Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11/04/2024, 14:24
Static task
static1
Behavioral task
behavioral1
Sample
eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe
-
Size
480KB
-
MD5
eda10dae57f7d8b74d5f9c04354fbc1c
-
SHA1
e6eb06c42f35d100e8bcf08e0dcc4ba7ae1f7bba
-
SHA256
8513014ad7e7be170a8d856729947bbb5a22d88c7c902f464ae545af2e919861
-
SHA512
b850bb84998e340ba5ce92fc33520bb1f2dc9ae2e209e7238633c900b4cf9e46a31cff4bbb9fcddb1b2f17bc8cdb5c0535be7298de6bd3928e9abecc1b9f0a8c
-
SSDEEP
12288:Jl+ujU8GMNj5R2A4AXy5iUcZnBePlkvtyC0s:JPjVGGoA475iUcxBe92tu
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Control Panel\International\Geo\Nation goEEUcEM.exe -
Deletes itself 1 IoCs
pid Process 2132 cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2944 goEEUcEM.exe 2884 xmgEkgEw.exe 2628 CocQYMcs.exe -
Loads dropped DLL 22 IoCs
pid Process 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\goEEUcEM.exe = "C:\\Users\\Admin\\vqsgkEMs\\goEEUcEM.exe" eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Run\goEEUcEM.exe = "C:\\Users\\Admin\\vqsgkEMs\\goEEUcEM.exe" goEEUcEM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xmgEkgEw.exe = "C:\\ProgramData\\JwgEkkAc\\xmgEkgEw.exe" eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xmgEkgEw.exe = "C:\\ProgramData\\JwgEkkAc\\xmgEkgEw.exe" xmgEkgEw.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\xmgEkgEw.exe = "C:\\ProgramData\\JwgEkkAc\\xmgEkgEw.exe" CocQYMcs.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\vqsgkEMs CocQYMcs.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\vqsgkEMs\goEEUcEM CocQYMcs.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico goEEUcEM.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 1212 reg.exe 1964 reg.exe 2956 reg.exe 2156 reg.exe 1680 reg.exe 2836 reg.exe 572 reg.exe 1288 reg.exe 1884 reg.exe 948 reg.exe 2896 reg.exe 2184 reg.exe 1632 reg.exe 2736 reg.exe 1352 reg.exe 2536 reg.exe 2464 reg.exe 2216 reg.exe 336 reg.exe 2572 reg.exe 2256 reg.exe 2936 reg.exe 1500 reg.exe 1636 reg.exe 2244 reg.exe 2724 reg.exe 2416 reg.exe 1364 reg.exe 2780 reg.exe 1208 reg.exe 3048 reg.exe 1972 reg.exe 2116 reg.exe 2132 reg.exe 880 reg.exe 3064 reg.exe 2432 reg.exe 2104 reg.exe 1980 reg.exe 2548 reg.exe 2468 reg.exe 1556 reg.exe 2452 reg.exe 2820 reg.exe 1964 reg.exe 1732 reg.exe 1804 reg.exe 2024 reg.exe 1976 reg.exe 2980 reg.exe 2148 reg.exe 1832 reg.exe 2180 reg.exe 1760 reg.exe 2244 reg.exe 1968 reg.exe 2452 reg.exe 1288 reg.exe 816 reg.exe 2200 reg.exe 3028 reg.exe 2732 reg.exe 1172 reg.exe 1324 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1512 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1512 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1040 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1040 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2196 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2196 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1392 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1392 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2296 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2296 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2624 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2624 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 584 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 584 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 964 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 964 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 600 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 600 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1552 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1552 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2732 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2732 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2716 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2716 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1996 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1996 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2468 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2468 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 856 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 856 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2940 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2940 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2956 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2956 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2440 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2440 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1980 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1980 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 712 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 712 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1480 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1480 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1716 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1716 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2420 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2420 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1848 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1848 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2424 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2424 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2796 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2796 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1076 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1076 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1676 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 1676 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2464 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 2464 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 468 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 468 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2944 goEEUcEM.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe 2944 goEEUcEM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1336 wrote to memory of 2944 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 28 PID 1336 wrote to memory of 2944 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 28 PID 1336 wrote to memory of 2944 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 28 PID 1336 wrote to memory of 2944 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 28 PID 1336 wrote to memory of 2884 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 29 PID 1336 wrote to memory of 2884 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 29 PID 1336 wrote to memory of 2884 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 29 PID 1336 wrote to memory of 2884 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 29 PID 1336 wrote to memory of 2668 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 31 PID 1336 wrote to memory of 2668 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 31 PID 1336 wrote to memory of 2668 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 31 PID 1336 wrote to memory of 2668 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 31 PID 2668 wrote to memory of 2528 2668 cmd.exe 34 PID 2668 wrote to memory of 2528 2668 cmd.exe 34 PID 2668 wrote to memory of 2528 2668 cmd.exe 34 PID 2668 wrote to memory of 2528 2668 cmd.exe 34 PID 1336 wrote to memory of 2520 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 33 PID 1336 wrote to memory of 2520 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 33 PID 1336 wrote to memory of 2520 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 33 PID 1336 wrote to memory of 2520 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 33 PID 1336 wrote to memory of 2412 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 35 PID 1336 wrote to memory of 2412 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 35 PID 1336 wrote to memory of 2412 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 35 PID 1336 wrote to memory of 2412 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 35 PID 1336 wrote to memory of 2004 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 37 PID 1336 wrote to memory of 2004 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 37 PID 1336 wrote to memory of 2004 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 37 PID 1336 wrote to memory of 2004 1336 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 37 PID 2528 wrote to memory of 544 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 40 PID 2528 wrote to memory of 544 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 40 PID 2528 wrote to memory of 544 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 40 PID 2528 wrote to memory of 544 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 40 PID 544 wrote to memory of 1512 544 cmd.exe 42 PID 544 wrote to memory of 1512 544 cmd.exe 42 PID 544 wrote to memory of 1512 544 cmd.exe 42 PID 544 wrote to memory of 1512 544 cmd.exe 42 PID 2528 wrote to memory of 572 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 118 PID 2528 wrote to memory