Analysis
-
max time kernel
150s -
max time network
63s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 10:05
Static task
static1
Behavioral task
behavioral1
Sample
a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe
-
Size
211KB
-
MD5
a21f61fc9870af66d5cbeb8578fcb57d
-
SHA1
09144ec09f6e92a5c918cf2153c72c011d0855e4
-
SHA256
c949b846121b17c66e65b196e24872ba117861dfe41a491e3ee361d26092eec0
-
SHA512
964563f97753e8e5568dad77b85258ce2eee57f4820070c009da54e7d983809646beaf39c0161883207cf6f09a9eb28176fcb7c3fb277daee43e5c7b7fbc9472
-
SSDEEP
3072:bmHPiWYu4h+O+Dg1F7Y0qSZLalC59pb33xjqVbTBtlyAjH:b4TYu6+OzZlaA59p9GVptlyS
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (53) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Control Panel\International\Geo\Nation KowgUUEo.exe -
Deletes itself 1 IoCs
pid Process 1960 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2212 KowgUUEo.exe 2936 rocwUEkU.exe -
Loads dropped DLL 20 IoCs
pid Process 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KowgUUEo.exe = "C:\\Users\\Admin\\VoYoUgcA\\KowgUUEo.exe" a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rocwUEkU.exe = "C:\\ProgramData\\ieIAUoUM\\rocwUEkU.exe" a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\KowgUUEo.exe = "C:\\Users\\Admin\\VoYoUgcA\\KowgUUEo.exe" KowgUUEo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\rocwUEkU.exe = "C:\\ProgramData\\ieIAUoUM\\rocwUEkU.exe" rocwUEkU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2900 reg.exe 2012 reg.exe 2868 reg.exe 1824 reg.exe 2760 reg.exe 852 reg.exe 2180 reg.exe 1948 reg.exe 1908 reg.exe 1384 reg.exe 2784 reg.exe 2900 reg.exe 2664 reg.exe 2184 reg.exe 1628 reg.exe 3044 reg.exe 2776 reg.exe 264 reg.exe 1900 reg.exe 2416 reg.exe 584 reg.exe 852 reg.exe 2776 reg.exe 900 reg.exe 1880 reg.exe 2512 reg.exe 2080 reg.exe 2240 reg.exe 976 reg.exe 2712 reg.exe 2008 reg.exe 2408 reg.exe 1180 reg.exe 1104 reg.exe 1532 reg.exe 2100 reg.exe 1104 reg.exe 336 reg.exe 2952 reg.exe 1756 reg.exe 1932 reg.exe 3024 reg.exe 2852 reg.exe 2864 reg.exe 2412 reg.exe 2756 reg.exe 2396 reg.exe 2196 reg.exe 1000 reg.exe 2528 reg.exe 2972 reg.exe 2912 reg.exe 2804 reg.exe 2760 reg.exe 2512 reg.exe 2752 reg.exe 1384 reg.exe 2476 reg.exe 2308 reg.exe 1000 reg.exe 1668 reg.exe 1748 reg.exe 1748 reg.exe 3048 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2232 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2232 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2668 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2668 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 896 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 896 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2236 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2236 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 884 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 884 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 292 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 292 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3024 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3024 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2120 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2120 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 908 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 908 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2040 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2040 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2556 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2556 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2904 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2904 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2664 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2664 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 888 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 888 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1604 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1604 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2128 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2128 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1692 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1692 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2276 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2276 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1724 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1724 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2396 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2396 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 296 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 296 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1496 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1496 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2988 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2988 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3036 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 3036 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 676 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 676 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1156 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1156 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1740 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1740 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1924 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 1924 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2756 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 2756 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 768 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 768 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2212 KowgUUEo.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe 2212 KowgUUEo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2212 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2212 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2212 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2212 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 30 PID 3000 wrote to memory of 2936 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2936 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2936 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2936 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 31 PID 3000 wrote to memory of 2808 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2808 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2808 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2808 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 32 PID 3000 wrote to memory of 2200 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 34 PID 3000 wrote to memory of 2200 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 34 PID 3000 wrote to memory of 2200 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 34 PID 3000 wrote to memory of 2200 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 34 PID 3000 wrote to memory of 2708 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 35 PID 3000 wrote to memory of 2708 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 35 PID 3000 wrote to memory of 2708 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 35 PID 3000 wrote to memory of 2708 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 35 PID 3000 wrote to memory of 3020 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 36 PID 3000 wrote to memory of 3020 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 36 PID 3000 wrote to memory of 3020 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 36 PID 3000 wrote to memory of 3020 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 36 PID 2808 wrote to memory of 2832 2808 cmd.exe 38 PID 2808 wrote to memory of 2832 2808 cmd.exe 38 PID 2808 wrote to memory of 2832 2808 cmd.exe 38 PID 2808 wrote to memory of 2832 2808 cmd.exe 38 PID 3000 wrote to memory of 2956 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 39 PID 3000 wrote to memory of 2956 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 39 PID 3000 wrote to memory of 2956 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 39 PID 3000 wrote to memory of 2956 3000 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 39 PID 2956 wrote to memory of 2148 2956 cmd.exe 43 PID 2956 wrote to memory of 2148 2956 cmd.exe 43 PID 2956 wrote to memory of 2148 2956 cmd.exe 43 PID 2956 wrote to memory of 2148 2956 cmd.exe 43 PID 2832 wrote to memory of 2204 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 44 PID 2832 wrote to memory of 2204 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 44 PID 2832 wrote to memory of 2204 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 44 PID 2832 wrote to memory of 2204 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 44 PID 2204 wrote to memory of 2232 2204 cmd.exe 46 PID 2204 wrote