Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
153s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2024, 04:32
Static task
static1
Behavioral task
behavioral1
Sample
187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe
-
Size
212KB
-
MD5
187a052ff11cb16228342428d241f1a8
-
SHA1
fae50f317e402eb991e700f7133714c5409edabd
-
SHA256
652cc475d34cde0f13c4b5640f43ee7908b17dd117a6361c07d2f04787b4c826
-
SHA512
3e52a272c7d1a00ff4e8b13329a379f3232932db9aece327db4fdbdff988fed72576036aee1ca71028d6b96532ed6e6258ea14624a3475240913bddb63ec2288
-
SSDEEP
6144:EEd+RUDTBLse1t/yh/QdSM5KslH3v/9Od+HFHiI+pu3:EE53BLsOQQdiE3v/9OdiUm
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (81) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Blocklisted process makes network request 5 IoCs
flow pid Process 36 2904 sihclient.exe 40 2904 sihclient.exe 42 2904 sihclient.exe 43 2904 sihclient.exe 48 2904 sihclient.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\Control Panel\International\Geo\Nation TYwAYMcE.exe -
Executes dropped EXE 2 IoCs
pid Process 1612 KEUwIEIw.exe 4952 TYwAYMcE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TYwAYMcE.exe = "C:\\ProgramData\\nIYcMQYE\\TYwAYMcE.exe" TYwAYMcE.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\uKYAkocE.exe = "C:\\Users\\Admin\\piYUkUkc\\uKYAkocE.exe" 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\eSAwUUgA.exe = "C:\\ProgramData\\JycEkggw\\eSAwUUgA.exe" 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KEUwIEIw.exe = "C:\\Users\\Admin\\NccgwUYs\\KEUwIEIw.exe" 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TYwAYMcE.exe = "C:\\ProgramData\\nIYcMQYE\\TYwAYMcE.exe" 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-609813121-2907144057-1731107329-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KEUwIEIw.exe = "C:\\Users\\Admin\\NccgwUYs\\KEUwIEIw.exe" KEUwIEIw.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1132 2700 WerFault.exe 588 4588 3592 WerFault.exe 587 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1132 reg.exe 2944 reg.exe 3356 reg.exe 3304 reg.exe 4756 reg.exe 4776 reg.exe 3344 reg.exe 4716 reg.exe 2400 reg.exe 2100 reg.exe 740 reg.exe 3868 reg.exe 1552 reg.exe 4940 reg.exe 5088 reg.exe 3240 reg.exe 3808 reg.exe 4232 reg.exe 4588 reg.exe 2824 reg.exe 3944 reg.exe 3140 reg.exe 5088 reg.exe 5092 reg.exe 1412 reg.exe 2864 reg.exe 3912 reg.exe 4620 reg.exe 3052 reg.exe 2268 reg.exe 1356 reg.exe 3612 reg.exe 3408 reg.exe 1740 reg.exe 3376 reg.exe 5044 reg.exe 4780 reg.exe 1480 reg.exe 4100 reg.exe 1572 reg.exe 1228 reg.exe 2652 reg.exe 4108 reg.exe 3032 reg.exe 3784 reg.exe 2284 reg.exe 4212 reg.exe 5056 reg.exe 4944 reg.exe 4476 reg.exe 1012 reg.exe 3552 reg.exe 4976 reg.exe 808 reg.exe 2412 reg.exe 4196 reg.exe 3256 reg.exe 2612 reg.exe 384 reg.exe 3476 reg.exe 3356 reg.exe 4836 reg.exe 2128 reg.exe 908 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1148 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1148 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1148 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1148 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 740 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 740 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 740 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 740 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1420 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1420 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1420 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1420 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3960 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3960 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3960 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3960 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1076 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1076 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1076 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1076 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3696 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3696 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3696 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3696 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 5064 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 5064 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 5064 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 5064 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3248 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1436 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1436 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1436 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 1436 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3192 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3192 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3192 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3192 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 332 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 332 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 332 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 332 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 3124 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4952 TYwAYMcE.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe 4952 TYwAYMcE.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4272 wrote to memory of 1612 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 87 PID 4272 wrote to memory of 1612 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 87 PID 4272 wrote to memory of 1612 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 87 PID 4272 wrote to memory of 4952 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 88 PID 4272 wrote to memory of 4952 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 88 PID 4272 wrote to memory of 4952 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 88 PID 4272 wrote to memory of 4280 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 89 PID 4272 wrote to memory of 4280 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 89 PID 4272 wrote to memory of 4280 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 89 PID 4272 wrote to memory of 2540 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 91 PID 4272 wrote to memory of 2540 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 91 PID 4272 wrote to memory of 2540 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 91 PID 4272 wrote to memory of 4600 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 92 PID 4272 wrote to memory of 4600 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 92 PID 4272 wrote to memory of 4600 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 92 PID 4272 wrote to memory of 3784 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 93 PID 4272 wrote to memory of 3784 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 93 PID 4272 wrote to memory of 3784 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 93 PID 4272 wrote to memory of 1752 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 94 PID 4272 wrote to memory of 1752 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 94 PID 4272 wrote to memory of 1752 4272 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 94 PID 4280 wrote to memory of 4448 4280 cmd.exe 99 PID 4280 wrote to memory of 4448 4280 cmd.exe 99 PID 4280 wrote to memory of 4448 4280 cmd.exe 99 PID 1752 wrote to memory of 4032 1752 cmd.exe 100 PID 1752 wrote to memory of 4032 1752 cmd.exe 100 PID 1752 wrote to memory of 4032 1752 cmd.exe 100 PID 4448 wrote to memory of 1408 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 101 PID 4448 wrote to memory of 1408 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 101 PID 4448 wrote to memory of 1408 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 101 PID 4448 wrote to memory of 3108 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 103 PID 4448 wrote to memory of 3108 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 103 PID 4448 wrote to memory of 3108 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 103 PID 4448 wrote to memory of 2824 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 104 PID 4448 wrote to memory of 2824 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 104 PID 4448 wrote to memory of 2824 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 104 PID 4448 wrote to memory of 3172 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 105 PID 4448 wrote to memory of 3172 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 105 PID 4448 wrote to memory of 3172 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 105 PID 4448 wrote to memory of 216 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 106 PID 4448 wrote to memory of 216 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 106 PID 4448 wrote to memory of 216 4448 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 106 PID 1408 wrote to memory of 2380 1408 cmd.exe 111 PID 1408 wrote to memory of 2380 1408 cmd.exe 111 PID 1408 wrote to memory of 2380 1408 cmd.exe 111 PID 2380 wrote to memory of 1044 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 112 PID 2380 wrote to memory of 1044 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 112 PID 2380 wrote to memory of 1044 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 112 PID 216 wrote to memory of 1076 216 cmd.exe 114 PID 216 wrote to memory of 1076 216 cmd.exe 114 PID 216 wrote to memory of 1076 216 cmd.exe 114 PID 1044 wrote to memory of 3124 1044 cmd.exe 115 PID 1044 wrote to memory of 3124 1044 cmd.exe 115 PID 1044 wrote to memory of 3124 1044 cmd.exe 115 PID 2380 wrote to memory of 2352 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 173 PID 2380 wrote to memory of 2352 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 173 PID 2380 wrote to memory of 2352 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 173 PID 2380 wrote to memory of 2272 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 117 PID 2380 wrote to memory of 2272 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 117 PID 2380 wrote to memory of 2272 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 117 PID 2380 wrote to memory of 4100 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 118 PID 2380 wrote to memory of 4100 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 118 PID 2380 wrote to memory of 4100 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 118 PID 2380 wrote to memory of 4652 2380 187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\NccgwUYs\KEUwIEIw.exe"C:\Users\Admin\NccgwUYs\KEUwIEIw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1612
