Analysis
-
max time kernel
12s -
max time network
65s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 19:54
Behavioral task
behavioral1
Sample
b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
b8acc8f8958d1c219e408b6b1ff21f0e
-
SHA1
73d243f47938ac0716433da42bc706448629fe97
-
SHA256
55c891b3d49cf5d3647e7fb4eb3d5e565b32a729363b8d80bd98993b09d9cce9
-
SHA512
9e0b09776a5735e931a8bb56e76750f4e5d38627d3d3c3e2ef8152d07564658e8af3b331a695c4e652af35707af4abde7c92d05b3fee9c18915ed67dd15a1cc1
-
SSDEEP
24576:JBwk1xewMGDoL0qOJq9ZOX/eWs5IInBG0AR94TyQcxgnuYH5Lu0Mnq8:P512GD4OJqLe/1sHUTqy7suC5iXq8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 13 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3726321484-1950364574-433157660-1000\Control Panel\International\Geo\Nation b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1620-0-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/files/0x000a000000023b9f-5.dat upx behavioral2/memory/3476-33-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4488-152-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2388-167-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3208-186-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3400-187-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4672-189-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3476-190-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1620-188-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2520-191-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4984-194-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4076-193-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4488-192-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2592-195-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1620-196-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4432-198-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4676-199-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4424-197-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2388-200-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/960-205-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3208-204-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4880-203-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1144-202-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1704-201-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3400-206-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3424-208-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4672-207-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2592-213-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3576-215-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5204-214-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1428-212-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3100-211-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1852-210-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2520-209-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3716-217-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5380-222-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/960-225-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/2848-227-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4772-226-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4880-221-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/432-220-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5364-219-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/4888-218-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5612-231-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1852-230-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5388-229-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3784-228-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5856-234-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/1428-233-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/3100-232-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5500-237-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5252-236-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5204-235-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/6276-244-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/6236-243-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5372-242-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5364-241-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/6180-240-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/6168-239-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5320-238-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5380-245-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/5524-252-0x0000000000400000-0x000000000041E000-memory.dmp upx behavioral2/memory/6396-251-0x0000000000400000-0x000000000041E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\I: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\K: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\M: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\O: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\Y: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\B: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\J: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\U: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\V: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\W: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\T: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\Z: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\A: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\E: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\G: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\R: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\S: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\L: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\N: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\P: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\Q: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File opened (read-only) \??\X: b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\IME\SHARED\canadian cum public .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\american action big hairy (Janette).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\gang bang lingerie masturbation feet blondie (Tatjana,Karin).zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\danish bukkake lesbian .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\FxsTmp\japanese xxx cumshot several models circumcision .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\FxsTmp\porn animal uncut mistress .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\IME\SHARED\chinese fetish bukkake [milf] .avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\indian beastiality cumshot hidden .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\trambling beast [milf] mature .avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\systemprofile\chinese animal kicking hot (!) stockings .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\systemprofile\beast sleeping ash (Christine).rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\Temp\american gay hidden circumcision (Jenna).avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\Common Files\microsoft shared\italian hardcore animal full movie boobs shoes (Kathrin).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian sperm hidden boots .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\fetish catfight (Sonja,Sonja).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\Updates\Download\tyrkish handjob trambling public ash (Christine,Karin).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\gay lesbian sleeping titts 40+ .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\african xxx [milf] gorgeoushorny .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\dotnet\shared\fucking [bangbus] circumcision .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\canadian horse girls hole black hairunshaved (Sonja).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\french handjob lesbian (Christine,Curtney).zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\swedish blowjob animal uncut wifey .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Update\Download\italian blowjob horse licking .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\Temp\hardcore horse licking hotel .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\cum blowjob hot (!) (Britney).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\xxx voyeur vagina shower (Samantha).zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\chinese blowjob beastiality full movie shoes .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Temp\trambling full movie girly (Liz).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\malaysia fetish beastiality public .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\gay horse voyeur wifey .avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Drops file in Windows directory 50 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\horse beastiality uncut .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\templates\japanese horse cum girls boobs shower .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\kicking public 50+ .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\Downloaded Program Files\black kicking beast catfight balls .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-composable-sharepicker_31bf3856ad364e35_10.0.19041.1_none_c87e96327faffd0e\horse public legs 50+ .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-b..-bcdtemplate-client_31bf3856ad364e35_10.0.19041.1_none_de1581e9a275faf8\sperm blowjob licking .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\assembly\temp\japanese cum cumshot several models femdom (Christine).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\chinese porn sleeping femdom .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Local\Temp\danish handjob kicking [milf] latex .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.264_none_cb389cf57d74d691\tyrkish hardcore kicking voyeur (Sylvia,Sandy).zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\security\templates\cum sleeping titts .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\cum sperm girls (Kathrin,Jenna).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\chinese cum fetish voyeur vagina boots .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\spanish fucking hardcore [milf] (Sylvia).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\InputMethod\SHARED\kicking girls sweet .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\cum hot (!) titts .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\african cum action hot (!) titts blondie .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\american horse xxx [milf] bedroom .avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\mssrv.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\fetish cum several models .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\xxx gay masturbation .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\fetish voyeur hairy (Karin,Anniston).rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.789_en-us_58ebf9ecc407e3c0\tyrkish gang bang hardcore uncut (Britney).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_64\Temp\black cum handjob full movie .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\spanish horse xxx hidden nipples (Sarah).rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\horse fucking girls high heels .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\chinese handjob masturbation shoes (Karin,Melissa).rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\cum several models blondie .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\swedish beastiality masturbation .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\xxx xxx hot (!) .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\danish fucking voyeur boots .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\italian action sperm voyeur femdom (Jenna).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SoftwareDistribution\Download\SharedFileCache\spanish trambling full movie hairy (Ashley,Curtney).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\action [bangbus] ejaculation (Ashley,Jade).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\xxx voyeur granny .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\PLA\Templates\russian nude sleeping traffic (Britney).rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.1_none_0bc0f3d4cd7dc8fd\gay cum public .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\tyrkish blowjob [bangbus] young .rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\african hardcore horse uncut upskirt (Britney,Gina).rar.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\SoftwareDistribution\Download\french bukkake xxx uncut stockings .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\japanese fucking trambling sleeping ash castration .