Malware Analysis Report

2024-09-22 20:10

Sample ID 240614-j5g32ssanh
Target a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118
SHA256 f0a2a5c6c2ac22ee7eb88d6fd42eb42b60a2a615173b5441be63e1c1066e037e
Tags
pony rat spyware stealer evasion persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK Matrix

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

f0a2a5c6c2ac22ee7eb88d6fd42eb42b60a2a615173b5441be63e1c1066e037e

Threat Level: Known bad

The file a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118 was found to be: Known bad.

Malicious Activity Summary

pony rat spyware stealer evasion persistence

Modifies WinLogon for persistence

Pony,Fareit

Pony family

Modifies visiblity of hidden/system files in Explorer

Modifies Installed Components in the registry

Loads dropped DLL

Executes dropped EXE

Drops startup file

Adds Run key to start application

Suspicious use of SetThreadContext

Drops file in Windows directory

Unsigned PE

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious use of SetWindowsHookEx

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK Matrix V13

Analysis: static1

Detonation Overview

Reported

2024-06-14 08:14

Signatures

Pony family

pony

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral1

Detonation Overview

Submitted

2024-06-14 08:14

Reported

2024-06-14 08:17

Platform

win7-20240611-en

Max time kernel

56s

Max time network

128s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe"

Signatures

Pony,Fareit

rat spyware stealer pony

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Parameters.ini C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A

Enumerates physical storage devices

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1720 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 1720 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 1720 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 1720 wrote to memory of 1576 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 1720 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 1720 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 1720 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 1720 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 1720 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 1720 wrote to memory of 2536 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 2536 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2536 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2536 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2536 wrote to memory of 264 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 264 wrote to memory of 2908 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 264 wrote to memory of 2908 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 264 wrote to memory of 2908 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 264 wrote to memory of 2908 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 264 wrote to memory of 2908 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 264 wrote to memory of 2908 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

Network

N/A

Files

memory/1720-0-0x00000000001B0000-0x00000000001B1000-memory.dmp

C:\Windows\Parameters.ini

MD5 6687785d6a31cdf9a5f80acb3abc459b
SHA1 1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA256 3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA512 5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

memory/1720-17-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1720-19-0x00000000001B0000-0x00000000001B1000-memory.dmp

memory/2536-28-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1720-29-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2536-25-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2536-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

memory/2536-20-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\system\explorer.exe

MD5 fee7393aca875b7c18149c68030ba633
SHA1 6e499279eb6b18bdd656c349e7ec3780c815f94b
SHA256 7afc3f927df60e0df0daf36f2ad54599258bd9cfdedcadd95676a2f8bfac49a2
SHA512 452d6a0319a97a38be4d6be0a220854bb0e92273b5365f643f04b92d46770191b25ca3dfe91d8bdcfab0b47db6b4ff2014db239363f5c9076f83fb415a252c87

memory/264-42-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2536-49-0x0000000000400000-0x000000000043E000-memory.dmp

memory/264-60-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/264-70-0x0000000000400000-0x00000000005D3000-memory.dmp

C:\Windows\system\spoolsv.exe

MD5 ef4f9e31eacb9e7a57f8af0f953d837d
SHA1 4f27eb3f54f75800a99c227d12b57731f1578acf
SHA256 66d64a2aee1d33efb0eb4dbd0835925512eefbb94f47994a87bcf8ad1543b16e
SHA512 a1b0fd25774bfa64e52ebda061a0c5ffd9a05d3374c4a30b2cd0bb274977730144fe508bf738bcfa799cda2dbf433de896519f3c628d575699168747fc97c2b0

C:\Windows\Parameters.ini

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/1028-1418-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2380-1424-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2748-1416-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2284-1417-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2900-1415-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2908-1409-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2072-1686-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2312-1689-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/364-1688-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2864-1687-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1596-1685-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2916-1945-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2220-1944-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3008-1942-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2568-1940-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2728-1943-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2236-1939-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/676-1938-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2036-1941-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1992-2241-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2068-2247-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1676-2240-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2316-2235-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2212-2239-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/948-2238-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1556-2237-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1588-2236-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1648-2492-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2856-2491-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3016-2490-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2680-2489-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3384-2998-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3588-3011-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3588-3015-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1708-3039-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3384-3082-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4132-3165-0x0000000000400000-0x000000000043E000-memory.dmp

memory/924-3156-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4404-3210-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4396-3182-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4676-3242-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4772-3253-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4836-3277-0x0000000000400000-0x000000000043E000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-06-14 08:14

Reported

2024-06-14 08:17

Platform

win10v2004-20240508-en

Max time kernel

132s

Max time network

159s

Command Line

"C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" \??\c:\windows\system\explorer.exe N/A

Modifies visiblity of hidden/system files in Explorer

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" \??\c:\windows\system\explorer.exe N/A

