Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 08:31
Behavioral task
behavioral1
Sample
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe
-
Size
2.2MB
-
MD5
a8bec1584dfcd03a4f39cffb7a4903ab
-
SHA1
edaf93d2d965ce0a2a64f2aff918988a11719fc7
-
SHA256
8de7dd68acd5c884d169cbe9796fa95edc8675ec77e84efe8571c72acfd6ff78
-
SHA512
1d1bb696c2047fbff75eef031be2bd174276a24b10b8049bf960a437490c1f8894134dffbe37025f7d1c6fe49ea2450f50e2f45c2129573dace3934e29058c0c
-
SSDEEP
24576:0UzNkyrbtjbGixCOPKH2I1iIWILtfOIJ+HKodCHPC0cF3u7P1+eWQ8f/x52vHNZx:0UzeyQMS4DqodCnoe+iitjWwwV
Malware Config
Extracted
pony
http://don.service-master.eu/gate.php
-
payload_url
http://don.service-master.eu/shit.exe
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\Windows\\explorer.exe, c:\\windows\\system\\explorer.exe" explorer.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-2812790648-3157963462-487717889-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" explorer.exe -
Modifies Installed Components in the registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{Y479C6D0-OTRW-U5GH-S1EE-E0AC10B4E666}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\mrsys.exe MR" explorer.exe -
Drops startup file 2 IoCs
Processes:
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
Processes:
explorer.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exepid process 2580 explorer.exe 2888 explorer.exe 2744 spoolsv.exe 1180 spoolsv.exe 2180 spoolsv.exe 824 spoolsv.exe 1096 spoolsv.exe 1716 spoolsv.exe 2808 spoolsv.exe 1184 spoolsv.exe 3036 spoolsv.exe 1416 spoolsv.exe 1464 spoolsv.exe 2412 spoolsv.exe 1052 spoolsv.exe 1704 spoolsv.exe 2576 spoolsv.exe 1476 spoolsv.exe 2868 spoolsv.exe 2320 spoolsv.exe 804 spoolsv.exe 1880 spoolsv.exe 2224 spoolsv.exe 2676 spoolsv.exe 2908 spoolsv.exe 2688 spoolsv.exe 1936 spoolsv.exe 476 spoolsv.exe 2552 spoolsv.exe 1912 spoolsv.exe 2820 spoolsv.exe 2620 spoolsv.exe 1876 spoolsv.exe 2272 spoolsv.exe 596 spoolsv.exe 1872 spoolsv.exe 2752 spoolsv.exe 2612 spoolsv.exe 1968 spoolsv.exe 1012 spoolsv.exe 2900 spoolsv.exe 2516 spoolsv.exe 2624 spoolsv.exe 1200 spoolsv.exe 448 spoolsv.exe 1208 spoolsv.exe 2648 spoolsv.exe 1868 spoolsv.exe 1696 spoolsv.exe 2168 spoolsv.exe 2616 spoolsv.exe 2544 spoolsv.exe 1088 spoolsv.exe 2952 spoolsv.exe 3028 spoolsv.exe 304 spoolsv.exe 1884 spoolsv.exe 3064 spoolsv.exe 1116 spoolsv.exe 2340 spoolsv.exe 1660 spoolsv.exe 2296 spoolsv.exe 2268 spoolsv.exe 2712 spoolsv.exe -
Loads dropped DLL 64 IoCs
Processes:
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exeexplorer.exepid process 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Explorer = "c:\\windows\\system\\explorer.exe RO" explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Svchost = "c:\\windows\\system\\svchost.exe RO" explorer.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exeexplorer.exedescription pid process target process PID 2652 set thread context of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 2580 set thread context of 2888 2580 explorer.exe explorer.exe -
Drops file in Windows directory 64 IoCs
Processes:
spoolsv.exeexplorer.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exespoolsv.exedescription ioc process File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\spoolsv.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification \??\c:\windows\system\explorer.exe explorer.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe File opened for modification C:\Windows\Parameters.ini spoolsv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exeexplorer.exepid process 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
explorer.exepid process 2888 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exeexplorer.exepid process 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe 2888 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exea8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exeexplorer.exeexplorer.exedescription pid process target process PID 2652 wrote to memory of 2944 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe splwow64.exe PID 2652 wrote to memory of 2944 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe splwow64.exe PID 2652 wrote to memory of 2944 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe splwow64.exe PID 2652 wrote to memory of 2944 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe splwow64.exe PID 2652 wrote to memory of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 2652 wrote to memory of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 2652 wrote to memory of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 2652 wrote to memory of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 2652 wrote to memory of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 2652 wrote to memory of 1828 2652 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe PID 1828 wrote to memory of 2580 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe explorer.exe PID 1828 wrote to memory of 2580 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe explorer.exe PID 1828 wrote to memory of 2580 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe explorer.exe PID 1828 wrote to memory of 2580 1828 a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe explorer.exe PID 2580 wrote to memory of 2888 2580 explorer.exe explorer.exe PID 2580 wrote to memory of 2888 2580 explorer.exe explorer.exe PID 2580 wrote to memory of 2888 2580 explorer.exe explorer.exe PID 2580 wrote to memory of 2888 2580 explorer.exe explorer.exe PID 2580 wrote to memory of 2888 2580 explorer.exe explorer.exe PID 2580 wrote to memory of 2888 2580 explorer.exe explorer.exe PID 2888 wrote to memory of 2744 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2744 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2744 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2744 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2180 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 824 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 824 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 824 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 824 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1096 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1096 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1096 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1096 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1716 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1716 