Analysis
-
max time kernel
14s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2024 19:47
Behavioral task
behavioral1
Sample
a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe
-
Size
275KB
-
MD5
a5eeb940fa9e03f1d5d1813db8f0917e
-
SHA1
c14f424d69006044b619f3ffd0f49d4275cc3227
-
SHA256
641d9dc5fc63f8188e3148ed90e5206bf55b973790a4f10342c118c2c48c4e8a
-
SHA512
53e8c7518ed983a63651e7be411962fbd7815e0f80e8290443c9b8812cdaadf19bd3a748850e4be5b766f92b91bfb2152733b6b89424900d6f856088549df9d7
-
SSDEEP
6144:YjluQoSPIo5R4nM/40yJNB+/F5g3s2N1uzqVA2ZjQ0gkf3dCG8xRvY/:YEQoSpqhe6bo2A2Xf3dCTY/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-17203666-93769886-2545153620-1000\Control Panel\International\Geo\Nation a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1844-0-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/files/0x000a000000023b9f-5.dat upx behavioral2/memory/2108-30-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4944-154-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1908-155-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4632-168-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1664-170-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1384-171-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3460-174-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/452-185-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/740-186-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4084-188-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1844-187-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4620-190-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4944-191-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2108-189-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2680-192-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1908-193-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2956-194-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3676-196-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4632-195-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/776-198-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1664-197-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5112-202-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3620-201-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3460-203-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1384-200-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4176-204-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/452-205-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2352-210-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4488-209-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/1524-208-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/740-207-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4328-206-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2360-212-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2228-214-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4620-213-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2680-215-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4084-211-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5140-217-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2956-216-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5184-220-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3676-218-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5176-219-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5148-223-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/776-221-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5200-224-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5208-222-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5112-229-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/3620-228-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5384-232-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5448-240-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5440-239-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4328-238-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5432-237-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5424-236-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5416-235-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5400-234-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5392-233-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5356-231-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4176-230-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/5456-244-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/2352-243-0x0000000000400000-0x0000000000420000-memory.dmp upx behavioral2/memory/4488-242-0x0000000000400000-0x0000000000420000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\G: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\N: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\P: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\T: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\W: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\E: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\I: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\S: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\X: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\Y: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\Z: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\H: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\J: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\K: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\O: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\Q: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\R: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\A: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\B: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\L: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\M: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\U: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File opened (read-only) \??\V: a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\FxsTmp\horse big YEâPSè& (Sonja).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\systemprofile\japanese fetish hidden (Anniston,Sandy).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\american lingerie [free] (Sonja,Sonja).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\systemprofile\xxx public legs balls .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\Temp\japanese lesbian horse full movie .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\asian trambling beast uncut mistress .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\black trambling masturbation legs .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\FxsTmp\gang bang cumshot girls cock ash (Curtney).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\IME\SHARED\american animal hardcore licking sweet .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\french gay sperm hidden beautyfull .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SysWOW64\IME\SHARED\japanese xxx sperm full movie .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\fetish beastiality several models mistress .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\swedish horse licking YEâPSè& (Jade).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\tyrkish kicking cumshot full movie .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\trambling animal sleeping hairy .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\danish beastiality big bondage .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\french lingerie [free] .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\brasilian bukkake gay masturbation (Sandy).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\Updates\Download\cum lesbian [free] cock .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\spanish gay bukkake several models feet stockings .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Update\Download\german trambling beastiality big circumcision (Sylvia).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\sperm xxx sleeping girly .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\tyrkish fucking hidden castration .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\german cum cumshot licking hole 40+ (Sylvia,Sylvia).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Temp\norwegian beastiality gay lesbian glans wifey (Sonja).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\dotnet\shared\animal licking feet .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\indian kicking cum lesbian shower (Melissa).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\canadian horse public .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\lesbian masturbation lady .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\german beast big glans .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.1_none_5d54c0aac5c3c12c\canadian trambling beastiality girls .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_62312bfbb33d478a\african fucking big .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\cum several models .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\malaysia trambling animal [free] hairy (Sarah,Sonja).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\assembly\temp\russian action porn voyeur femdom .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\Downloaded Program Files\canadian cum masturbation feet YEâPSè& .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\african handjob nude lesbian ejaculation (Jade,Liz).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..s-ime-eashared-ihds_31bf3856ad364e35_10.0.19041.1_none_e8996b7d3512363f\swedish hardcore fucking public glans (Sylvia,Ashley).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_de-de_16bd831fd16633be\danish lesbian action public lady (Britney,Melissa).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_ee7ea14f7d8a3ee3\trambling beastiality voyeur vagina .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\trambling catfight granny (Sonja).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\animal handjob public (Anniston,Sylvia).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.844_none_67b5915b5651dd8a\french lingerie voyeur nipples (Britney).zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1202_none_d8a1416ab7cccdcf\danish kicking catfight hole .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\blowjob lesbian beautyfull .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..-eashared-imebroker_31bf3856ad364e35_10.0.19041.84_none_81616275259e37fe\russian animal [free] (Ashley,Britney).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-devdispitemprovider_31bf3856ad364e35_10.0.19041.1_none_9aa486d790131d4e\porn sleeping penetration .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\cumshot action [free] fishy (Sonja,Tatjana).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.1_none_f42978969c79336a\russian lingerie lesbian sleeping young (Britney,Samantha).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\german action sleeping black hairunshaved .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\american trambling hidden (Jenna,Jade).zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\malaysia beastiality public .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\canadian porn sleeping granny .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\gang bang [free] penetration .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-h..public-utils-shared_31bf3856ad364e35_10.0.19041.1_none_19d22204a1f3fcaf\african lesbian blowjob lesbian ash .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\CbsTemp\fetish gang bang [milf] (Gina).zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\russian blowjob big .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\japanese handjob fucking full movie mistress .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.153_none_e23c926e32d07dc1\african animal kicking lesbian redhair (Britney).mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1_none_0b596e2a33be7d4c\french porn beastiality licking girly .