Analysis
-
max time kernel
150s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 12:54
Behavioral task
behavioral1
Sample
30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe
-
Size
37KB
-
MD5
30744fef2eb151a8f419b86c1ca56139
-
SHA1
b647e50a790b7427cd490a4942cdedd4f5392fcf
-
SHA256
d5793e7fbee741ffc172ca63c415d6cbeb0ec98c952d0c6d94b6ceea2bb3209e
-
SHA512
3c363786118a87f3d82a102e5a83f2e383b61a72551514305132aac60c314c65e552045f61284a7914c8bf787c5aa751b64de2194d76009ddc8ae367c0484204
-
SSDEEP
768:lTo0pgD7/XLAUZobRt4+svX8Nqb0vvmzshX0AcUrU/AhMbpCk:lTo7A0THzstV8
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 64 IoCs
resource yara_rule behavioral2/memory/3960-5-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1552-4-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3732-3-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1892-2-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4896-1-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3600-0-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3076-7-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2936-6-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2120-9-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2668-8-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2104-11-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2356-10-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2292-12-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2576-13-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1740-15-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3876-14-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2360-16-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3096-17-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4032-18-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3608-20-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4880-19-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4784-21-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3264-22-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4828-23-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4220-25-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/5048-27-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4536-26-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2384-30-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/5012-29-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3344-28-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1400-24-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1192-34-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/5096-33-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/852-35-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1556-32-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/528-31-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/904-36-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4076-37-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2916-40-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/464-39-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3076-41-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4092-38-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2568-42-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3796-43-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4976-45-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3716-44-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2784-46-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/996-47-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2832-48-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3024-49-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/848-51-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2300-50-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3600-52-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3020-53-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/560-54-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/4072-55-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/5100-56-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1632-57-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/3416-58-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1012-59-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/2120-60-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1972-62-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/696-63-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 behavioral2/memory/1712-61-0x0000000019140000-0x0000000019150000-memory.dmp modiloader_stage2 -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1552 set thread context of 3608 1552 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 82 PID 3608 set thread context of 4032 3608 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 84 PID 4032 set thread context of 3600 4032 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 85 PID 3600 set thread context of 3264 3600 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 86 PID 3264 set thread context of 1892 3264 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 87 PID 1892 set thread context of 4880 1892 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 88 PID 4880 set thread context of 3732 4880 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 92 PID 3732 set thread context of 4896 3732 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 97 PID 4896 set thread context of 3960 4896 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 98 PID 3960 set thread context of 2936 3960 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 100 PID 2936 set thread context of 3076 2936 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 102 PID 3076 set thread context of 2356 3076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 104 PID 2356 set thread context of 2668 2356 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 105 PID 2668 set thread context of 2120 2668 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 107 PID 2120 set thread context of 2292 2120 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 110 PID 2292 set thread context of 2104 2292 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 115 PID 2104 set thread context of 2576 2104 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 119 PID 2576 set thread context of 1740 2576 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 121 PID 1740 set thread context of 3876 1740 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 122 PID 3876 set thread context of 2360 3876 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 124 PID 2360 set thread context of 3096 2360 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 127 PID 3096 set thread context of 1192 3096 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 128 PID 1192 set thread context