to memory of 2232 2204 cmd.exe 46 PID 2204 wrote to memory of 2232 2204 cmd.exe 46 PID 2204 wrote to memory of 2232 2204 cmd.exe 46 PID 2832 wrote to memory of 1384 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 47 PID 2832 wrote to memory of 1384 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 47 PID 2832 wrote to memory of 1384 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 47 PID 2832 wrote to memory of 1384 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 47 PID 2832 wrote to memory of 2328 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 48 PID 2832 wrote to memory of 2328 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 48 PID 2832 wrote to memory of 2328 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 48 PID 2832 wrote to memory of 2328 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 48 PID 2832 wrote to memory of 2900 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 50 PID 2832 wrote to memory of 2900 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 50 PID 2832 wrote to memory of 2900 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 50 PID 2832 wrote to memory of 2900 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 50 PID 2832 wrote to memory of 1512 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 51 PID 2832 wrote to memory of 1512 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 51 PID 2832 wrote to memory of 1512 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 51 PID 2832 wrote to memory of 1512 2832 a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe 51 PID 1512 wrote to memory of 2372 1512 cmd.exe 55 PID 1512 wrote to memory of 2372 1512 cmd.exe 55 PID 1512 wrote to memory of 2372 1512 cmd.exe 55 PID 1512 wrote to memory of 2372 1512 cmd.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\VoYoUgcA\KowgUUEo.exe"C:\Users\Admin\VoYoUgcA\KowgUUEo.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2212
-
-
C:\ProgramData\ieIAUoUM\rocwUEkU.exe"C:\ProgramData\ieIAUoUM\rocwUEkU.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2936
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
PID:2232 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"6⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:2668 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"8⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"10⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:2236 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"12⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"14⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:292 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"16⤵
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"18⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"20⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11821⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"22⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:2040 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"24⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2556 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"26⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"28⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"30⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"32⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11833⤵
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"34⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11835⤵
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"36⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11837⤵
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"38⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11839⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"40⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11841⤵
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"42⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11843⤵
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"44⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11845⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"46⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11847⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"48⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"50⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11851⤵
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"52⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11853⤵
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"54⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11855⤵
- Suspicious behavior: EnumeratesProcesses
PID:1156 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"56⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11857⤵
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"58⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11859⤵
- Suspicious behavior: EnumeratesProcesses
PID:1924 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"60⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11861⤵
- Suspicious behavior: EnumeratesProcesses
PID:2756 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"62⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11863⤵
- Suspicious behavior: EnumeratesProcesses
PID:768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"64⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11865⤵PID:1068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"66⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11867⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"68⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11869⤵PID:2696
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"70⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11871⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"72⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11873⤵PID:1664
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"74⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11875⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"76⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11877⤵PID:768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"78⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11879⤵PID:1344
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"80⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11881⤵PID:2744
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"82⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11883⤵PID:976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"84⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11885⤵PID:2792
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"86⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11887⤵PID:1768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"88⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11889⤵PID:2756
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"90⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11891⤵
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"92⤵
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11893⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"94⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11895⤵PID:2288
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"96⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11897⤵PID:1236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"98⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes11899⤵PID:1988
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"100⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118101⤵PID:2144
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"102⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118103⤵PID:1924
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"104⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118105⤵PID:2948
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"106⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118107⤵PID:2856
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"108⤵
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118109⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"110⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118111⤵PID:1360
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"112⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118113⤵PID:1692
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"114⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118115⤵PID:2760
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"116⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118117⤵PID:3016
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"118⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118119⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"120⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118121⤵PID:1676
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\a21f61fc9870af66d5cbeb8578fcb57d_JaffaCakes118"122⤵PID:1652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-