Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe
-
Size
159KB
-
MD5
adc04b2811c7b78845aa26162dc459b1
-
SHA1
771edc5ad86866160373831b1b6622785fee147b
-
SHA256
d9ef7bac0d284adc4d1cd7f6273d10719132c51349a2026ad8a7fe955c52d6e0
-
SHA512
03ac06f2aa08aaa752235e3720d7c03bad97275dab056e32504b7ca2009f5db6f9a71c9284b2c68a6b864610f87b26fa3e36a2d40e6c0d605aa59d093ad0dcd2
-
SSDEEP
3072:TKb5zN9u8StaSRnYXOlF8rSUb7dRZjVL1FhHX1/O4:Td4ShurSERXLjhVX
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3568 mscomserv.exe 1944 mscomserv.exe 916 mscomserv.exe 1368 mscomserv.exe 3840 mscomserv.exe 4588 mscomserv.exe 1584 mscomserv.exe 4724 mscomserv.exe 636 mscomserv.exe 3464 mscomserv.exe 3376 mscomserv.exe 3480 mscomserv.exe 4260 mscomserv.exe 4288 mscomserv.exe 2732 mscomserv.exe 1796 mscomserv.exe 1676 mscomserv.exe 4356 mscomserv.exe 3008 mscomserv.exe 1788 mscomserv.exe 2460 mscomserv.exe 1892 mscomserv.exe 3596 mscomserv.exe 3744 mscomserv.exe 4904 mscomserv.exe 968 mscomserv.exe 1584 mscomserv.exe 4724 mscomserv.exe 3584 mscomserv.exe 2780 mscomserv.exe 468 mscomserv.exe 3288 mscomserv.exe 2776 mscomserv.exe 3432 mscomserv.exe 2732 mscomserv.exe 648 mscomserv.exe 3836 mscomserv.exe 2228 mscomserv.exe 4752 mscomserv.exe 1064 mscomserv.exe 5080 mscomserv.exe 1708 mscomserv.exe 5072 mscomserv.exe 1892 mscomserv.exe 1920 mscomserv.exe 4708 mscomserv.exe 4944 mscomserv.exe 2376 mscomserv.exe 2820 mscomserv.exe 1696 mscomserv.exe 3888 mscomserv.exe 1756 mscomserv.exe 2740 mscomserv.exe 4444 mscomserv.exe 4988 mscomserv.exe 4872 mscomserv.exe 2348 mscomserv.exe 4640 mscomserv.exe 4960 mscomserv.exe 2724 mscomserv.exe 4432 mscomserv.exe 1108 mscomserv.exe 4104 mscomserv.exe 832 mscomserv.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.bin mscomserv.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File created C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\mscomserv.exe adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mscomserv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3640 wrote to memory of 4256 3640 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 85 PID 3640 wrote to memory of 4256 3640 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 85 PID 3640 wrote to memory of 4256 3640 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 85 PID 4256 wrote to memory of 2076 4256 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 90 PID 4256 wrote to memory of 2076 4256 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 90 PID 4256 wrote to memory of 2076 4256 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 90 PID 2076 wrote to memory of 4280 2076 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 93 PID 2076 wrote to memory of 4280 2076 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 93 PID 2076 wrote to memory of 4280 2076 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 93 PID 4280 wrote to memory of 3504 4280 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 97 PID 4280 wrote to memory of 3504 4280 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 97 PID 4280 wrote to memory of 3504 4280 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 97 PID 3504 wrote to memory of 3724 3504 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 101 PID 3504 wrote to memory of 3724 3504 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 101 PID 3504 wrote to memory of 3724 3504 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 101 PID 3724 wrote to memory of 3444 3724 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 103 PID 3724 wrote to memory of 3444 3724 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 103 PID 3724 wrote to memory of 3444 3724 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 103 PID 3444 wrote to memory of 5064 3444 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 106 PID 3444 wrote to memory of 5064 3444 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 106 PID 3444 wrote to memory of 5064 3444 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 106 PID 5064 wrote to memory of 1660 5064 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 108 PID 5064 wrote to memory of 1660 5064 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 108 PID 5064 wrote to memory of 1660 5064 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 108 PID 1660 wrote to memory of 1112 1660 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 110 PID 1660 wrote to memory of 1112 1660 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 110 PID 1660 wrote to memory of 1112 1660 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 110 PID 1112 wrote to memory of 1180 1112 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 114 PID 1112 wrote to memory of 1180 1112 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 114 PID 1112 wrote to memory of 1180 1112 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 114 PID 1180 wrote to memory of 1996 1180 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 116 PID 1180 wrote to memory of 1996 1180 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 116 PID 1180 wrote to memory of 1996 1180 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 116 PID 1996 wrote to memory of 392 1996 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 118 PID 1996 wrote to memory of 392 1996 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 118 PID 1996 wrote to memory of 392 1996 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 118 PID 392 wrote to memory of 2528 392 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 120 PID 392 wrote to memory of 2528 392 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 120 PID 392 wrote to memory of 2528 392 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 120 PID 2528 wrote to memory of 4776 2528 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 122 PID 2528 wrote to memory of 4776 2528 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 122 PID 2528 wrote to memory of 4776 2528 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 122 PID 4776 wrote to memory of 976 4776 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 124 PID 4776 wrote to memory of 976 4776 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 124 PID 4776 wrote to memory of 976 4776 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 124 PID 976 wrote to memory of 3836 976 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 126 PID 976 wrote to memory of 3836 976 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 126 PID 976 wrote to memory of 3836 976 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 126 PID 3836 wrote to memory of 3700 3836 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 128 PID 3836 wrote to memory of 3700 3836 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 128 PID 3836 wrote to memory of 3700 3836 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 128 PID 3700 wrote to memory of 1544 3700 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 130 PID 3700 wrote to memory of 1544 3700 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 130 PID 3700 wrote to memory of 1544 3700 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 130 PID 1544 wrote to memory of 4392 1544 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 132 PID 1544 wrote to memory of 4392 1544 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 132 PID 1544 wrote to memory of 4392 1544 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 132 PID 4392 wrote to memory of 4884 4392 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 134 PID 4392 wrote to memory of 4884 4392 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 134 PID 4392 wrote to memory of 4884 4392 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 134 PID 4884 wrote to memory of 3120 4884 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 136 PID 4884 wrote to memory of 3120 4884 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 136 PID 4884 wrote to memory of 3120 4884 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 136 PID 3120 wrote to memory of 1456 3120 adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe 138