-
-
C:\ProgramData\nIYcMQYE\TYwAYMcE.exe"C:\ProgramData\nIYcMQYE\TYwAYMcE.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4952
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"6⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"8⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:1148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"10⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:740 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"12⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:1420 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"14⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:3960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"16⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"18⤵PID:4364
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"20⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:5064 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"22⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:3248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"24⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"26⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:3192 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"28⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:332 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"30⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"32⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11833⤵PID:960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"34⤵PID:4724
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:2352
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11835⤵PID:4196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"36⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11837⤵PID:1076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"38⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11839⤵PID:4740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"40⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11841⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"42⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11843⤵PID:3552
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"44⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11845⤵PID:3120
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"46⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11847⤵PID:4480
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"48⤵PID:3772
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV149⤵PID:4124
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11849⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"50⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11851⤵PID:5044
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"52⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11853⤵PID:4688
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"54⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11855⤵PID:2936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"56⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11857⤵PID:4644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"58⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11859⤵PID:4608
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"60⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11861⤵PID:1936
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"62⤵PID:1084
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV163⤵PID:4364
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11863⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"64⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11865⤵PID:3352
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"66⤵PID:3200
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11867⤵PID:2196
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"68⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11869⤵PID:4524
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"70⤵PID:3112
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11871⤵PID:2644
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"72⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11873⤵PID:3768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"74⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11875⤵PID:4784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"76⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11877⤵PID:1980
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"78⤵PID:5092
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV179⤵PID:4620
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11879⤵PID:5116
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"80⤵PID:4324
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV181⤵PID:1572
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11881⤵PID:3912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"82⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11883⤵
- Adds Run key to start application
PID:3296 -
C:\Users\Admin\piYUkUkc\uKYAkocE.exe"C:\Users\Admin\piYUkUkc\uKYAkocE.exe"84⤵PID:3592
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3592 -s 22485⤵
- Program crash
PID:4588
-
-
-
C:\ProgramData\JycEkggw\eSAwUUgA.exe"C:\ProgramData\JycEkggw\eSAwUUgA.exe"84⤵PID:2700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2700 -s 22485⤵
- Program crash
PID:1132
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"84⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11885⤵PID:4884
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"86⤵PID:2580
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:2612
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11887⤵PID:2452
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"88⤵PID:4212
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:4740
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11889⤵PID:4976
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"90⤵PID:5056
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV191⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11891⤵PID:4340
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"92⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11893⤵PID:3632
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"94⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11895⤵PID:3392
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"96⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11897⤵PID:3172
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"98⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes11899⤵PID:4284
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"100⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118101⤵PID:1624
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"102⤵PID:2168
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1103⤵PID:4524
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118103⤵PID:3960
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"104⤵PID:2400
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1105⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118105⤵PID:1252
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"106⤵PID:2272
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1107⤵PID:3356
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118107⤵PID:1256
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"108⤵PID:3836
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118109⤵PID:540
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"110⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118111⤵PID:3628
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"112⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118113⤵PID:4912
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"114⤵PID:4492
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1115⤵PID:4284
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118115⤵PID:3260
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"116⤵PID:4020
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1117⤵PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118117⤵PID:2652
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"118⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118119⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"120⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118121⤵PID:4132
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\187a052ff11cb16228342428d241f1a8_JaffaCakes118"122⤵PID:3604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-