Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13-07-2024 09:42
Static task
static1
Behavioral task
behavioral1
Sample
4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe
-
Size
541KB
-
MD5
4127d92b1e184c0052fecaf362d7d6af
-
SHA1
ff8c451ceb00046d0e3a8c98a89f97900769c527
-
SHA256
05bfad4aaf8431c0e2c5bbf8945219c4bbe827103c2532142928e0e5a83e4cca
-
SHA512
b283cf9810b2f86b61acee86542bb1dc528c1fa27d12def08802dd7c32e9da24d5c90d9270f16e34287f88b8d10b86dfb86503bd13f36a32b34cc63f84f4baff
-
SSDEEP
12288:HIXBT2btYxAmU3d/0oYDQY8dG/Yv1TqPwc9dOLYsvlyTdEYx:CBT2beXD85v1B6+EDx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 3912 ctf_mon.exe 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4624 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4664 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3760 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 8 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4064 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2464 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2504 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3432 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1260 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1752 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3372 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1492 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1812 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3536 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2088 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4808 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1600 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1180 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 800 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 968 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 5040 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4812 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3560 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4156 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 212 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3064 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3940 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2988 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1012 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2992 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3148 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4168 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4640 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3612 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2900 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3944 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3488 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3860 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 3492 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4392 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4984 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1260 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 960 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1524 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 5008 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 1864 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 2100 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 5076 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4072 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4344 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4120 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 4416 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 5096 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ctf_mon = "\"C:\\RECYCLER\\ctf_mon.exe\"" ctf_mon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cft_mon = "\"C:\\RECYCLER\\ctf_mon.exe\"" ctf_mon.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: ctf_mon.exe File opened (read-only) \??\K: ctf_mon.exe File opened (read-only) \??\M: ctf_mon.exe File opened (read-only) \??\Q: ctf_mon.exe File opened (read-only) \??\S: ctf_mon.exe File opened (read-only) \??\B: ctf_mon.exe File opened (read-only) \??\E: ctf_mon.exe File opened (read-only) \??\I: ctf_mon.exe File opened (read-only) \??\Y: ctf_mon.exe File opened (read-only) \??\W: ctf_mon.exe File opened (read-only) \??\X: ctf_mon.exe File opened (read-only) \??\Z: ctf_mon.exe File opened (read-only) \??\L: ctf_mon.exe File opened (read-only) \??\T: ctf_mon.exe File opened (read-only) \??\U: ctf_mon.exe File opened (read-only) \??\O: ctf_mon.exe File opened (read-only) \??\P: ctf_mon.exe File opened (read-only) \??\R: ctf_mon.exe File opened (read-only) \??\V: ctf_mon.exe File opened (read-only) \??\G: ctf_mon.exe File opened (read-only) \??\H: ctf_mon.exe File opened (read-only) \??\N: ctf_mon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 832 ipconfig.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Office document contains embedded OLE objects 2 IoCs
Detected embedded OLE objects in Office documents.
resource yara_rule behavioral2/files/0x00080000000234ab-3.dat office_ole_embedded behavioral2/files/0x00070000000234ad-9.dat office_ole_embedded -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4448 PING.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 13388 dwm.exe Token: SeChangeNotifyPrivilege 13388 dwm.exe Token: 33 13388 dwm.exe Token: SeIncBasePriorityPrivilege 13388 dwm.exe Token: SeShutdownPrivilege 13388 dwm.exe Token: SeCreatePagefilePrivilege 13388 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4704 wrote to memory of 3912 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 83 PID 4704 wrote to memory of 3912 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 83 PID 4704 wrote to memory of 3912 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 83 PID 3912 wrote to memory of 1500 3912 ctf_mon.exe 85 PID 3912 wrote to memory of 1500 3912 ctf_mon.exe 85 PID 3912 wrote to memory of 1500 3912 ctf_mon.exe 85 PID 3912 wrote to memory of 2264 3912 ctf_mon.exe 87 PID 3912 wrote to memory of 2264 3912 ctf_mon.exe 87 PID 3912 wrote to memory of 2264 3912 ctf_mon.exe 87 PID 4704 wrote to memory of 904 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 89 PID 4704 wrote to memory of 904 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 89 PID 4704 wrote to memory of 904 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 89 PID 4704 wrote to memory of 4980 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 90 PID 4704 wrote to memory of 4980 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 90 PID 4704 wrote to memory of 4980 4704 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 90 PID 904 wrote to memory of 1820 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 92 PID 904 wrote to memory of 1820 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 92 PID 904 wrote to memory of 1820 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 92 PID 904 wrote to memory of 732 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 93 PID 904 wrote to memory of 732 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 93 PID 904 wrote to memory of 732 904 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 93 PID 1820 wrote to memory of 3020 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 95 PID 1820 wrote to memory of 3020 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 95 PID 1820 wrote to memory of 3020 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 95 PID 1820 wrote to memory of 2852 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 96 PID 1820 wrote to memory of 2852 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 96 PID 1820 wrote to memory of 2852 1820 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 96 PID 3020 wrote to memory of 1332 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 97 PID 3020 wrote to memory of 1332 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 97 PID 3020 wrote to memory of 1332 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 97 PID 3020 wrote to memory of 4280 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 98 PID 3020 wrote to memory of 4280 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 98 PID 3020 wrote to memory of 4280 3020 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 98 PID 1332 wrote to memory of 4316 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 101 PID 1332 wrote to memory of 4316 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 101 PID 1332 wrote to memory of 4316 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 101 PID 1332 wrote to memory of 4376 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 102 PID 1332 wrote to memory of 4376 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 102 PID 1332 wrote to memory of 4376 1332 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 102 PID 4316 wrote to memory of 1032 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 104 PID 4316 wrote to memory of 1032 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 104 PID 4316 wrote to memory of 1032 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 104 PID 4316 wrote to memory of 2848 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 105 PID 4316 wrote to memory of 2848 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 105 PID 4316 wrote to memory of 2848 4316 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 105 PID 1032 wrote to memory of 2712 