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-a..gement-uevtemplates_31bf3856ad364e35_10.0.19041.1_none_0d66b54875835a49\fucking kicking [milf] (Melissa).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\CbsTemp\american sperm public glans .zip.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_en-us_310bfb76047869ad\fetish full movie penetration (Jade).mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_uk-ua_5b152a8d329397ec\porn voyeur .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\chinese blowjob porn [free] cock (Jade,Curtney).avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\animal porn full movie girly (Sonja).mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\assembly\tmp\gay [bangbus] .mpg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\african animal voyeur .mpeg.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\gang bang masturbation swallow .avi.exe b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1704 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1704 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1144 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1144 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3208 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3208 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3400 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 3400 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4672 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4672 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2520 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2520 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4984 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4984 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2592 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2592 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1620 wrote to memory of 3476 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 87 PID 1620 wrote to memory of 3476 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 87 PID 1620 wrote to memory of 3476 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 87 PID 3476 wrote to memory of 4488 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 90 PID 3476 wrote to memory of 4488 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 90 PID 3476 wrote to memory of 4488 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 90 PID 1620 wrote to memory of 4076 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 91 PID 1620 wrote to memory of 4076 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 91 PID 1620 wrote to memory of 4076 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 91 PID 3476 wrote to memory of 4424 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 95 PID 3476 wrote to memory of 4424 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 95 PID 3476 wrote to memory of 4424 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 95 PID 1620 wrote to memory of 4432 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 96 PID 1620 wrote to memory of 4432 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 96 PID 1620 wrote to memory of 4432 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 96 PID 4488 wrote to memory of 4676 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 97 PID 4488 wrote to memory of 4676 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 97 PID 4488 wrote to memory of 4676 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 97 PID 4076 wrote to memory of 2388 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 98 PID 4076 wrote to memory of 2388 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 98 PID 4076 wrote to memory of 2388 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 98 PID 1620 wrote to memory of 1704 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 101 PID 1620 wrote to memory of 1704 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 101 PID 1620 wrote to memory of 1704 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 101 PID 3476 wrote to memory of 1144 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 102 PID 3476 wrote to memory of 1144 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 102 PID 3476 wrote to memory of 1144 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 102 PID 4432 wrote to memory of 3208 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 103 PID 4432 wrote to memory of 3208 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 103 PID 4432 wrote to memory of 3208 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 103 PID 4488 wrote to memory of 3400 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 104 PID 4488 wrote to memory of 3400 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 104 PID 4488 wrote to memory of 3400 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 104 PID 4424 wrote to memory of 4672 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 105 PID 4424 wrote to memory of 4672 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 105 PID 4424 wrote to memory of 4672 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 105 PID 4076 wrote to memory of 2520 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 106 PID 4076 wrote to memory of 2520 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 106 PID 4076 wrote to memory of 2520 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 106 PID 4676 wrote to memory of 4984 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 107 PID 4676 wrote to memory of 4984 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 107 PID 4676 wrote to memory of 4984 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 107 PID 2388 wrote to memory of 2592 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 108 PID 2388 wrote to memory of 2592 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 108 PID 2388 wrote to memory of 2592 2388 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 108 PID 1620 wrote to memory of 3576 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 111 PID 1620 wrote to memory of 3576 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 111 PID 1620 wrote to memory of 3576 1620 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 111 PID 3476 wrote to memory of 3716 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 112 PID 3476 wrote to memory of 3716 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 112 PID 3476 wrote to memory of 3716 3476 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 112 PID 4432 wrote to memory of 4888 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 113 PID 4432 wrote to memory of 4888 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 113 PID 4432 wrote to memory of 4888 4432 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 113 PID 4488 wrote to memory of 4880 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 114 PID 4488 wrote to memory of 4880 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 114 PID 4488 wrote to memory of 4880 4488 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 114 PID 4076 wrote to memory of 432 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 115 PID 4076 wrote to memory of 432 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 115 PID 4076 wrote to memory of 432 4076 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 115 PID 4676 wrote to memory of 960 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 116 PID 4676 wrote to memory of 960 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 116 PID 4676 wrote to memory of 960 4676 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 116 PID 4424 wrote to memory of 4772 4424 b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵
- Suspicious behavior: EnumeratesProcesses
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:5320
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"8⤵PID:10572
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"8⤵PID:15284
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:7804
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"8⤵PID:12644
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"8⤵PID:15076
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:10088
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:3648
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:5856
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:10196
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15468
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:7236
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:12936
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:14956
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10212
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:1036
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:6592
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:10588
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15512
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:5748
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:9812
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:13400
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14900
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:5444
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:9064
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15316
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:9948
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15652
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12808
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14980
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9040
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9892
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:13492
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14772
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:16796
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:5252
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:6584
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:12860
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15068
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:1992
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10072
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15432
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:5664
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:8576
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10000
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:13392
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14844
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6148
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:3524
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14940
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:8760
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9848
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:13652
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14876
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6396
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12696
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15116
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7708
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12688
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14796
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:17584
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10152
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15496
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10204
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14108
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6924
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12820
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14908
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9028
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15308
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9864
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:13556
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14868
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:6276
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:8852
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:12920
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15044
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:7876
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10080
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14836
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:17576
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:5612
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:8644
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15292
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10008
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:1880
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6800
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12560
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15180
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:8208