of 572 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 118 PID 2528 wrote to memory of 572 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 118 PID 2528 wrote to memory of 572 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 118 PID 2528 wrote to memory of 1124 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 120 PID 2528 wrote to memory of 1124 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 120 PID 2528 wrote to memory of 1124 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 120 PID 2528 wrote to memory of 1124 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 120 PID 2528 wrote to memory of 1664 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 45 PID 2528 wrote to memory of 1664 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 45 PID 2528 wrote to memory of 1664 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 45 PID 2528 wrote to memory of 1664 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 45 PID 2528 wrote to memory of 964 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 125 PID 2528 wrote to memory of 964 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 125 PID 2528 wrote to memory of 964 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 125 PID 2528 wrote to memory of 964 2528 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 125 PID 1512 wrote to memory of 808 1512 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 51 PID 1512 wrote to memory of 808 1512 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 51 PID 1512 wrote to memory of 808 1512 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 51 PID 1512 wrote to memory of 808 1512 eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe 51 PID 964 wrote to memory of 1456 964 cmd.exe 263 PID 964 wrote to memory of 1456 964 cmd.exe 263 PID 964 wrote to memory of 1456 964 cmd.exe 263 PID 964 wrote to memory of 1456 964 cmd.exe 263 PID 808 wrote to memory of 1040 808 cmd.exe 217 PID 808 wrote to memory of 1040 808 cmd.exe 217 PID 808 wrote to memory of 1040 808 cmd.exe 217 PID 808 wrote to memory of 1040 808 cmd.exe 217
Processes
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\vqsgkEMs\goEEUcEM.exe"C:\Users\Admin\vqsgkEMs\goEEUcEM.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2944
-
-
C:\ProgramData\JwgEkkAc\xmgEkgEw.exe"C:\ProgramData\JwgEkkAc\xmgEkgEw.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2884
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"6⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:1040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"8⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"10⤵PID:272
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"12⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"14⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"16⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"18⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"20⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:600 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"22⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"24⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"26⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"28⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:1996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"30⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:2468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"32⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11833⤵
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"34⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11835⤵
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"36⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11837⤵
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"38⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11839⤵
- Suspicious behavior: EnumeratesProcesses
PID:2440 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"40⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11841⤵
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"42⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11843⤵
- Suspicious behavior: EnumeratesProcesses
PID:712 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"44⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11845⤵
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"46⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11847⤵
- Suspicious behavior: EnumeratesProcesses
PID:1716 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"48⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2420 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"50⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11851⤵
- Suspicious behavior: EnumeratesProcesses
PID:1848 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"52⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11853⤵
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"54⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11855⤵
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"56⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11857⤵
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"58⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11859⤵
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"60⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11861⤵
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"62⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11863⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"64⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11865⤵PID:1624
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"66⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11867⤵PID:1976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"68⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11869⤵PID:1836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"70⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11871⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"72⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11873⤵PID:1332
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"74⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11875⤵PID:1364
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"76⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11877⤵PID:1820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"78⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11879⤵PID:952
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"80⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11881⤵PID:1104
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"82⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11883⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"84⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11885⤵PID:272
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"86⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11887⤵PID:2816
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"88⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11889⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"90⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11891⤵PID:564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"92⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11893⤵PID:1324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"94⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11895⤵PID:1940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"96⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11897⤵PID:1588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"98⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes11899⤵PID:1756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"100⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118101⤵PID:2036
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"102⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118103⤵PID:2440
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"104⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118105⤵PID:2520
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"106⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118107⤵PID:2328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"108⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118109⤵PID:2680
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"110⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118111⤵PID:2836
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"112⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118113⤵PID:1480
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"114⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118115⤵PID:1328
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"116⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118117⤵PID:2876
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"118⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118119⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"120⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118121⤵PID:712
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\eda10dae57f7d8b74d5f9c04354fbc1c_JaffaCakes118"122⤵PID:528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-