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1716 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1716 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2808 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2808 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2808 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 2808 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1184 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1184 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1184 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1184 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 3036 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 3036 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 3036 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 3036 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1416 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1416 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1416 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1416 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1464 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1464 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1464 2888 explorer.exe spoolsv.exe PID 2888 wrote to memory of 1464 2888 explorer.exe spoolsv.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe"1⤵
- Drops startup file
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Users\Admin\AppData\Local\Temp\a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8bec1584dfcd03a4f39cffb7a4903ab_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\explorer.exe"c:\windows\system\explorer.exe"4⤵
- Modifies WinLogon for persistence
- Modifies visiblity of hidden/system files in Explorer
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\explorer.exec:\windows\system\explorer.exe7⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exe"c:\windows\system\spoolsv.exe"6⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Executes dropped EXE
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
- Drops file in Windows directory
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
-
\??\c:\windows\system\spoolsv.exec:\windows\system\spoolsv.exe SE5⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
3Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Parameters.iniFilesize
74B
MD56687785d6a31cdf9a5f80acb3abc459b
SHA11ddda26cc18189770eaaa4a9e78cc4abe4fe39c9
SHA2563b5ebe1c6d4d33c14e5f2ca735fc085759f47895ea90192999a22a035c7edc9b
SHA5125fe9429d64ee6fe0d3698cabb39757729b48d525500afa5f073d69f14f791c8aa2bc7ce0467d48d66fc58d894983391022c59035fa67703fefd309ec4a5d9962
-
C:\Windows\Parameters.iniMD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
\Windows\system\explorer.exeFilesize
2.2MB
MD51c47704684d4b9dae27f5435e873cc19
SHA112a680ddf40ac1b7c62f47c538f5af9379d56307
SHA256d533e87ca9aa33398db9a6fdcb1e5017b42873485692fafb5405fa4bf4fdf003
SHA5122e28b9629e7f80e73459f3b1db7721274075e8719649928aa4f94c42968e1232992f5fba9db57b4bbb0e7d9a4a0cb6da7e67e40badd1c4626e6b463d302496fc
-
\Windows\system\spoolsv.exeFilesize
2.2MB
MD552a0b6f4848e3f8b374fb4603e3bd251
SHA1d8dca3ce10c034af872387a81b92ab4fd679b2b5
SHA256278570649737f24afdbd5e4e66befbe4b8e1986adde610e93dd3cd33cae99c26
SHA51234271897b9805d6e615a967e94d5500332ae14898a8c066e42c015125fa83c3701f9e8965f6046c766d210dbf8452e8c98bee3d54b1b8c9100212c721878b529
-
memory/476-3184-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/804-3177-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/824-2309-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1052-2789-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1096-2776-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1180-2305-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1184-2784-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1416-2786-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1464-2787-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1476-3174-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1704-2790-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1716-2782-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1828-20-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1828-50-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1828-27-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1828-28-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/1828-22-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/1880-3178-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1912-3186-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/1936-3183-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2180-2306-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2224-3179-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2320-3176-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2412-2788-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2552-3185-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2576-2791-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2580-70-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2580-61-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2580-42-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2620-3188-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2652-19-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2652-17-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2652-29-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2652-0-0x0000000000230000-0x0000000000231000-memory.dmpFilesize
4KB
-
memory/2676-3180-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2688-3182-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2744-2304-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2808-2783-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2820-3187-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2868-3175-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/2888-2303-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/2908-3181-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/3036-2785-0x0000000000400000-0x00000000005D3000-memory.dmpFilesize
1.8MB
-
memory/5004-5231-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5004-5235-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5028-5132-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5028-5266-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5112-5146-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB
-
memory/5872-5324-0x0000000000400000-0x000000000043E000-memory.dmpFilesize
248KB