of 852 1192 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 131 PID 852 set thread context of 4784 852 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 133 PID 4784 set thread context of 5048 4784 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 314 PID 5048 set thread context of 3796 5048 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 136 PID 3796 set thread context of 4828 3796 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 267 PID 4828 set thread context of 4220 4828 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 142 PID 4220 set thread context of 1400 4220 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 408 PID 1400 set thread context of 4536 1400 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 146 PID 4536 set thread context of 3344 4536 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 313 PID 3344 set thread context of 2784 3344 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 356 PID 2784 set thread context of 5012 2784 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 445 PID 5012 set thread context of 528 5012 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 239 PID 528 set thread context of 2384 528 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 540 PID 2384 set thread context of 1556 2384 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 158 PID 1556 set thread context of 5096 1556 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 509 PID 5096 set thread context of 4072 5096 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 163 PID 4072 set thread context of 3024 4072 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 488 PID 3024 set thread context of 904 3024 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 455 PID 904 set thread context of 4076 904 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 620 PID 4076 set thread context of 464 4076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 716 PID 464 set thread context of 2916 464 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 347 PID 2916 set thread context of 4092 2916 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 665 PID 4092 set thread context of 3076 4092 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 735 PID 3076 set thread context of 2568 3076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 182 PID 2568 set thread context of 2120 2568 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 832 PID 2120 set thread context of 3716 2120 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 904 PID 3716 set thread context of 4976 3716 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 518 PID 4976 set thread context of 3416 4976 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 960 PID 3416 set thread context of 996 3416 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 192 PID 996 set thread context of 2832 996 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 1016 PID 2832 set thread context of 1048 2832 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 197 PID 1048 set thread context of 2300 1048 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 200 PID 2300 set thread context of 848 2300 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 923 PID 848 set thread context of 3600 848 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 811 PID 3600 set thread context of 3020 3600 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 942 PID 3020 set thread context of 560 3020 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 955 PID 560 set thread context of 4252 560 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 988 PID 4252 set thread context of 5100 4252 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 538 PID 5100 set thread context of 1632 5100 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 873 PID 1632 set thread context of 4488 1632 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 1066 PID 4488 set thread context of 324 4488 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 1211 PID 324 set thread context of 1012 324 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 986 -
Program crash 64 IoCs
pid pid_target Process procid_target 4788 3608 WerFault.exe 82 3192 4880 WerFault.exe 88 848 4032 WerFault.exe 84 3108 3264 WerFault.exe 86 3104 1192 WerFault.exe 128 3176 852 WerFault.exe 131 696 5048 WerFault.exe 135 3140 2784 WerFault.exe 150 1044 3796 WerFault.exe 136 824 4072 WerFault.exe 163 1536 3024 WerFault.exe 165 4188 2120 WerFault.exe 186 4948 3416 WerFault.exe 191 4192 1048 WerFault.exe 197 1400 4252 WerFault.exe 210 4480 4488 WerFault.exe 218 4364 324 WerFault.exe 221 872 4496 WerFault.exe 236 740 528 WerFault.exe 239 4776 2668 WerFault.exe 257 4628 1132 WerFault.exe 259 1984 3960 WerFault.exe 275 1568 4864 WerFault.exe 278 2776 1892 WerFault.exe 297 3312 4160 WerFault.exe 305 384 3868 WerFault.exe 319 1700 2552 WerFault.exe 321 3384 5076 WerFault.exe 338 1404 2356 WerFault.exe 342 3264 4092 WerFault.exe 366 5008 3356 WerFault.exe 363 4128 2496 WerFault.exe 371 432 4664 WerFault.exe 378 4068 1624 WerFault.exe 392 3508 312 WerFault.exe 397 4896 376 WerFault.exe 396 5060 1856 WerFault.exe 407 2692 2936 WerFault.exe 421 4464 1076 WerFault.exe 436 2028 5064 WerFault.exe 435 4632 4616 WerFault.exe 450 1132 3604 WerFault.exe 462 4460 4820 WerFault.exe 463 2232 5020 WerFault.exe 473 4864 3024 WerFault.exe 488 1892 2840 WerFault.exe 504 2576 3244 WerFault.exe 514 2420 1568 WerFault.exe 500 2112 4988 WerFault.exe 529 3736 4828 WerFault.exe 536 2092 2304 WerFault.exe 542 3188 4640 WerFault.exe 550 3444 856 WerFault.exe 566 2516 4468 WerFault.exe 563 4276 4056 WerFault.exe 579 3312 464 WerFault.exe 593 2784 3660 WerFault.exe 595 4016 1044 WerFault.exe 603 1388 3724 WerFault.exe 619 4188 2832 WerFault.exe 627 4740 1596 WerFault.exe 624 4084 1760 WerFault.exe 638 2124 5056 WerFault.exe 661 852 4092 WerFault.exe 665 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1552 wrote to memory of 3608 1552 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 82 PID 1552 wrote to memory of 3608 1552 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 82 PID 1552 wrote to memory of 3608 1552 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 82 PID 1552 wrote to memory of 3608 1552 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 82 PID 3608 wrote to memory of 4032 3608 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 84 PID 3608 wrote to memory of 4032 3608 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 84 PID 3608 wrote to memory of 4032 3608 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 84 PID 3608 wrote to memory of 4032 3608 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 84 PID 4032 wrote to memory of 3600 4032 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 85 PID 4032 wrote to memory of 3600 4032 