556-14-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2396-19-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2556-17-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2396-23-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2196-24-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2196-26-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2580-28-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2580-32-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1260-33-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1260-36-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/112-37-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/112-41-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2076-42-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2076-45-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1816-46-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1816-50-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1564-51-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1564-54-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1964-55-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1964-58-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/560-60-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/560-62-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2864-64-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2864-66-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2964-68-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2964-73-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2900-74-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2900-79-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2776-80-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2776-82-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1696-84-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1696-88-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2192-89-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2192-91-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2344-93-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2344-97-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2832-98-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2832-101-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/268-102-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/268-106-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1824-107-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1824-109-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1400-111-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1400-115-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2308-116-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2308-118-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1608-120-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/1608-123-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2308-125-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/2308-127-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3116-129-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3116-133-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3236-134-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3352-138-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3236-136-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3352-142-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3476-143-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3476-145-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3588-147-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3588-151-0x0000000000C80000-0x0000000000C95000-memory.dmp upx behavioral1/memory/3712-152-0x0000000000C80000-0x0000000000C95000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
server.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exeserver.exefa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\server.exe" server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3787592910-3720486031-2929222812-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\server.exe" server.exe -
Drops file in Windows directory 2 IoCs
Processes:
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\InstallDir\server.exe fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe File created C:\Windows\InstallDir\server.exe fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exeserver.exedescription pid process target process PID 2072 wrote to memory of 2284 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2284 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2284 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2284 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2284 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2992 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2992 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2992 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2992 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2992 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 3028 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 3028 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 3028 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 3028 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 3028 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2540 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2540 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2540 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2540 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2540 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2528 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2528 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2528 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2528 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2528 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2596 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2596 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2596 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2596 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2596 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2616 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2616 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2616 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2616 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2616 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2632 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2632 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2632 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2632 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2556 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe server.exe PID 2072 wrote to memory of 2556 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe server.exe PID 2072 wrote to memory of 2556 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe server.exe PID 2072 wrote to memory of 2556 2072 fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe server.exe PID 2556 wrote to memory of 3000 2556 server.exe iexplore.exe PID 2556 wrote to memory of 3000 2556 server.exe iexplore.exe PID 2556 wrote to memory of 3000 2556 server.exe iexplore.exe PID 2556 wrote to memory of 3000 2556 server.exe iexplore.exe PID 2556 wrote to memory of 3000 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2712 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2712 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2712 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2712 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2712 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2704 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2704 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2704 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2704 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2704 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2916 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2916 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2916 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2916 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2916 2556 server.exe iexplore.exe PID 2556 wrote to memory of 2180 2556 server.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fa58cabbd68d1e46518aee4da3c88474_JaffaCakes118.exe"1⤵
- Modifies Installed Components in the registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"4⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"5⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"6⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"7⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"8⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"9⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"10⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"12⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"13⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"14⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"15⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"16⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"17⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"18⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"19⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"20⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"21⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"22⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"23⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"24⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"25⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"26⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"27⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"28⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"29⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"30⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"31⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵
-
C:\Windows\InstallDir\server.exe"C:\Windows\InstallDir\server.exe"32⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\((Mutex)).cfgFilesize
1KB
MD599ebc5f2b6b8cff92c04cafc1944833f
SHA1c552e666fb4cbba1181700f157972b28fbfa0333
SHA256c9a5331cef39b19dd50fb834a64f887aedd416de1c8a0ba72248368d31f004f6
SHA51214ed42aa7845fc5d6635556d9bc667ac9c38df72a074838253ae418cb9a1220aec30bf6314c13d1acffbe485663441e02998ef6267ca6be3892f7dfa32307dcf
-
\Windows\InstallDir\server.exeFilesize
19KB
MD5fa58cabbd68d1e46518aee4da3c88474
SHA1d95d0b8d4df44fe546359558b350ded16548e7ee
SHA2560e445703baf044431ce9a8c9c4198c56b285ad2108ace100b2469e3acb1971d9
SHA512ff33fc2fe86728e759b47a3afe23ff15e35f31ef1b5fd55b2fe046afbbc1eab7c9937f542c142f4996001e799a1e2fcf4a10d2ad1f9918acde8ace0ee103d603
-
memory/112-41-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/112-37-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/268-106-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/268-102-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/560-62-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/560-60-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1260-33-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1260-36-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1400-115-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1400-111-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1564-54-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1564-51-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1608-123-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1608-120-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1696-84-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1696-88-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1816-46-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1816-50-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1824-109-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1824-107-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1964-55-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/1964-58-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2072-12-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2072-13-0x0000000002800000-0x0000000002815000-memory.dmpFilesize
84KB
-
memory/2072-0-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2076-45-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2076-42-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2192-89-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2192-91-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2196-26-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2196-24-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2308-127-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2308-125-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2308-118-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2308-116-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2344-93-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2344-97-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2396-23-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2396-19-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2556-14-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2556-17-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2580-32-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2580-28-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2776-82-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2776-80-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2832-101-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2832-98-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2864-66-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2864-64-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2900-79-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2900-74-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2964-68-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/2964-73-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3116-129-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3116-133-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3236-134-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3236-136-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3352-138-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3352-142-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3476-143-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3476-145-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3588-147-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3588-151-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB
-
memory/3712-152-0x0000000000C80000-0x0000000000C95000-memory.dmpFilesize
84KB