Pony,Fareit

rat spyware stealer pony

Modifies Installed Components in the registry

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" \??\c:\windows\system\explorer.exe N/A
Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} \??\c:\windows\system\explorer.exe N/A

Drops startup file

Description Indicator Process Target
File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" \??\c:\windows\system\explorer.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" \??\c:\windows\system\explorer.exe N/A

Suspicious use of SetThreadContext

Description Indicator Process Target
PID 2184 set thread context of 2260 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 4192 set thread context of 5064 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4080 set thread context of 2208 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1840 set thread context of 1196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1268 set thread context of 2188 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4864 set thread context of 2100 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3520 set thread context of 4396 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 5032 set thread context of 3472 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 452 set thread context of 1416 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4296 set thread context of 4612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1820 set thread context of 388 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4356 set thread context of 2972 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 680 set thread context of 4064 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4708 set thread context of 4652 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4948 set thread context of 4796 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 436 set thread context of 1556 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1860 set thread context of 4128 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2524 set thread context of 552 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3804 set thread context of 4424 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3044 set thread context of 4712 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3056 set thread context of 1220 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3772 set thread context of 1356 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2664 set thread context of 976 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4560 set thread context of 2572 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2420 set thread context of 4832 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3272 set thread context of 2704 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4724 set thread context of 1596 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4816 set thread context of 2544 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1912 set thread context of 4512 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4036 set thread context of 1928 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1552 set thread context of 4904 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 228 set thread context of 1824 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4084 set thread context of 3156 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 3252 set thread context of 2836 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4936 set thread context of 2840 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4428 set thread context of 4348 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4564 set thread context of 4528 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2180 set thread context of 1508 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1372 set thread context of 1592 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3720 set thread context of 3568 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 1020 set thread context of 2168 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2892 set thread context of 4352 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4108 set thread context of 544 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification \??\c:\windows\system\explorer.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\spoolsv.exe N/A
File opened for modification C:\Windows\Parameters.ini \??\c:\windows\system\explorer.exe N/A

Enumerates physical storage devices

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\spoolsv.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A
N/A N/A \??\c:\windows\system\explorer.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2184 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 2184 wrote to memory of 2480 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Windows\splwow64.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 2184 wrote to memory of 2260 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe
PID 2260 wrote to memory of 4192 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2260 wrote to memory of 4192 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 2260 wrote to memory of 4192 N/A C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe \??\c:\windows\system\explorer.exe
PID 4192 wrote to memory of 5064 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4192 wrote to memory of 5064 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4192 wrote to memory of 5064 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4192 wrote to memory of 5064 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4192 wrote to memory of 5064 N/A \??\c:\windows\system\explorer.exe \??\c:\windows\system\explorer.exe
PID 4080 wrote to memory of 2208 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4080 wrote to memory of 2208 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4080 wrote to memory of 2208 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4080 wrote to memory of 2208 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4080 wrote to memory of 2208 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 2208 wrote to memory of 4084 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe
PID 2208 wrote to memory of 4084 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe
PID 2208 wrote to memory of 4084 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe
PID 1840 wrote to memory of 1196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1840 wrote to memory of 1196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1840 wrote to memory of 1196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1840 wrote to memory of 1196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1840 wrote to memory of 1196 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1268 wrote to memory of 2188 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1268 wrote to memory of 2188 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1268 wrote to memory of 2188 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1268 wrote to memory of 2188 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1268 wrote to memory of 2188 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4864 wrote to memory of 2100 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4864 wrote to memory of 2100 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4864 wrote to memory of 2100 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4864 wrote to memory of 2100 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4864 wrote to memory of 2100 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3520 wrote to memory of 4396 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3520 wrote to memory of 4396 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3520 wrote to memory of 4396 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3520 wrote to memory of 4396 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 3520 wrote to memory of 4396 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 5032 wrote to memory of 3472 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 5032 wrote to memory of 3472 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 5032 wrote to memory of 3472 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 5032 wrote to memory of 3472 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 5032 wrote to memory of 3472 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 452 wrote to memory of 1416 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 452 wrote to memory of 1416 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 452 wrote to memory of 1416 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 452 wrote to memory of 1416 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 452 wrote to memory of 1416 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4296 wrote to memory of 4612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4296 wrote to memory of 4612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4296 wrote to memory of 4612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4296 wrote to memory of 4612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4296 wrote to memory of 4612 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 4612 wrote to memory of 4428 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe
PID 4612 wrote to memory of 4428 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe
PID 4612 wrote to memory of 4428 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\explorer.exe
PID 1820 wrote to memory of 388 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1820 wrote to memory of 388 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe
PID 1820 wrote to memory of 388 N/A \??\c:\windows\system\spoolsv.exe \??\c:\windows\system\spoolsv.exe