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 85 PID 4032 wrote to memory of 3600 4032 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 85 PID 4032 wrote to memory of 3600 4032 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 85 PID 3600 wrote to memory of 3264 3600 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 86 PID 3600 wrote to memory of 3264 3600 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 86 PID 3600 wrote to memory of 3264 3600 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 86 PID 3600 wrote to memory of 3264 3600 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 86 PID 3264 wrote to memory of 1892 3264 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 87 PID 3264 wrote to memory of 1892 3264 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 87 PID 3264 wrote to memory of 1892 3264 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 87 PID 3264 wrote to memory of 1892 3264 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 87 PID 1892 wrote to memory of 4880 1892 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 88 PID 1892 wrote to memory of 4880 1892 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 88 PID 1892 wrote to memory of 4880 1892 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 88 PID 1892 wrote to memory of 4880 1892 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 88 PID 4880 wrote to memory of 3732 4880 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 92 PID 4880 wrote to memory of 3732 4880 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 92 PID 4880 wrote to memory of 3732 4880 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 92 PID 4880 wrote to memory of 3732 4880 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 92 PID 3732 wrote to memory of 4896 3732 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 97 PID 3732 wrote to memory of 4896 3732 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 97 PID 3732 wrote to memory of 4896 3732 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 97 PID 3732 wrote to memory of 4896 3732 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 97 PID 4896 wrote to memory of 3960 4896 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 98 PID 4896 wrote to memory of 3960 4896 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 98 PID 4896 wrote to memory of 3960 4896 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 98 PID 4896 wrote to memory of 3960 4896 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 98 PID 3960 wrote to memory of 2936 3960 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 100 PID 3960 wrote to memory of 2936 3960 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 100 PID 3960 wrote to memory of 2936 3960 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 100 PID 3960 wrote to memory of 2936 3960 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 100 PID 2936 wrote to memory of 3076 2936 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 102 PID 2936 wrote to memory of 3076 2936 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 102 PID 2936 wrote to memory of 3076 2936 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 102 PID 2936 wrote to memory of 3076 2936 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 102 PID 3076 wrote to memory of 2356 3076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 104 PID 3076 wrote to memory of 2356 3076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 104 PID 3076 wrote to memory of 2356 3076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 104 PID 3076 wrote to memory of 2356 3076 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 104 PID 2356 wrote to memory of 2668 2356 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 105 PID 2356 wrote to memory of 2668 2356 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 105 PID 2356 wrote to memory of 2668 2356 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 105 PID 2356 wrote to memory of 2668 2356 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 105 PID 2668 wrote to memory of 2120 2668 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 107 PID 2668 wrote to memory of 2120 2668 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 107 PID 2668 wrote to memory of 2120 2668 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 107 PID 2668 wrote to memory of 2120 2668 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 107 PID 2120 wrote to memory of 2292 2120 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 110 PID 2120 wrote to memory of 2292 2120 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 110 PID 2120 wrote to memory of 2292 2120 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 110 PID 2120 wrote to memory of 2292 2120 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 110 PID 2292 wrote to memory of 2104 2292 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 115 PID 2292 wrote to memory of 2104 2292 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 115 PID 2292 wrote to memory of 2104 2292 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 115 PID 2292 wrote to memory of 2104 2292 30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe9⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe10⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe11⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe12⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe13⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe14⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe15⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe16⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe17⤵
- Suspicious use of SetThreadContext
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe18⤵
- Suspicious use of SetThreadContext
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe19⤵
- Suspicious use of SetThreadContext
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe20⤵
- Suspicious use of SetThreadContext
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe21⤵
- Suspicious use of SetThreadContext
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe22⤵
- Suspicious use of SetThreadContext
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe23⤵
- Suspicious use of SetThreadContext
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe24⤵
- Suspicious use of SetThreadContext
PID:852 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe25⤵
- Suspicious use of SetThreadContext
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe26⤵
- Suspicious use of SetThreadContext
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe27⤵
- Suspicious use of SetThreadContext
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe28⤵
- Suspicious use of SetThreadContext
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe29⤵
- Suspicious use of SetThreadContext