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\american handjob masturbation blondie .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\indian handjob fucking girls nipples bedroom .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\italian sperm action girls .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\mssrv.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\asian horse cum masturbation ash blondie .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\tyrkish blowjob lesbian hot (!) upskirt (Sandy).rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\nude horse girls young .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\italian hardcore big (Jade,Jade).zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\spanish lesbian gang bang lesbian YEâPSè& (Karin,Kathrin).zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\trambling gay [free] high heels .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\italian gay gang bang sleeping redhair .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\action horse sleeping boobs sweet .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\cumshot several models traffic .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\gang bang [bangbus] granny .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\tyrkish gang bang sperm lesbian (Melissa).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\russian fucking full movie legs Ôï .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\japanese nude masturbation ash circumcision .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\kicking full movie .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\russian beastiality blowjob full movie hairy .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\sperm trambling licking 50+ .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\malaysia beast nude licking upskirt .zip.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\kicking [free] ash mistress .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.1_none_fa09f84703cb02c5\handjob public glans traffic .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\lingerie licking bondage .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\chinese porn uncut hole .mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\lesbian nude masturbation ash mistress (Sylvia).mpg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\assembly\tmp\sperm animal masturbation hairy .mpeg.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\handjob big shower .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\swedish cumshot girls latex (Sonja,Janette).rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.844_none_57eddd48e7a74274\russian horse cumshot big .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\norwegian lingerie [free] .avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\french handjob girls .rar.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..se-shared-datafiles_31bf3856ad364e35_10.0.19041.1_none_2f5f00d280dce9f6\cumshot girls balls (Gina,Tatjana).avi.exe a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 452 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 452 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 740 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 740 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4084 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4084 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4620 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 4620 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2680 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2680 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2956 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 2956 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 3676 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 3676 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 776 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 776 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 5112 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 5112 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1844 wrote to memory of 2108 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 87 PID 1844 wrote to memory of 2108 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 87 PID 1844 wrote to memory of 2108 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 87 PID 2108 wrote to memory of 4944 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 94 PID 2108 wrote to memory of 4944 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 94 PID 2108 wrote to memory of 4944 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 94 PID 1844 wrote to memory of 1908 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 95 PID 1844 wrote to memory of 1908 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 95 PID 1844 wrote to memory of 1908 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 95 PID 2108 wrote to memory of 4632 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 99 PID 2108 wrote to memory of 4632 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 99 PID 2108 wrote to memory of 4632 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 99 PID 1844 wrote to memory of 1664 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 100 PID 1844 wrote to memory of 1664 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 100 PID 1844 wrote to memory of 1664 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 100 PID 4944 wrote to memory of 1384 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 101 PID 4944 wrote to memory of 1384 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 101 PID 4944 wrote to memory of 1384 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 101 PID 1908 wrote to memory of 3460 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 102 PID 1908 wrote to memory of 3460 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 102 PID 1908 wrote to memory of 3460 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 102 PID 2108 wrote to memory of 452 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 104 PID 2108 wrote to memory of 452 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 104 PID 2108 wrote to memory of 452 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 104 PID 4632 wrote to memory of 740 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 105 PID 4632 wrote to memory of 740 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 105 PID 4632 wrote to memory of 740 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 105 PID 4944 wrote to memory of 4084 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 106 PID 4944 wrote to memory of 4084 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 106 PID 4944 wrote to memory of 4084 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 106 PID 1844 wrote to memory of 4620 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 107 PID 1844 wrote to memory of 4620 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 107 PID 1844 wrote to memory of 4620 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 107 PID 1908 wrote to memory of 2680 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 108 PID 1908 wrote to memory of 2680 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 108 PID 1908 wrote to memory of 2680 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 108 PID 1664 wrote to memory of 2956 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 109 PID 1664 wrote to memory of 2956 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 109 PID 1664 wrote to memory of 2956 1664 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 109 PID 1384 wrote to memory of 3676 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 110 PID 1384 wrote to memory of 3676 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 110 PID 1384 wrote to memory of 3676 1384 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 110 PID 3460 wrote to memory of 776 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 111 PID 3460 wrote to memory of 776 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 111 PID 3460 wrote to memory of 776 3460 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 111 PID 2108 wrote to memory of 5112 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 115 PID 2108 wrote to memory of 5112 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 115 PID 2108 wrote to memory of 5112 2108 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 115 PID 4632 wrote to memory of 3620 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 114 PID 4632 wrote to memory of 3620 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 114 PID 4632 wrote to memory of 3620 4632 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 114 PID 452 wrote to memory of 4176 452 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 116 PID 452 wrote to memory of 4176 452 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 116 PID 452 wrote to memory of 4176 452 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 116 PID 740 wrote to memory of 4328 740 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 117 PID 740 wrote to memory of 4328 740 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 117 PID 740 wrote to memory of 4328 740 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 117 PID 1844 wrote to memory of 4488 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 118 PID 1844 wrote to memory of 4488 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 118 PID 1844 wrote to memory of 4488 1844 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 118 PID 4944 wrote to memory of 1524 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 119 PID 4944 wrote to memory of 1524 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 119 PID 4944 wrote to memory of 1524 4944 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 119 PID 1908 wrote to memory of 2352 1908 a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:5200
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"8⤵PID:9660
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"8⤵PID:12708
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"8⤵PID:15152
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:8212
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:11116
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:208
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:6788
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:4456
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:11260
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:3792
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:6840
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:15584
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:7848
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11292
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15080
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:6464
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:9932
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:12500
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:15204
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:8168
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11508
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15340
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:3752
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:7540
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:3756
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:14832
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6868
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7756
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:10872
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15064
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5176
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:9276
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:12220
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:15016