Processes
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea2⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea3⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea5⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea6⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea7⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea8⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea9⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea10⤵
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea11⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea12⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea13⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea14⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea15⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea16⤵
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea17⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea18⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea19⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea20⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea21⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea22⤵
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea23⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea24⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea25⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea26⤵
- Drops file in System32 directory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea27⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea28⤵
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea29⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea30⤵PID:4420
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea31⤵
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea32⤵
- Drops file in System32 directory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea33⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea34⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea35⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea36⤵
- Drops file in System32 directory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea37⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea38⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea39⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea40⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea41⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea42⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea43⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea44⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea45⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea46⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea47⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea48⤵PID:3088
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea49⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea50⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea51⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea52⤵
- Drops file in System32 directory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea53⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea54⤵
- Drops file in System32 directory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea55⤵
- Drops file in System32 directory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea56⤵
- System Location Discovery: System Language Discovery
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea57⤵
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea58⤵
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea59⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea60⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea61⤵
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea62⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea63⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea64⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea65⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea66⤵
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea67⤵
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea68⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea69⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea71⤵
- Drops file in System32 directory
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea72⤵PID:3684
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea73⤵
- Drops file in System32 directory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea74⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea75⤵
- Drops file in System32 directory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea76⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea77⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea78⤵
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea79⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea80⤵
- Drops file in System32 directory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea81⤵
- Drops file in System32 directory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea82⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea83⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea84⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea85⤵
- Drops file in System32 directory
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea86⤵PID:3832
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea87⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea88⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea89⤵
- Drops file in System32 directory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea90⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea91⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea92⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea93⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea94⤵
- Drops file in System32 directory
PID:376 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea95⤵
- Drops file in System32 directory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea96⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea97⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea98⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea99⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea100⤵
- Drops file in System32 directory
PID:708 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea101⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea102⤵
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea103⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea104⤵
- Drops file in System32 directory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea105⤵PID:3404
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea106⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea107⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea108⤵
- System Location Discovery: System Language Discovery
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea109⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea110⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea111⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea112⤵
- Drops file in System32 directory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea113⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea114⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea115⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea116⤵
- Drops file in System32 directory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea117⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea118⤵
- Drops file in System32 directory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea119⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea120⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea121⤵
- Drops file in System32 directory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\adc04b2811c7b78845aa26162dc459b1_JaffaCakes118.exea122⤵PID:1776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-