Analysis
-
max time kernel
127s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17-06-2024 12:27
Behavioral task
behavioral1
Sample
b89d7260914649679198612f3d26d027_JaffaCakes118.exe
Resource
win7-20240220-en
General
-
Target
b89d7260914649679198612f3d26d027_JaffaCakes118.exe
-
Size
2.4MB
-
MD5
b89d7260914649679198612f3d26d027
-
SHA1
8ac1a7fca63b407690d1daa74b3bc52a15372d83
-
SHA256
78d5cc8faa953da913a73fa2da08e4c0dbc0a30e664548a30082a82c55bfdadb
-
SHA512
d6c38d0d736fccdf047981745ce96d16aa804e99e4c4d6e59134e76d92aa396be605fc3ddd9a4081ed04c4bd4b8632bf0a0c1323a901eeaf5d12b653eb5c2da5
-
SSDEEP
49152:f6fE2L44dtszaZP1XGywyeVDJKHDAkmongDjiCxJhFBf/IsIORqdb:fYLhso1XGyg7K0kmog6oPFB4sxqdb
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx acprotect \Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dll acprotect -
Loads dropped DLL 5 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exepid process 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral1/memory/2008-0-0x0000000000400000-0x0000000000709000-memory.dmp upx behavioral1/memory/2008-9-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-5-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-6-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-4-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-11-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-7-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-13-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-12-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-2-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-8-0x00000000028C0000-0x000000000394E000-memory.dmp upx \Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx upx behavioral1/memory/2008-33-0x0000000074160000-0x000000007466C000-memory.dmp upx \Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dll upx behavioral1/memory/2008-14-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-52-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-53-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-54-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-56-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-57-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-59-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-60-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-62-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-65-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-66-0x0000000000400000-0x0000000000709000-memory.dmp upx behavioral1/memory/2008-71-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-72-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-77-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-78-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-80-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-81-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-90-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-92-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-95-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-98-0x00000000028C0000-0x000000000394E000-memory.dmp upx behavioral1/memory/2008-99-0x00000000028C0000-0x000000000394E000-memory.dmp upx -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened (read-only) \??\H: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\K: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\L: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\N: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\O: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\P: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\I: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\J: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\M: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\R: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\X: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\Z: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\E: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\G: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\T: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\U: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\V: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\Y: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\Q: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\S: b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened (read-only) \??\W: b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened for modification C:\autorun.inf b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification F:\autorun.inf b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Drops file in Program Files directory 7 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File created C:\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocx b89d7260914649679198612f3d26d027_JaffaCakes118.exe File created C:\Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dll b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Microsoft Office\Office14\BCSSync.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\7zG.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process File opened for modification C:\Windows\SYSTEM.INI b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\iexplore.exe = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN\Settings\LOCALMACHINE_CD_UNLOCK = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_LOCALMACHINE_LOCKDOWN b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000\Software\Microsoft\Internet Explorer\Main b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Modifies registry class 64 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\ = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS\ = "2" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID\ = "Lodop.LodopX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\ b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\Clsid b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Control\ b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ = "C:\\PROGRA~2\\MOUNTT~1\\Lodop\\CAOSOF~1.OCX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ = "LodopX Control" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\ = "LodopX Control" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version\ = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\ = "Lodop" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Lodop.LodopX\Clsid\ = "{2105C259-1E0C-4534-8141-A753534CB4CA}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1\ = "205201" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\FLAGS b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32\ThreadingModel = "Apartment" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Control b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\InprocServer32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\MiscStatus\1 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\0 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\TypeLib\Version = "6.0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ProgID b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Version b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0\win32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ = "ILodopXEvents" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\ToolboxBitmap32\ = "C:\\Program Files (x86)\\MountTaiSoftware\\Lodop\\CAOSOFT_WEB_PRINT_lodop.ocx,0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\0 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED}\6.0\HELPDIR b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{409D8542-9C63-4719-8DF6-ABDA44494A4E}\ = "ILodopX" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\TypeLib\ = "{0F9014E9-F31C-408E-9CBA-C484B39066ED}" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2105C259-1E0C-4534-8141-A753534CB4CA}\Verb\0\ = "Properties,0,2" b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{0F9014E9-F31C-408E-9CBA-C484B39066ED} b89d7260914649679198612f3d26d027_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{0DC96C68-587A-486E-93D8-7BA1EAF5B9CB}\ProxyStubClsid32 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exepid process 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription pid process Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Token: SeDebugPrivilege 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 40 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription pid process target process PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 668 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe DllHost.exe PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE PID 2008 wrote to memory of 1100 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe taskhost.exe PID 2008 wrote to memory of 1164 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Dwm.exe PID 2008 wrote to memory of 1196 2008 b89d7260914649679198612f3d26d027_JaffaCakes118.exe Explorer.EXE -
System policy modification 1 TTPs 1 IoCs
Processes:
b89d7260914649679198612f3d26d027_JaffaCakes118.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" b89d7260914649679198612f3d26d027_JaffaCakes118.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\b89d7260914649679198612f3d26d027_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b89d7260914649679198612f3d26d027_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
1Windows Service
1Abuse Elevation Control Mechanism
1Bypass User Account Control
1Defense Evasion
Modify Registry
6Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
3Disable or Modify Tools
3Replay Monitor
Loading Replay Monitor...