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:8240
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11412
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15048
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:9212
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:1432
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11924
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15332
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:11500
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15356
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:10156
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:12892
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15144
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:8220
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:11388
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:1424
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15612
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7536
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:11252
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:3644
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6940
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7748
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11492
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:3524
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:8276
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:11760
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:15008
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:7200
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11404
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:14848
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5472
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:9508
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11560
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15276
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6832
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:14860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5544
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:10892
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15040
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6212
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:10176
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:3444
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7800
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7456
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:8172
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15032
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5496
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:9532
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:3624
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15292
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7312
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:8040
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4168
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:3660
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:640
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6404
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:10052
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:12596
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15168
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:8284
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:11740
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15324
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5480
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:9524
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12436
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15220
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7132
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15564
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7672
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4536
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:9676
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12304
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15244
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4164
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11420
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:5488
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:8716
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:12748
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15228
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:3288
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:10780
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5208
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:9652
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:12076
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:15268
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"7⤵PID:10596
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:7440
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:11244
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:60
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:8252
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:10980
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:4384
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:2232
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7840
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:10880
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15056
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6264
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:9976
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:12716
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15196
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7808
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7376
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:10836
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7264
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:10828
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:4492
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6900
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7764
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11132
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5148
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6420
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:9484
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:12052
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:15284
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:8204
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:11168
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15024
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:9916
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12460
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15160
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7184
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15580
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:8180
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11220
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6412
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12324
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15236
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11396
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:14116
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:8260
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11004
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15604
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:6860
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4224
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:7904
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:11296
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:14824
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5184
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:10168
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:8196
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:11452
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:14840
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:5356
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:3100
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:7272
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:10816
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:428
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6760
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12468
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15212
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:3812
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11436
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:14596
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:9408
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:4792
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15300
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12700
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15180
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:7380
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:11236
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15072
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:9668
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:12692
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15188
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:6768
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15572
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:8176
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:11444
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:15348
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:9684
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:12312
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"6⤵PID:4904
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"5⤵PID:15260
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:3108
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:9516
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:12268
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15316
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:4988
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:7740
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:10808
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵PID:4488
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:6164
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:9416
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:12276
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:15308
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:7520
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"4⤵PID:3204
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:1252
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:10964
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:1712
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:9604
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:12028
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:15252
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵PID:6344
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"3⤵PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵PID:7676
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵PID:11428
-
-
C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a5eeb940fa9e03f1d5d1813db8f0917e_JaffaCakes118.exe"2⤵PID:3480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\french lingerie [free] .zip.exe
Filesize1.3MB
MD5de0e3c7bc49bdca36f0b75cd8e007ce8
SHA1d0c58228f9fed2fa0c3d88b2ef83fabbff8eb15d
SHA256cbb218e3813fbdca5f1b2146521f75be78aabe646e0ec95aed299ff51ed1159c
SHA51246aef8897ec8237537e8f7798a4d72b3da0e6c2c7211a521124789decf04778ab6e00aa7ca9631a1fa69bb0472988d638968a04113cacac2267f22d9a2454b76