Analysis
-
max time kernel
17s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/08/2024, 18:55
Static task
static1
Behavioral task
behavioral1
Sample
c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe
-
Size
493KB
-
MD5
c772e73c275f0ebf16b772539188dd53
-
SHA1
0dce12f9887b3e4ac11f1459624e450c455fa4cc
-
SHA256
137cc20abd49dfc1d858183e47c0ac02cb2e52eb970a36e21461792348b3bbc5
-
SHA512
f93dd548b5b5995a230329d2e31cc7f54b5ab99c41529be3ca5cb05994f0999640bff8c0bf8d579bad2f7d6094fd88d5b62b4fa06bad89c7bbb98f3e1d386e2f
-
SSDEEP
12288:zXCNi9BipT7m/f1fBt85q5dL/GLxHyb51kmxBtrpB:2Wy7m/dfOIMLxH4smFz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mssrv32 = "C:\\Windows\\mssrv.exe" c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\L: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\S: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\U: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\X: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\I: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\G: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\O: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\Q: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\T: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\V: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\Y: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\A: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\H: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\M: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\N: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\P: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\R: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\W: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\B: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\K: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\Z: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File opened (read-only) \??\E: c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\italian beastiality handjob hot (!) boots .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\IME\SHARED\brasilian animal voyeur feet mature (Ashley).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\SmbShare\kicking kicking licking lady (Ashley,Curtney).zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\IME\SHARED\asian porn girls .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\System32\LogFiles\Fax\Incoming\russian horse handjob public feet balls .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\FxsTmp\fetish sleeping latex .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\malaysia lesbian beast full movie beautyfull .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\systemprofile\tyrkish cumshot masturbation nipples lady (Britney,Sonja).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\FxsTmp\kicking several models balls .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\PSDesiredStateConfiguration\WebDownloadManager\gay hidden bedroom (Jade).zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SysWOW64\config\systemprofile\xxx [free] ash .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\System32\DriverStore\Temp\canadian porn hidden shower .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files\dotnet\shared\swedish bukkake several models glans .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\Updates\Download\sperm voyeur lady .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\asian beast hardcore [milf] glans .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Common Files\Microsoft Shared\beast voyeur penetration .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Update\Download\hardcore masturbation 40+ .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\Temp\bukkake full movie .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\trambling trambling licking (Sarah,Britney).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\indian beast horse voyeur penetration .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft SQL Server\130\Shared\kicking blowjob lesbian .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Windows Sidebar\Shared Gadgets\african animal cumshot masturbation YEâPSè& .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\Download\action lingerie [free] black hairunshaved .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Common Files\microsoft shared\kicking action several models legs black hairunshaved .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\WindowsApps\Microsoft.WindowsMaps_5.1906.1972.0_x64__8wekyb3d8bbwe\Assets\Images\PrintAndShare\indian sperm gay full movie vagina stockings .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\beast gang bang voyeur (Ashley).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Windows Sidebar\Shared Gadgets\indian porn big hairy (Liz).mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\Templates\lesbian animal lesbian .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft SQL Server\130\Shared\french nude licking femdom .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Program Files (x86)\Google\Temp\gay beast [bangbus] (Jade).zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\ServiceProfiles\LocalService\AppData\Roaming\Microsoft\Windows\Templates\porn sperm full movie (Samantha).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.1_none_f3b35d713ce0fc7f\chinese horse fucking [free] ejaculation .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-manager-shared_31bf3856ad364e35_10.0.19041.1266_none_7916f7558927ae23\cum lesbian beautyfull (Anniston).rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-ime-eashared-ccshared_31bf3856ad364e35_10.0.19041.1_none_8c0b126c198fcf70\blowjob bukkake sleeping castration .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-kjshared_31bf3856ad364e35_10.0.19041.746_none_1bbb9ab9fc52bac9\spanish trambling uncut beautyfull .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_it-it_4c5922428a6f2d08\british gay [milf] YEâPSè& .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1_none_3cfd44d351b1a8ab\japanese sperm animal public sweet (Sandy).rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-m..ineshared.resources_31bf3856ad364e35_10.0.19041.1_en-us_99ddc8ce8d3d6dac\horse sleeping .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\assembly\temp\danish trambling kicking lesbian ejaculation .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_d38ece58f77171b4\asian lesbian lesbian hidden mistress .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-jkshared-roaming_31bf3856ad364e35_10.0.19041.746_none_2212358fc33cc10f\tyrkish fetish beast big beautyfull (Anniston,Sylvia).rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..n-admtmpl.resources_31bf3856ad364e35_10.0.19041.1_es-es_bf79b5fcc06b3128\malaysia cum porn [free] .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_64\Temp\british lesbian sleeping (Curtney,Christine).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\Downloaded Program Files\handjob sperm girls pregnant .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor\porn gay sleeping gorgeoushorny (Ashley).mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\PLA\Templates\brasilian gay uncut legs balls .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.1_none_abfc9db6c377b91f\fetish animal [bangbus] (Sarah).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_b1ffa0e7b4ed03e2\gang bang lesbian [free] (Kathrin,Jenna).mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v2.0.50727_32\Temp\nude [free] (Sarah,Ashley).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_es-es_211cf1c632a13851\american fetish catfight latex .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_fr-fr_c3d467c525734eb3\beast horse [free] (Curtney).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.572_none_cf90e12518baac85\asian xxx fucking big nipples femdom .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared_31bf3856ad364e35_10.0.19041.1_none_bd731e5b85dd203e\malaysia sperm xxx full movie .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_215194e2327a46ac\action fucking sleeping (Jade).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-filemanager_31bf3856ad364e35_10.0.19041.844_none_855aff45853749ef\japanese gang bang several models nipples (Sandy).zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-mccs-engineshared_31bf3856ad364e35_10.0.19041.746_none_d404daff82e97769\norwegian beast sleeping boobs gorgeoushorny .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_it-it_adfc5e0bfca53431\horse gang bang hidden .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-g..olicy-admin-admtmpl_31bf3856ad364e35_10.0.19041.1_none_a7ad1894592cfa12\fucking masturbation cock pregnant .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-hvsi-service-shared_31bf3856ad364e35_10.0.19041.1151_none_fbdc4c5f677dc2ec\action sperm several models sweet .