Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe
-
Size
212KB
-
MD5
187a052ff11cb16228342428d241f1a8
-
SHA1
fae50f317e402eb991e700f7133714c5409edabd
-
SHA256
652cc475d34cde0f13c4b5640f43ee7908b17dd117a6361c07d2f04787b4c826
-
SHA512
3e52a272c7d1a00ff4e8b13329a379f3232932db9aece327db4fdbdff988fed72576036aee1ca71028d6b96532ed6e6258ea14624a3475240913bddb63ec2288
-
SSDEEP
6144:EEd+RUDTBLse1t/yh/QdSM5KslH3v/9Od+HFHiI+pu3:EE53BLsOQQdiE3v/9OdiUm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 63 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Control Panel\International\Geo\Nation zGwggQIs.exe -
Deletes itself 1 IoCs
pid Process 1532 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1732 zGwggQIs.exe 2388 jeskAUAI.exe -
Loads dropped DLL 20 IoCs
pid Process 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\zGwggQIs.exe = "C:\\Users\\Admin\\rigIsYkI\\zGwggQIs.exe" 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jeskAUAI.exe = "C:\\ProgramData\\raAcwAUo\\jeskAUAI.exe" 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Windows\CurrentVersion\Run\zGwggQIs.exe = "C:\\Users\\Admin\\rigIsYkI\\zGwggQIs.exe" zGwggQIs.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\jeskAUAI.exe = "C:\\ProgramData\\raAcwAUo\\jeskAUAI.exe" jeskAUAI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2032 reg.exe 1004 reg.exe 2488 reg.exe 2856 reg.exe 2248 reg.exe 1656 reg.exe 980 reg.exe 1184 reg.exe 1936 reg.exe 2348 reg.exe 752 reg.exe 1532 reg.exe 2920 reg.exe 3020 reg.exe 2572 reg.exe 828 reg.exe 1820 reg.exe 3060 reg.exe 1600 reg.exe 2380 reg.exe 1912 reg.exe 2716 reg.exe 2700 reg.exe 1476 reg.exe 2368 reg.exe 1612 reg.exe 2752 reg.exe 2524 reg.exe 2456 reg.exe 2320 reg.exe 1472 reg.exe 2464 reg.exe 1744 reg.exe 2588 reg.exe 2292 reg.exe 2800 reg.exe 288 reg.exe 1644 reg.exe 1692 reg.exe 1472 reg.exe 2420 reg.exe 2316 reg.exe 2196 reg.exe 540 reg.exe 2660 reg.exe 2688 reg.exe 2248 reg.exe 1432 reg.exe 2464 reg.exe 564 reg.exe 2708 reg.exe 540 reg.exe 2416 reg.exe 2520 reg.exe 1168 reg.exe 2796 reg.exe 2068 reg.exe 2524 reg.exe 2712 reg.exe 1084 reg.exe 2172 reg.exe 1816 reg.exe 2512 reg.exe 1440 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2924 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2924 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1088 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1088 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1192 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1192 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 952 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 952 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1696 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1696 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2540 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2540 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2636 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2636 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2332 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2332 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1196 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1196 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1708 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1708 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2344 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2344 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3004 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3004 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2496 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2496 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1632 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1632 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2128 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2128 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1188 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1188 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2300 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2300 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1744 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1744 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2040 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2040 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2104 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2104 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1660 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1660 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2320 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2320 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2828 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2828 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1476 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1476 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3044 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3044 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2716 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2716 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1916 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1916 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 856 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 856 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1732 zGwggQIs.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe 1732 zGwggQIs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1980 wrote to memory of 1732 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 28 PID 1980 wrote to memory of 1732 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 28 PID 1980 wrote to memory of 1732 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 28 PID 1980 wrote to memory of 1732 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 28 PID 1980 wrote to memory of 2388 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 29 PID 1980 wrote to memory of 2388 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 29 PID 1980 wrote to memory of 2388 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 29 PID 1980 wrote to memory of 2388 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 29 PID 1980 wrote to memory of 3068 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 30 PID 1980 wrote to memory of 3068 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 30 PID 1980 wrote to memory of 3068 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 30 PID 1980 wrote to memory of 3068 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 30 PID 3068 wrote to memory of 2844 3068 cmd.exe 33 PID 3068 wrote to memory of 2844 3068 cmd.exe 33 PID 3068 wrote to memory of 2844 3068 cmd.exe 33 PID 3068 wrote to memory of 2844 3068 cmd.exe 33 PID 1980 wrote to memory of 2624 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 32 PID 1980 wrote to memory of 2624 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 32 PID 1980 wrote to memory of 2624 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 32 PID 1980 wrote to memory of 2624 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 32 PID 1980 wrote to memory of 2660 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 34 PID 1980 wrote to memory of 2660 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 34 PID 1980 wrote to memory of 2660 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 34 PID 1980 wrote to memory of 2660 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 34 PID 1980 wrote to memory of 2712 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 35 PID 1980 wrote to memory of 2712 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 35 PID 1980 wrote to memory of 2712 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 35 PID 1980 wrote to memory of 2712 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 35 PID 1980 wrote to memory of 2584 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 36 PID 1980 wrote to memory of 2584 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 36 PID 1980 wrote to memory of 2584 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 36 PID 1980 wrote to memory of 2584 1980 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 36 PID 2584 wrote to memory of 2476 2584 cmd.exe 41 PID 2584 wrote to memory of 2476 2584 cmd.exe 41 PID 2584 wrote to memory of 2476 2584 cmd.exe 41 PID 2584 wrote to memory of 2476 2584 cmd.exe 41 PID 2844 wrote to memory of 2912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 42 PID 2844 wrote to memory of 2912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 42 PID 2844 wrote to memory of 2912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 42 PID 2844 wrote to memory of 2912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 42 PID 2912 wrote to memory of 2924 2912 cmd.exe 44 PID 2912 wrote to memory of 2924 2912 