Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 13:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe
Resource
win7-20240704-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
2 signatures
150 seconds
General
-
Target
964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe
-
Size
395KB
-
MD5
964810c1a44ce740642f5c48e27f197c
-
SHA1
a35d48c2d6284a39822033fe21ef24a056603015
-
SHA256
65c3685662e5b9954eb6d23d2a3f5742aa986c353747ca487dbef4f7d0cdaee4
-
SHA512
582deb2721560742381617e81bca541caf71513817de03d71ad79caf19b987fca58b015ba5f3671f09771d21d2c5496e589dfa1b8a604de47ea6217fed00db59
-
SSDEEP
12288:9Mr1Kd/7fFM+igtSB984b12RoT5miIruzopvg2:9MrAdi+irXb1zIrxg2
Score
5/10
Malware Config
Signatures
-
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1732 set thread context of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 2332 set thread context of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2788 set thread context of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2772 set thread context of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2664 set thread context of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 3064 set thread context of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 2120 set thread context of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 1084 set thread context of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 2544 set thread context of 2956 2544 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 38 PID 2956 set thread context of 940 2956 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 39 PID 940 set thread context of 1984 940 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 40 PID 1984 set thread context of 2424 1984 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 41 PID 2424 set thread context of 1196 2424 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 42 PID 1196 set thread context of 960 1196 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 43 PID 960 set thread context of 1900 960 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 44 PID 1900 set thread context of 3008 1900 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 45 PID 3008 set thread context of 1772 3008 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 46 PID 1772 set thread context of 1636 1772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 47 PID 1636 set thread context of 1920 1636 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 48 PID 1920 set thread context of 864 1920 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 49 PID 864 set thread context of 1596 864 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 50 PID 1596 set thread context of 2840 1596 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 51 PID 2840 set thread context of 2768 2840 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 52 PID 2768 set thread context of 2868 2768 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 53 PID 2868 set thread context of 2636 2868 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 54 PID 2636 set thread context of 2644 2636 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 55 PID 2644 set thread context of 1528 2644 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 56 PID 1528 set thread context of 2404 1528 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 57 PID 2404 set thread context of 2484 2404 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 58 PID 2484 set thread context of 660 2484 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 59 PID 660 set thread context of 928 660 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 60 PID 928 set thread context of 2036 928 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 61 PID 2036 set thread context of 2232 2036 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 62 PID 2232 set thread context of 2136 2232 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 63 PID 2136 set thread context of 2216 2136 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 64 PID 2216 set thread context of 900 2216 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 65 PID 900 set thread context of 1072 900 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 66 PID 1072 set thread context of 520 1072 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 67 PID 520 set thread context of 1064 520 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 68 PID 1064 set thread context of 2456 1064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 69 PID 2456 set thread context of 692 2456 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 70 PID 692 set thread context of 2080 692 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 71 PID 2080 set thread context of 2224 2080 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 72 PID 2224 set thread context of 2784 2224 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 73 PID 2784 set thread context of 2896 2784 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 74 PID 2896 set thread context of 2872 2896 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 75 PID 2872 set thread context of 2676 2872 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 76 PID 2676 set thread context of 576 2676 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 77 PID 576 set thread context of 1432 576 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 78 PID 1432 set thread context of 3064 1432 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 79 PID 3064 set thread context of 1460 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 80 PID 1460 set thread context of 1864 1460 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 81 PID 1864 set thread context of 1736 1864 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 82 PID 1736 set thread context of 1560 1736 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 83 PID 1560 set thread context of 848 1560 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 84 PID 848 set thread context of 2276 848 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 85 PID 2276 set thread context of 884 2276 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 86 PID 884 set thread context of 1784 884 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 87 PID 1784 set thread context of 2540 1784 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 88 PID 2540 set thread context of 2412 2540 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 89 PID 2412 set thread context of 640 2412 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 90 PID 640 set thread context of 1952 640 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 91 PID 1952 set thread context of 1956 1952 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 92 PID 1956 set thread context of 1060 1956 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 93 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2544 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2956 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 940 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1984 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2424 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1196 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 960 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1900 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 3008 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1636 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1920 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 864 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1596 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2840 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2768 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2868 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2636 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2644 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1528 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2404 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2484 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 660 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 928 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2036 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2232 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2136 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2216 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 900 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1072 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 520 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2456 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 692 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2080 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2224 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2784 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2896 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2872 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2676 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 576 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1432 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1460 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1864 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1736 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1560 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 848 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2276 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 884 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1784 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2540 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 2412 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 640 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1952 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe Token: SeDebugPrivilege 1956 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 1732 wrote to memory of 2332 1732 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 30 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2332 wrote to memory of 2788 2332 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 31 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2788 wrote to memory of 2772 2788 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2772 wrote to memory of 2664 2772 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 33 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 2664 wrote to memory of 3064 2664 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 34 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 3064 wrote to memory of 2120 3064 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 35 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 2120 wrote to memory of 1084 2120 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 36 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37 PID 1084 wrote to memory of 2544 1084 964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe2⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe3⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe4⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe5⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe6⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe7⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe8⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe9⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe10⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe11⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:940 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe12⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe13⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe14⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe15⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:960 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe16⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe17⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe18⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe19⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe20⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe21⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe22⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe23⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe24⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe25⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe26⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe27⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe28⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe29⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe30⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe31⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:660 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe32⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:928 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe33⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe34⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe35⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe36⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe37⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:900 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe38⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe39⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:520 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe40⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe41⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe42⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:692 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe43⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe44⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe45⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe46⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe47⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe48⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe49⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:576 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe50⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe51⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe52⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe53⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe54⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe55⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe56⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe57⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe58⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe59⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe60⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe61⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe62⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe63⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe64⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe65⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe66⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe67⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe68⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe69⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe70⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe71⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe72⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe73⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe74⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe75⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe76⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe77⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe78⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe79⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe80⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe81⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe82⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe83⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe84⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe85⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe86⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe87⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe88⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe89⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe90⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe91⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe92⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe93⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe94⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe95⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe96⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe97⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe98⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe99⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe100⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe101⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe102⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe103⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe104⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe105⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe106⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe107⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe108⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe109⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe110⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe111⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe112⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe113⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe114⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe115⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe116⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe117⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe118⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe119⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe120⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe121⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\964810c1a44ce740642f5c48e27f197c_JaffaCakes118.exe122⤵PID:432
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-