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\mssrv.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\LocalService\Downloads\french fetish lesbian .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SystemApps\Microsoft.Windows.CloudExperienceHost_cw5n1h2txyewy\webapps\inclusiveOobe\view\templates\norwegian horse gay full movie .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_es-es_30d7585a049f5b52\african fucking hidden ash (Sarah,Karin).rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.746_none_ab42fb092bda9182\american beastiality sperm [milf] penetration (Jenna,Christine).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ashared-candidateui_31bf3856ad364e35_10.0.19041.1_none_833abdc06c68d338\lingerie horse uncut glans .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor.Resources\asian blowjob catfight .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5021dd18efc0460c\handjob sperm lesbian boobs .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ces-ime-eashared-lm_31bf3856ad364e35_10.0.19041.1_none_3d0229d17c310f10\spanish beastiality action [free] cock (Kathrin).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..ore-shareexperience_31bf3856ad364e35_10.0.19041.964_none_1c1a193f5bfcf136\american animal cum voyeur leather .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.906_none_ef0e010d1381269b\spanish cum trambling [bangbus] penetration .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.GroupPolicy.AdmTmplEditor\gang bang [bangbus] sm .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_de-de_881b257d159a5de8\fetish animal girls ejaculation .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost_31bf3856ad364e35_10.0.19041.1202_none_621728fcd3c9d5f6\beastiality girls feet pregnant (Liz,Ashley).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.1_none_a80cea873b2a6772\russian lesbian cumshot big YEâPSè& .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..e-eashared-moimeexe_31bf3856ad364e35_10.0.19041.746_none_d01527cffa9c25bc\cumshot sperm [bangbus] .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-nfs-shared.resources_31bf3856ad364e35_10.0.19041.1_en-us_5af076e0a3cb0fa7\black sperm animal hot (!) (Samantha).rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..me-eashared-coretip_31bf3856ad364e35_10.0.19041.1_none_2fe79eae2833b9b1\horse uncut vagina (Karin,Jenna).avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\assembly\NativeImages_v4.0.30319_32\Temp\fucking public hole .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SystemResources\Windows.ShellCommon.SharedResources\nude kicking girls sm .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-p..al-securitytemplate_31bf3856ad364e35_10.0.19041.1_none_a3d9a07cf2290837\canadian handjob hot (!) glans beautyfull (Sonja,Samantha).mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..utionservice-shared_31bf3856ad364e35_10.0.19041.928_none_33e0d5558cdd7c61\canadian gang bang hidden nipples .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_it-it_bdb6c49fcea35732\danish porn hot (!) ejaculation .zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-onecore-sharehost.resources_31bf3856ad364e35_10.0.19041.1_ja-jp_5fdc43acc1be690d\sperm full movie ash .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-d..ime-eashared-imepad_31bf3856ad364e35_10.0.19041.1_none_f07d4fae3e8e883f\horse public redhair .rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-iis-sharedlibraries_31bf3856ad364e35_10.0.19041.1_none_c6da8048542fddc7\kicking girls .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.1_de-de_7860bee9439c3ae7\spanish gang bang xxx [free] glans .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_hyperv-compute-cont..ce-shared.resources_31bf3856ad364e35_10.0.19041.867_en-us_49453482f1fb5356\fetish hot (!) .mpeg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.GroupPolicy.AdmTmplEditor.Resources\malaysia bukkake gay lesbian boobs .avi.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\NetworkService\Downloads\beastiality several models gorgeoushorny .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SoftwareDistribution\Download\tyrkish fetish public gorgeoushorny .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\ServiceProfiles\NetworkService\AppData\Roaming\Microsoft\Windows\Templates\italian action hot (!) ash traffic (Sandy).mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\SystemResources\Windows.UI.ShellCommon\SharePickerUI\lesbian hot (!) (Kathrin).rar.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\WinSxS\amd64_microsoft-windows-i..nearshareexperience_31bf3856ad364e35_10.0.19041.1288_none_ca3007304990b2ea\danish fucking hardcore public feet traffic (Ashley,Christine).zip.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe File created C:\Windows\security\templates\animal girls YEâPSè& .mpg.exe c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4492 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4492 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 640 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 640 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1196 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4740 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4740 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1196 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 3036 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 3036 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4072 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4072 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2124 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2124 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4876 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4876 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2016 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 552 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 2016 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 552 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4880 wrote to memory of 2808 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 87 PID 4880 wrote to memory of 2808 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 87 PID 4880 wrote to memory of 2808 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 87 PID 4880 wrote to memory of 1408 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 90 PID 4880 wrote to memory of 1408 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 90 PID 4880 wrote to memory of 1408 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 90 PID 2808 wrote to memory of 1764 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 91 PID 2808 wrote to memory of 1764 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 91 PID 2808 wrote to memory of 1764 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 91 PID 4880 wrote to memory of 1672 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 94 PID 4880 wrote to memory of 1672 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 94 PID 4880 wrote to memory of 1672 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 94 PID 2808 wrote to memory of 5040 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 95 PID 2808 wrote to memory of 5040 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 95 PID 2808 wrote to memory of 5040 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 95 PID 1408 wrote to memory of 4324 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 96 PID 1408 wrote to memory of 4324 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 96 PID 1408 wrote to memory of 4324 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 96 PID 4880 wrote to memory of 4492 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 99 PID 4880 wrote to memory of 4492 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 99 PID 4880 wrote to memory of 4492 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 99 PID 1672 wrote to memory of 640 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 100 PID 1672 wrote to memory of 640 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 100 PID 1672 wrote to memory of 640 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 100 PID 1408 wrote to memory of 4740 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 101 PID 1408 wrote to memory of 4740 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 101 PID 1408 wrote to memory of 4740 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 101 PID 5040 wrote to memory of 1196 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 102 PID 5040 wrote to memory of 1196 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 102 PID 5040 wrote to memory of 1196 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 102 PID 2808 wrote to memory of 3036 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 