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe30⤵
- Suspicious use of SetThreadContext
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe31⤵
- Suspicious use of SetThreadContext
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe32⤵
- Suspicious use of SetThreadContext
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe33⤵
- Suspicious use of SetThreadContext
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe34⤵
- Suspicious use of SetThreadContext
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe35⤵
- Suspicious use of SetThreadContext
PID:528 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe36⤵
- Suspicious use of SetThreadContext
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe37⤵
- Suspicious use of SetThreadContext
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe38⤵
- Suspicious use of SetThreadContext
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe39⤵
- Suspicious use of SetThreadContext
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe40⤵
- Suspicious use of SetThreadContext
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe41⤵
- Suspicious use of SetThreadContext
PID:904 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe42⤵
- Suspicious use of SetThreadContext
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe43⤵
- Suspicious use of SetThreadContext
PID:464 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe44⤵
- Suspicious use of SetThreadContext
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe45⤵
- Suspicious use of SetThreadContext
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe46⤵
- Suspicious use of SetThreadContext
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe47⤵
- Suspicious use of SetThreadContext
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe48⤵
- Suspicious use of SetThreadContext
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe49⤵
- Suspicious use of SetThreadContext
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe50⤵
- Suspicious use of SetThreadContext
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe51⤵
- Suspicious use of SetThreadContext
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe52⤵
- Suspicious use of SetThreadContext
PID:996 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe53⤵
- Suspicious use of SetThreadContext
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe54⤵
- Suspicious use of SetThreadContext
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe55⤵
- Suspicious use of SetThreadContext
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe56⤵
- Suspicious use of SetThreadContext
PID:848 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe57⤵
- Suspicious use of SetThreadContext
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe58⤵
- Suspicious use of SetThreadContext
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe59⤵
- Suspicious use of SetThreadContext
PID:560 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe60⤵
- Suspicious use of SetThreadContext
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe61⤵
- Suspicious use of SetThreadContext
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe62⤵
- Suspicious use of SetThreadContext
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe63⤵
- Suspicious use of SetThreadContext
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe64⤵
- Suspicious use of SetThreadContext
PID:324 -
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe65⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe66⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe67⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe68⤵PID:696
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe69⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe70⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe71⤵PID:4496
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe72⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe73⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe74⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe75⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe76⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe77⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe78⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe79⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe80⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe81⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe82⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe83⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe84⤵PID:3348
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe85⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe86⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe87⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe88⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe89⤵PID:3960
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe90⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe91⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe92⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe93⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe94⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe95⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe96⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe97⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe98⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe99⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe100⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe101⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe102⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe103⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe104⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe105⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe106⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe107⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe108⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe109⤵PID:3868
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe110⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe111⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe112⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe113⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe114⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe115⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe116⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe117⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe118⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe119⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe120⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe121⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\30744fef2eb151a8f419b86c1ca56139_JaffaCakes118.exe122⤵PID:4180
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-