Processes

C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe"

C:\Windows\splwow64.exe

C:\Windows\splwow64.exe 12288

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc

C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe

"C:\Users\Admin\AppData\Local\Temp\a8aff845ce99b65136f8cd2e41dd4006_JaffaCakes118.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

\??\c:\windows\system\spoolsv.exe

"c:\windows\system\spoolsv.exe"

\??\c:\windows\system\explorer.exe

c:\windows\system\explorer.exe

\??\c:\windows\system\explorer.exe

"c:\windows\system\explorer.exe"

\??\c:\windows\system\spoolsv.exe

c:\windows\system\spoolsv.exe SE

Network

Files

memory/2184-0-0x0000000000790000-0x0000000000791000-memory.dmp

C:\Windows\Parameters.ini

MD5 6687785d6a31cdf9a5f80acb3abc459b
SHA1 1ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA256 3b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA512 5fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962

memory/2184-46-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2184-48-0x0000000000790000-0x0000000000791000-memory.dmp

memory/2260-49-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2260-51-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2184-52-0x0000000000400000-0x00000000005D3000-memory.dmp

C:\Windows\System\explorer.exe

MD5 c45cf86ed57c53ed149027b9a38bd7c7
SHA1 1f437811822968d96f1ec029fecad535c930d6cc
SHA256 e88b771b434356b9b1050072ef9ef1ab9afc90a15759c715e666cc294cae43c5
SHA512 e63a71a1f983dc59ef4b9cc4d03c58a69c1501c98fc32dfd3adeb0a7b41fcf0ae477de8021fc0557def18891397524dc1a5f26a3cde882ce869158e77dd1c315

memory/2260-79-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2260-77-0x0000000000440000-0x0000000000509000-memory.dmp

memory/4192-85-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4192-89-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/5064-90-0x0000000000400000-0x000000000043E000-memory.dmp

C:\Windows\Parameters.ini

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4080-871-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/5064-870-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1840-1008-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1268-1009-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4864-1010-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3520-1186-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/452-1188-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/5032-1187-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4296-1384-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1820-1385-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/680-1539-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4708-1540-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4356-1538-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4948-1729-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/436-1730-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1860-1731-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2524-1850-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3804-1851-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3044-1852-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2208-1993-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3056-1991-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/4080-1988-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/3772-1992-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2664-1997-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1196-2000-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1840-2002-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1196-2004-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2188-2013-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4560-2012-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/1268-2014-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2420-2096-0x0000000000400000-0x00000000005D3000-memory.dmp

memory/2100-2103-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2100-2099-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4396-2112-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3472-2123-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1416-2153-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2208-2183-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4612-2269-0x0000000000400000-0x000000000043E000-memory.dmp

memory/388-2280-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2972-2291-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4064-2301-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4064-2304-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4652-2382-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4612-2442-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4796-2465-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1556-2473-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4128-2585-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4796-2604-0x0000000000400000-0x000000000043E000-memory.dmp

memory/552-2622-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4424-2703-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4424-2706-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4712-2714-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4712-2717-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1220-2726-0x0000000000400000-0x000000000043E000-memory.dmp

memory/552-2786-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1356-2803-0x0000000000400000-0x000000000043E000-memory.dmp

memory/976-2887-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2572-2899-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2572-2895-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1356-2942-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4832-3035-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4832-3112-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2544-3135-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4904-3287-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4904-3381-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1824-3599-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3156-3705-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2836-3839-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2840-3931-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4348-3941-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4528-4108-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1508-4204-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1592-4215-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3568-4343-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2168-4419-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2168-4517-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4352-4547-0x0000000000400000-0x000000000043E000-memory.dmp

memory/544-4554-0x0000000000400000-0x000000000043E000-memory.dmp

memory/544-4679-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1704-4774-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4192-4784-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2796-5058-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3180-5068-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1284-5076-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1284-5080-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3808-5089-0x0000000000400000-0x000000000043E000-memory.dmp

memory/2796-5204-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3264-5229-0x0000000000400000-0x000000000043E000-memory.dmp

memory/3264-5231-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4260-5315-0x0000000000400000-0x000000000043E000-memory.dmp

memory/728-5357-0x0000000000400000-0x000000000043E000-memory.dmp

memory/4944-5370-0x0000000000400000-0x000000000043E000-memory.dmp

memory/5024-5376-0x0000000000400000-0x000000000043E000-memory.dmp

memory/5024-5380-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1624-5387-0x0000000000400000-0x000000000043E000-memory.dmp

memory/5012-5402-0x0000000000400000-0x000000000043E000-memory.dmp

memory/728-5450-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1892-5597-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1988-5617-0x0000000000400000-0x000000000043E000-memory.dmp

memory/1508-5626-0x0000000000400000-0x000000000043E000-memory.dmp