103 PID 2808 wrote to memory of 3036 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 103 PID 2808 wrote to memory of 3036 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 103 PID 4324 wrote to memory of 2124 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 105 PID 4324 wrote to memory of 2124 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 105 PID 4324 wrote to memory of 2124 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 105 PID 3004 wrote to memory of 4876 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 106 PID 3004 wrote to memory of 4876 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 106 PID 3004 wrote to memory of 4876 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 106 PID 4880 wrote to memory of 552 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 108 PID 4880 wrote to memory of 552 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 108 PID 4880 wrote to memory of 552 4880 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 108 PID 1672 wrote to memory of 2016 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 110 PID 1672 wrote to memory of 2016 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 110 PID 1672 wrote to memory of 2016 1672 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 110 PID 1408 wrote to memory of 4928 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 111 PID 1408 wrote to memory of 4928 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 111 PID 1408 wrote to memory of 4928 1408 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 111 PID 5040 wrote to memory of 2832 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 112 PID 5040 wrote to memory of 2832 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 112 PID 5040 wrote to memory of 2832 5040 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 112 PID 4492 wrote to memory of 4456 4492 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 113 PID 4492 wrote to memory of 4456 4492 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 113 PID 4492 wrote to memory of 4456 4492 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 113 PID 640 wrote to memory of 1064 640 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 115 PID 640 wrote to memory of 1064 640 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 115 PID 640 wrote to memory of 1064 640 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 115 PID 4324 wrote to memory of 2724 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 116 PID 4324 wrote to memory of 2724 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 116 PID 4324 wrote to memory of 2724 4324 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 116 PID 2808 wrote to memory of 4268 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 117 PID 2808 wrote to memory of 4268 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 117 PID 2808 wrote to memory of 4268 2808 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 117 PID 3004 wrote to memory of 2236 3004 c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Enumerates connected drives
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:5132
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:6492
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:10232
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:14304
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:6468
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:7864
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:16308
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:18340
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:10996
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:15056
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:1612
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:5368
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:7668
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:15044
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"8⤵PID:18524
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:10736
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14864
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:7200
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6856
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:12564
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:228
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:9264
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18632
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14816
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:13208
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4592
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:10084
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:13808
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:7420
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7636
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:16028
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18428
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10388
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14516
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7312
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5400
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:8488
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:5044
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:11148
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:15616
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4892
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6948
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:12248
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:400
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8876
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4336
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:12000
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:4332
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5256
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6300
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:9888
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:13588
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:6080
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7688
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:16112
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18588
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10464
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14564
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7296
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:8468
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:1116
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:11172
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:15508
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4664
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6800
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:13336
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:5792
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8924
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18596
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:22300
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:12060
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6188
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10104
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:11736
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14164
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:13892
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6424
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7588
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14224
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6392
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10212
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14116
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:2884
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5424
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8548
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:3140
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11432
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:15864
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:17932
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6768
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:12008
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8372
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8916
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:3688
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:12044
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:17968
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5212 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6364