cmd.exe 44 PID 2912 wrote to memory of 2924 2912 cmd.exe 44 PID 2912 wrote to memory of 2924 2912 cmd.exe 44 PID 2844 wrote to memory of 2404 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 122 PID 2844 wrote to memory of 2404 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 122 PID 2844 wrote to memory of 2404 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 122 PID 2844 wrote to memory of 2404 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 122 PID 2844 wrote to memory of 1912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 124 PID 2844 wrote to memory of 1912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 124 PID 2844 wrote to memory of 1912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 124 PID 2844 wrote to memory of 1912 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 124 PID 2844 wrote to memory of 288 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 47 PID 2844 wrote to memory of 288 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 47 PID 2844 wrote to memory of 288 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 47 PID 2844 wrote to memory of 288 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 47 PID 2844 wrote to memory of 692 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 48 PID 2844 wrote to memory of 692 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 48 PID 2844 wrote to memory of 692 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 48 PID 2844 wrote to memory of 692 2844 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 48 PID 692 wrote to memory of 1440 692 cmd.exe 129 PID 692 wrote to memory of 1440 692 cmd.exe 129 PID 692 wrote to memory of 1440 692 cmd.exe 129 PID 692 wrote to memory of 1440 692 cmd.exe 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\rigIsYkI\zGwggQIs.exe"C:\Users\Admin\rigIsYkI\zGwggQIs.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:1732
-
-
C:\ProgramData\raAcwAUo\jeskAUAI.exe"C:\ProgramData\raAcwAUo\jeskAUAI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2388
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"6⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:1088 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"8⤵PID:1188
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:1192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"10⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:952 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"12⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:1696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"14⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:2540 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"16⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"18⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:2332 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"20⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"22⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"24⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"26⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"28⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"30⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"32⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11833⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"34⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11835⤵
- Suspicious behavior: EnumeratesProcesses
PID:1188 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"36⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11837⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"38⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11839⤵
- Suspicious behavior: EnumeratesProcesses
PID:1744 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"40⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11841⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"42⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11843⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"44⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11845⤵
- Suspicious behavior: EnumeratesProcesses
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"46⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11847⤵
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"48⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2320 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"50⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11851⤵
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"52⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11853⤵
- Suspicious behavior: EnumeratesProcesses
PID:1476 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"54⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11855⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"56⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11857⤵
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"58⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11859⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"60⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11861⤵
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"62⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11863⤵
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"64⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11865⤵PID:2044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"66⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11867⤵PID:2060
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"68⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11869⤵PID:2924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"70⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11871⤵PID:1940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"72⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11873⤵PID:2968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"74⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11875⤵PID:2180
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"76⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11877⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"78⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11879⤵PID:288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"80⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11881⤵PID:1736
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"82⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11883⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"84⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11885⤵PID:2260
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"86⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11887⤵PID:2428
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"88⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11889⤵PID:2548
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"90⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11891⤵PID:2364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"92⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11893⤵PID:764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"94⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11895⤵PID:2708
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"96⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11897⤵PID:2380
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"98⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11899⤵PID:1972
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"100⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118101⤵PID:1224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"102⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118103⤵PID:528
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"104⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118105⤵PID:1980
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"106⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118107⤵PID:3044
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"108⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118109⤵PID:2800
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"110⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118111⤵PID:2740
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"112⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118113⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"114⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118115⤵PID:1944
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"116⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118117⤵PID:2468
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"118⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118119⤵PID:2192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"120⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118121⤵PID:2860
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"122⤵PID:840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-