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 107 PID 1032 wrote to memory of 2712 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 107 PID 1032 wrote to memory of 2712 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 107 PID 1032 wrote to memory of 3224 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 108 PID 1032 wrote to memory of 3224 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 108 PID 1032 wrote to memory of 3224 1032 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 108 PID 2712 wrote to memory of 4624 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 109 PID 2712 wrote to memory of 4624 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 109 PID 2712 wrote to memory of 4624 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 109 PID 2712 wrote to memory of 2860 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 110 PID 2712 wrote to memory of 2860 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 110 PID 2712 wrote to memory of 2860 2712 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 110 PID 3912 wrote to memory of 2628 3912 ctf_mon.exe 111 PID 3912 wrote to memory of 2628 3912 ctf_mon.exe 111 PID 3912 wrote to memory of 2628 3912 ctf_mon.exe 111 PID 2628 wrote to memory of 832 2628 cmd.exe 113 PID 2628 wrote to memory of 832 2628 cmd.exe 113 PID 2628 wrote to memory of 832 2628 cmd.exe 113 PID 4624 wrote to memory of 4020 4624 4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\RECYCLER\ctf_mon.exeC:\RECYCLER\ctf_mon.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\cmd.exe/c dir "C:\*." /a >> "C:\RECYCLER\ONNGJIJU\240629281.log"3⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exe/c dir "C:\Program Files (x86)\*." /s /a >> "C:\RECYCLER\ONNGJIJU\240629375.log"3⤵PID:2264
-
-
C:\Windows\SysWOW64\cmd.exe/c ipconfig -all >> "C:\RECYCLER\ONNGJIJU\240630406.log"3⤵
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\ipconfig.exeipconfig -all4⤵
- Gathers network information
PID:832
-
-
-
C:\Windows\SysWOW64\cmd.exe/c ping www.google.com >> "C:\RECYCLER\ONNGJIJU\240630500.log"3⤵PID:2372
-
C:\Windows\SysWOW64\PING.EXEping www.google.com4⤵
- Runs ping.exe
PID:4448
-
-
-
C:\Windows\SysWOW64\cmd.exe/c dir "C:\*." /s >> "C:\RECYCLER\ONNGJIJU\240633796.log"3⤵PID:4516
-
-
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"10⤵
- Executes dropped EXE
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"11⤵
- Executes dropped EXE
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"12⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"13⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"14⤵
- Executes dropped EXE
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"15⤵
- Executes dropped EXE
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"16⤵
- Executes dropped EXE
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"17⤵
- Executes dropped EXE
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"18⤵
- Executes dropped EXE
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"19⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"20⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"21⤵
- Executes dropped EXE
PID:3372 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"23⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"24⤵
- Executes dropped EXE
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"25⤵
- Executes dropped EXE
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"26⤵
- Executes dropped EXE
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"27⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"28⤵
- Executes dropped EXE
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"29⤵
- Executes dropped EXE
PID:800 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"30⤵
- Executes dropped EXE
PID:904 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:968 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"32⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"33⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:4156 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"36⤵
- Executes dropped EXE
PID:212 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"38⤵
- Executes dropped EXE
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"39⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"40⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"41⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"42⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"43⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"44⤵
- Executes dropped EXE
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"45⤵
- Executes dropped EXE
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"46⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"47⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"48⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"49⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"50⤵
- Executes dropped EXE
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"52⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"54⤵
- Executes dropped EXE
PID:960 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"55⤵
- Executes dropped EXE
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"57⤵
- Executes dropped EXE
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"58⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"59⤵
- Executes dropped EXE
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"60⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"62⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"65⤵
- Checks computer location settings
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"66⤵PID:4664
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"67⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"68⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"69⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"70⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"71⤵
- Checks computer location settings
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"72⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"73⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"74⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"75⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"76⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"77⤵
- Checks computer location settings
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"78⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"79⤵
- Checks computer location settings
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"80⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"81⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"82⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"83⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"84⤵
- Checks computer location settings
PID:904 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"85⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"86⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"87⤵PID:3652
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"88⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"89⤵
- Checks computer location settings
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"90⤵
- Checks computer location settings
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"91⤵PID:5228
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"92⤵PID:5284
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"93⤵
- Checks computer location settings
PID:5344 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"94⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"95⤵PID:5460
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"96⤵PID:5520
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"97⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"98⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"99⤵PID:5700
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"100⤵PID:5756
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"101⤵PID:5812
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"102⤵
- Checks computer location settings
PID:5868 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"103⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"104⤵PID:5980
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"105⤵PID:6036
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"106⤵PID:6092
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"107⤵PID:4048
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"108⤵PID:5216
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"109⤵
- Checks computer location settings
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"110⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"111⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"112⤵PID:5504
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"113⤵PID:5540
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"114⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"115⤵PID:5640
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"116⤵PID:5784
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"117⤵PID:5836
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"118⤵PID:5912
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"119⤵PID:5924
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"120⤵PID:6072
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"121⤵PID:6120
-
C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4127d92b1e184c0052fecaf362d7d6af_JaffaCakes118.exe"122⤵
- Checks computer location settings
PID:1184
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-