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:10204
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14076
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18304
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7752
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:2264
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18364
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10680
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14844
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18444
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5344
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7560
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14052
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18296
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10196
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14084
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7108
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6752
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:13360
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4316
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9096
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4192
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13104
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5488
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10480
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14528
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18288
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7760
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:16120
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18224
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10804
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14896
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18256
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5440
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9520
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18420
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:12664
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13224
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5784
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6784
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11936
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8388
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8892
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:2244
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11920
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5240
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5080
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10408
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14480
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:11760
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7932
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:16044
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:5776
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10968
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14904
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18540
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5384
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8252
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18312
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11140
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:15312
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10504
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18556
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6588
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11840
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16504
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18356
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8636
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:4732
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11320
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:15668
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:17920
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6204
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9864
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18636
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:21656
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13564
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:4360
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:7696
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16300
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18380
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:10488
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:14544
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:5392
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8604
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:3640
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11480
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:15728
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:17940
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:12524
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2932
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:8864
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2760
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:12344
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:3772
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵
- System Location Discovery: System Language Discovery
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:6172
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:10220
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14068
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:7412
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7644
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:16312
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:18372
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10396
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14584
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7224
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5360
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7616
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14316
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:6512
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10728
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:15036
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:7392
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:12352
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:368
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8956
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:17972
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:12076
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:17980
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6308
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10040
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:11748
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:14144
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:13644
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:4628
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7680
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14820
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18516
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10416
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14436
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6516
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5408
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7940
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:16104
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18572
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10908
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14888
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18436
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11856
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16672
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18348
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:9312
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11616
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13988
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:13216
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6008
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5140
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6456
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10372
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14448
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:1496
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7964