Downloads
-
F:\bgoulr.exeFilesize
100KB
MD54c729db8ada6e678ff42d5cd0b1df5c6
SHA1f18918d26065b7e0ecbd45e52162230e20d816d4
SHA256f97a646e1fdeefde161fc3e3e680bd9a0b77cf6bc6281a28f58cae8b4b65bf5c
SHA512991e3be12e51d8e4ac6236a1f4e99e47aaf9d5b9e683ec17b119e4ab46e27f8eacfed42329483c253c7a4a041c94283142017f8d59129a3d2df2b46ff26d60ee
-
\Program Files (x86)\MountTaiSoftware\Lodop\CAOSOFT_WEB_PRINT_lodop.ocxFilesize
1.5MB
MD5be84f2a691c4767ddacc5f37fe0e5a68
SHA11ae6e280cdb0ed7fe028d18ba175ac1e5062dd80
SHA256600cf26e64b9763963cdf36daf30e84d52d5a191e6d070bcfa1e378768b73cbb
SHA51229954bbf34693dc14228d1a95b55b8fd07e16ee397f53296ca424a8e84ea1bed61a569030acc6bf577faecd5325574c6366a5ddb558c223a8c6ea6f2dceb0d46
-
\Program Files (x86)\MountTaiSoftware\Lodop\NPCAOSOFT_WEB_PRINT_lodop.dllFilesize
335KB
MD50b11270c32657df207a40d0ef02e07d4
SHA1894b3a5a4edeecb6e9a7fb172570ff6c6cb63ec7
SHA25660a5fda3a85bc29cd94b7e1df6aa613353b31187bf5a9b30363d8dc6f1dfa202
SHA5123863c7fbc250e9754c5a053dcb0a4e37ac11dca65ba8ee25ef67b227d9df1f00eee538f524925dad286abb12a34a6d39bc1eebcff3380f56381d633693f66573
-
memory/1100-15-0x0000000002010000-0x0000000002012000-memory.dmpFilesize
8KB
-
memory/2008-0-0x0000000000400000-0x0000000000709000-memory.dmpFilesize
3.0MB
-
memory/2008-1-0x0000000000EF0000-0x00000000011F9000-memory.dmpFilesize
3.0MB
-
memory/2008-9-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-5-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-6-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-4-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-11-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-7-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-13-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-12-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-27-0x0000000000D90000-0x0000000000D92000-memory.dmpFilesize
8KB
-
memory/2008-26-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/2008-24-0x0000000000E20000-0x0000000000E21000-memory.dmpFilesize
4KB
-
memory/2008-23-0x0000000000D90000-0x0000000000D92000-memory.dmpFilesize
8KB
-
memory/2008-2-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-8-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-33-0x0000000074160000-0x000000007466C000-memory.dmpFilesize
5.0MB
-
memory/2008-14-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-51-0x0000000074160000-0x000000007466C000-memory.dmpFilesize
5.0MB
-
memory/2008-50-0x00000000734E0000-0x00000000739EC000-memory.dmpFilesize
5.0MB
-
memory/2008-49-0x0000000005750000-0x0000000005857000-memory.dmpFilesize
1.0MB
-
memory/2008-48-0x0000000005750000-0x0000000005857000-memory.dmpFilesize
1.0MB
-
memory/2008-52-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-53-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-54-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-56-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-57-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-59-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-60-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-62-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-65-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-66-0x0000000000400000-0x0000000000709000-memory.dmpFilesize
3.0MB
-
memory/2008-71-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-72-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-75-0x0000000000EF0000-0x00000000011F9000-memory.dmpFilesize
3.0MB
-
memory/2008-77-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-78-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-80-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-82-0x0000000000EF0000-0x00000000011F9000-memory.dmpFilesize
3.0MB
-
memory/2008-81-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-90-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-92-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-95-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-97-0x0000000000D90000-0x0000000000D92000-memory.dmpFilesize
8KB
-
memory/2008-98-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-99-0x00000000028C0000-0x000000000394E000-memory.dmpFilesize
16.6MB
-
memory/2008-113-0x00000000734E0000-0x00000000739EC000-memory.dmpFilesize
5.0MB
-
memory/2008-112-0x0000000005750000-0x0000000005857000-memory.dmpFilesize
1.0MB