Analysis
-
max time kernel
122s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 23:48
Static task
static1
Behavioral task
behavioral1
Sample
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe
Resource
win7-20240508-en
General
-
Target
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe
-
Size
1.0MB
-
MD5
ba2bbf9c7809297a2ee1baba58c55e81
-
SHA1
b62317610a8d1f33cb566f40efbf0fd35954d5c8
-
SHA256
55819061820b24c4e0f6845d20e02d872993bc88821be47fd5d1543297266a07
-
SHA512
87dcf3494c094bcb2d527dd0d4fd170dd580f9ba36fbb7196deaab7629faf2c646aa69ad8278758d9d291528d468e2287f4f1ba1a86ec1d43f83bc17eb8fe54e
-
SSDEEP
12288:MUDNipGWJMHT/90G1m3AALuRuoBOE9g7MHEI:n/9Z1YLucmOmgAN
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" svchost.exe -
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 2652 svchost.exe 2672 svchost.exe -
Processes:
resource yara_rule behavioral1/memory/1740-6-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-3-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-7-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-8-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-10-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-9-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/2652-30-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-35-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-39-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-50-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-38-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-40-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-37-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-36-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-33-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-34-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/2652-32-0x0000000001ED0000-0x0000000002F5E000-memory.dmp upx behavioral1/memory/1740-5-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-4-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-64-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-65-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-12-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-67-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-69-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-68-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-71-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-72-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-73-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-75-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-77-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx behavioral1/memory/1740-90-0x0000000001DE0000-0x0000000002E6E000-memory.dmp upx -
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UacDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\AntiVirusOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\FirewallOverride = "1" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc\UpdatesDisableNotify = "1" svchost.exe -
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exedescription ioc process File opened (read-only) \??\E: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\G: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\J: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\N: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\T: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\V: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\Z: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\H: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\O: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\P: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\U: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\I: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\K: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\R: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\S: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\X: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\L: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\M: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\Q: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\W: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened (read-only) \??\Y: ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exedescription ioc process File opened for modification C:\autorun.inf ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened for modification F:\autorun.inf ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Drops file in Program Files directory 5 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exedescription ioc process File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Drops file in Windows directory 3 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File created C:\Windows\svchost.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe File opened for modification C:\Windows\svchost.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_22 = "1059695906" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_24 = "3889186066" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_30 = "3787749306" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_15 = "4164244369" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_18 = "3974049279" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_26 = "3005291579" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_35 = "2271548562" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_52 = "552484441" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_16 = "1161134918" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_29 = "2372996024" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_39 = "3635578722" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_39 = "3652317580" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_49 = "1473328314" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_20 = "2541850709" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_45 = "3550861758" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_5 = "2778771304" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_8 = "3010704065" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_21 = "3939914703" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_51 = "3432701184" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_27 = "3838471105" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_32 = "2338865225" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_60 = "1738307629" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_3 = "4260979152" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_4 = "1410191389" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_17 = "2559280298" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_21 = "1513940894" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_39 = "3635583909" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_41 = "2153391202" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_50 = "2034505759" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_51 = "3449397664" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_61 = "400312519" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_65 = "1764339219" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_17 = "2115347458" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_35 = "2271557209" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_53 = "1967226415" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_43 = "137961784" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_45 = "3534136432" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_55 = "1918201984" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_58 = "467752679" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_10 = "1262576541" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_58 = "3629359254" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\1460008425\-1465470298 = "0" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_12 = "2966119081" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_22 = "1059697325" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_24 = "3872601569" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_36 = "3669747077" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_48 = "3566131142" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_53 = "1950487558" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_12 = "4092080100" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_34 = "856808710" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\1460008425\1364026700 = "35" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_3 = "4244254259" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_28 = "941535037" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_64 = "3575565756" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_15 = "4058075636" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_49 = "603199715" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_51 = "2934229835" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S3_44 = "2135961709" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_50 = "2017948214" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_62 = "1815052719" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S1_20 = "2694291522" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S4_51 = "3432696713" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_4 = "1364030153" svchost.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Aoqcbk\S2_7 = "1313303640" svchost.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exepid process 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 2652 svchost.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 32 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription pid process Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 2652 svchost.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Token: SeDebugPrivilege 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 46 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription pid process target process PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 2232 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe DllHost.exe PID 2652 wrote to memory of 1108 2652 svchost.exe taskhost.exe PID 2652 wrote to memory of 1176 2652 svchost.exe Dwm.exe PID 2652 wrote to memory of 1236 2652 svchost.exe Explorer.EXE PID 2652 wrote to memory of 2232 2652 svchost.exe DllHost.exe PID 2652 wrote to memory of 1740 2652 svchost.exe ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe PID 2652 wrote to memory of 2672 2652 svchost.exe svchost.exe PID 2652 wrote to memory of 2672 2652 svchost.exe svchost.exe PID 2652 wrote to memory of 2672 2652 svchost.exe svchost.exe PID 2652 wrote to memory of 2672 2652 svchost.exe svchost.exe PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE PID 1740 wrote to memory of 1108 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe taskhost.exe PID 1740 wrote to memory of 1176 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Dwm.exe PID 1740 wrote to memory of 1236 1740 ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Explorer.EXE -
System policy modification 1 TTPs 2 IoCs
Processes:
ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exesvchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba2bbf9c7809297a2ee1baba58c55e81_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\svchost.exeC:\Windows\svchost.exe Win72⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
5Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SYSTEM.INIFilesize
257B
MD5c872bd1c702cc93480c03ea324b1b3e1
SHA18d2bd9b7e07c188107824baba6e9792567789cdb
SHA2565c54b89a1087d7857cb3fabccef495c08d03474c7f6b54ae43ef01ca49b16e0c
SHA512dcfad0b26693f3cb3c0fd0d8298dd262bb6051e9d11513c2b2fcb85f393d270f3e2b0f65420690663075c2f3b4fbf4f1b92dea6d68a4330983f4574d6ca790c8
-
C:\Windows\svchost.exeFilesize
1.0MB
MD5ba2bbf9c7809297a2ee1baba58c55e81
SHA1b62317610a8d1f33cb566f40efbf0fd35954d5c8
SHA25655819061820b24c4e0f6845d20e02d872993bc88821be47fd5d1543297266a07
SHA51287dcf3494c094bcb2d527dd0d4fd170dd580f9ba36fbb7196deaab7629faf2c646aa69ad8278758d9d291528d468e2287f4f1ba1a86ec1d43f83bc17eb8fe54e
-
F:\qrnnnm.exeFilesize
100KB
MD534b150400d5a08c9a82c786659d31b96
SHA16bbdfa7703acf20e3048b9236b2b35640c2ea69a
SHA256dc3c00cb7f1406b7f572b050dc121ed55424a9911c9c081a0b7b1fa100e3bab1
SHA51287a3ec717f36610abc82106a5cdf7bcfe69d2f3416b1ada9c294212899a64794ea379fdbe3dca850395459bc3f0ba3e17b52b0c5a71d1f844cfb2fdc2c0f1fd9
-
memory/1108-13-0x0000000001FB0000-0x0000000001FB2000-memory.dmpFilesize
8KB
-
memory/1740-49-0x0000000000590000-0x0000000000592000-memory.dmpFilesize
8KB
-
memory/1740-72-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-8-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-10-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-9-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-25-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/1740-95-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/1740-90-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-0-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/1740-77-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-75-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-73-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-27-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/1740-7-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-71-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-68-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-69-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-3-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-26-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/1740-5-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-67-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-4-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-6-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-12-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-22-0x00000000001F0000-0x00000000001F2000-memory.dmpFilesize
8KB
-
memory/1740-64-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-65-0x0000000001DE0000-0x0000000002E6E000-memory.dmpFilesize
16.6MB
-
memory/1740-23-0x0000000000200000-0x0000000000201000-memory.dmpFilesize
4KB
-
memory/2652-50-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-34-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-30-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-35-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-56-0x0000000003D70000-0x0000000003E41000-memory.dmpFilesize
836KB
-
memory/2652-29-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2652-32-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-61-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2652-33-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-36-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-37-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-40-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-38-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2652-39-0x0000000001ED0000-0x0000000002F5E000-memory.dmpFilesize
16.6MB
-
memory/2672-66-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB
-
memory/2672-63-0x0000000000400000-0x00000000004D1000-memory.dmpFilesize
836KB