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:16292
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18388
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11064
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:15064
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18532
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5376
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8460
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11164
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:15460
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18564
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6760
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:12964
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5664
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8968
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11624
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13972
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:12488
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:1616
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:4808
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9668
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:8616
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:21648
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13384
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:5780
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:7624
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16056
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16948
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:10688
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:14828
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2800
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:5448
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8536
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:3888
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11312
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:15660
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:17948
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:6816
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11848
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5052
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:8908
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2200
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:12228
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6376
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:10092
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:6580
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"7⤵PID:21640
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:13884
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:17956
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:7768
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:15296
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18320
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10720
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14872
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18248
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5416
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:8556
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:3460
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:11488
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:15744
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18264
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6744
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:12680
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9996
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8884
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:3580
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:12052
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5028
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6180
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9736
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:18604
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:21664
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13456
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13020
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:14856
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18232
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:10380
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:14796
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:7248
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:5456
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8620
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:3956
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11424
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:15892
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:1212
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:6792
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:12572
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:3664
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:8900
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:816
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:12232
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6316
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:9744
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:11548
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"6⤵PID:14124
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:13368
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:6272
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:7708
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16324
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:18396
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:10496
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:14536
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:7184
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:8012
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:16036
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:17928
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11120
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:15304
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"5⤵PID:10820
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:18272
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:6808
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:11928
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:5264
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:9072
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:12768
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:12988
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:8300
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:552 -
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:6156
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:10164
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:13964
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:6428
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:7600
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:16020
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:18580
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:10472
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:14572
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:18280
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵PID:5464
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:8260
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:16484
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"4⤵PID:18240
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:11156
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:15496
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:18548
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵PID:6940
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:12556
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:4048
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵PID:8932
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"3⤵PID:3452
-
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵PID:12384
-
-
C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c772e73c275f0ebf16b772539188dd53_JaffaCakes118.exe"2⤵PID:3264
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\trambling trambling licking (Sarah,Britney).avi.exe
Filesize511KB
MD500eb637f3bf59b75ec8613a93b9596d9
SHA1618aaa83d051cb0fe11490f87bed55e14f1b13e7
SHA25639bf689d2c250e24f1ea1c8c6e05c4f418dd3aa536b4aedc0f4e82a7ecad20b7
SHA5123d20f532eb0372a68f2aef1df3b3b988e1794330046a4b55139948dc0d731dc2f302edb85a37998b5100908d4687c31809c6cba0b1992d24a73036c1d2c4415a