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15188
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9764
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:13484
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14884
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6168
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10180
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:772
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15260
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10128
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15552
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5372
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7812
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15204
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9796
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:13476
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14924
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6728
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:13252
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14788
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:8560
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14804
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9992
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:13524
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14780
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6296
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10596
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15324
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7860
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15228
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10048
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15404
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5512
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6580
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15644
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10064
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:13864
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15348
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9012
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9964
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15536
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10172
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12712
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14988
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:7868
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15252
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10104
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:2668
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:5404
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:8784
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15196
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9780
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:12928
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15052
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:6944
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15332
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9020
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9956
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:14828
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:5204
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:6572
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:12768
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15060
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"7⤵PID:15220
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10096
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15660
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:8536
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:10024
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15580
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7104
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12628
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15124
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9300
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15956
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9836
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12596
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15172
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6324
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:8884
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12620
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15156
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7732
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:8864
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:14852
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10144
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15340
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5364
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7432
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12568
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15148
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10188
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14216
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6736
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12944
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14996
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:8496
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10016
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15600
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6524
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:12800
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15100
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:8152
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9756
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12612
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15164
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5524
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:8468
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:16176
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10032
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14820
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6992
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12852
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15012
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9124
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15948
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9884
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:13540
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15004
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6332
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10580
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14860
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:7844
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15276
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10120
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:13212
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14964
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:8312
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15300
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10040
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15588
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:6912
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:12868
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14932
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9056
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15544
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9932
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:13416
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:6236
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:9000
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:13548
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15036
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:7852
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"6⤵PID:15244
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:10056
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15356
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5560
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:8804
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:9984
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15568
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6984
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12844
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14972
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:8976
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9788
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:12776
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15108
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:8912
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12912
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15092
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:7740
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12792
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:14892
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10160
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:3596
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:7960
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15504
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9804
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14760
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:6968
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:13128
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14916
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9048
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9772
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:12636
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:15132
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:5500
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:11056
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15268
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:7724
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:12784
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"5⤵PID:15084
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10136
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15520
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:5420
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:8840
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:9976
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15528
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:6976
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:12828
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14948
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9140
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15676
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9872
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:15560
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:6188
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:10604
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:14812
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:7700
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:12552
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"4⤵PID:15140
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:10112
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:15440
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵PID:5412
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9072
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:9916
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:13532
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:15020
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵PID:7048
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:12836
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:15028
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵PID:9132
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"3⤵PID:15212
-
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵PID:9856
-
-
C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b8acc8f8958d1c219e408b6b1ff21f0e_JaffaCakes118.exe"2⤵PID:15668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\canadian sperm hidden boots .rar.exe
Filesize1014KB
MD58774840786bff8489888d72eb1d4f97e
SHA18229bd1e5c96922c4381880c4e8c3a18071ed6ea
SHA256e67fab9e246a75b323e6278ac60c0235bfa714146dd0f1ccc46ee51e26359e4c
SHA512119fa7356d35eda4999be6e62f3f70f1aa21a106fe63a19cd3545661a49c83dc9c18ab611090f001af064aa7aa6e26beaaeeef45a9a4248e45b41076e3337ac8