Analysis
-
max time kernel
150s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe
-
Size
477KB
-
MD5
edc74c7aa1713e06f800326ccb7912dd
-
SHA1
6003a5216f9a93718cabaaa6e95c1ff059bf7c23
-
SHA256
2fc084a60f2edbe369fc795ce78a2c889ad02d06d763e875456784779866a600
-
SHA512
088319ebb5745fab5f5245fcc429d8e263825353387a965ec7e107e91ee932943ee1098362c81a1b099f8b8fd159a2dcb73ebe89cf43e9cccecade2513804976
-
SSDEEP
12288:zl89Rg1lzarZAYh16cN6Cfm+KUGEMAM55Gs:zl8z24rZAYhvm+dWxDGs
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Process not Found -
Renames multiple (83) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\Control Panel\International\Geo\Nation MckkQUIU.exe -
Executes dropped EXE 2 IoCs
pid Process 2024 ZAAQAsgI.exe 4900 MckkQUIU.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZAAQAsgI.exe = "C:\\Users\\Admin\\OakEQkYM\\ZAAQAsgI.exe" ZAAQAsgI.exe Set value (str) \REGISTRY\USER\S-1-5-21-656926755-4116854191-210765258-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ZAAQAsgI.exe = "C:\\Users\\Admin\\OakEQkYM\\ZAAQAsgI.exe" edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MckkQUIU.exe = "C:\\ProgramData\\xUkUcgkM\\MckkQUIU.exe" edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MckkQUIU.exe = "C:\\ProgramData\\xUkUcgkM\\MckkQUIU.exe" MckkQUIU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 256 reg.exe 4880 reg.exe 1816 reg.exe 3324 reg.exe 4072 reg.exe 1144 reg.exe 3984 reg.exe 3456 reg.exe 2952 reg.exe 1552 reg.exe 4088 reg.exe 1404 Process not Found 4368 reg.exe 3772 reg.exe 1212 reg.exe 3356 reg.exe 1468 reg.exe 4288 Process not Found 3564 reg.exe 1404 reg.exe 416 reg.exe 3116 reg.exe 4616 reg.exe 3888 reg.exe 4532 reg.exe 2768 reg.exe 3208 reg.exe 4712 Process not Found 3256 reg.exe 464 reg.exe 2748 reg.exe 4296 Process not Found 444 reg.exe 1888 reg.exe 1784 Process not Found 2396 Process not Found 1312 reg.exe 3176 reg.exe 4256 reg.exe 3580 reg.exe 4392 Process not Found 1904 reg.exe 4364 reg.exe 1416 Process not Found 5064 reg.exe 4476 reg.exe 784 reg.exe 640 reg.exe 3332 reg.exe 4888 reg.exe 2176 Process not Found 2188 reg.exe 3764 reg.exe 3192 reg.exe 1784 reg.exe 1172 Process not Found 2676 reg.exe 2020 reg.exe 1900 reg.exe 4384 reg.exe 768 reg.exe 2800 reg.exe 1908 reg.exe 3564 Process not Found -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3912 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3912 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3912 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3912 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1212 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1212 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1212 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1212 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3336 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3336 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3336 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3336 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3104 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3104 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3104 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3104 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1392 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1392 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1392 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1392 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1000 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1000 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1000 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 1000 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2404 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2404 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2404 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2404 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3672 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3672 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3672 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3672 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3888 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3888 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3888 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3888 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3156 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3156 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3156 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3156 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4820 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4820 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4820 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 4820 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2988 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2988 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2988 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 2988 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3964 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3964 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3964 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 3964 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4900 MckkQUIU.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe 4900 MckkQUIU.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4256 wrote to memory of 2024 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 82 PID 4256 wrote to memory of 2024 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 82 PID 4256 wrote to memory of 2024 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 82 PID 4256 wrote to memory of 4900 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 83 PID 4256 wrote to memory of 4900 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 83 PID 4256 wrote to memory of 4900 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 83 PID 4256 wrote to memory of 3292 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 84 PID 4256 wrote to memory of 3292 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 84 PID 4256 wrote to memory of 3292 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 84 PID 3292 wrote to memory of 3356 3292 cmd.exe 86 PID 3292 wrote to memory of 3356 3292 cmd.exe 86 PID 3292 wrote to memory of 3356 3292 cmd.exe 86 PID 4256 wrote to memory of 3608 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 87 PID 4256 wrote to memory of 3608 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 87 PID 4256 wrote to memory of 3608 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 87 PID 4256 wrote to memory of 1144 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 88 PID 4256 wrote to memory of 1144 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 88 PID 4256 wrote to memory of 1144 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 88 PID 4256 wrote to memory of 568 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 89 PID 4256 wrote to memory of 568 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 89 PID 4256 wrote to memory of 568 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 89 PID 4256 wrote to memory of 880 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 90 PID 4256 wrote to memory of 880 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 90 PID 4256 wrote to memory of 880 4256 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 90 PID 880 wrote to memory of 4904 880 cmd.exe 95 PID 880 wrote to memory of 4904 880 cmd.exe 95 PID 880 wrote to memory of 4904 880 cmd.exe 95 PID 3356 wrote to memory of 2144 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 96 PID 3356 wrote to memory of 2144 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 96 PID 3356 wrote to memory of 2144 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 96 PID 2144 wrote to memory of 1628 2144 cmd.exe 98 PID 2144 wrote to memory of 1628 2144 cmd.exe 98 PID 2144 wrote to memory of 1628 2144 cmd.exe 98 PID 3356 wrote to memory of 244 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 99 PID 3356 wrote to memory of 244 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 99 PID 3356 wrote to memory of 244 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 99 PID 3356 wrote to memory of 4284 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 100 PID 3356 wrote to memory of 4284 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 100 PID 3356 wrote to memory of 4284 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 100 PID 3356 wrote to memory of 5112 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 101 PID 3356 wrote to memory of 5112 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 101 PID 3356 wrote to memory of 5112 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 101 PID 3356 wrote to memory of 3460 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 102 PID 3356 wrote to memory of 3460 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 102 PID 3356 wrote to memory of 3460 3356 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 102 PID 3460 wrote to memory of 1996 3460 cmd.exe 107 PID 3460 wrote to memory of 1996 3460 cmd.exe 107 PID 3460 wrote to memory of 1996 3460 cmd.exe 107 PID 1628 wrote to memory of 2472 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 108 PID 1628 wrote to memory of 2472 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 108 PID 1628 wrote to memory of 2472 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 108 PID 1628 wrote to memory of 1816 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 110 PID 1628 wrote to memory of 1816 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 110 PID 1628 wrote to memory of 1816 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 110 PID 1628 wrote to memory of 4640 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 111 PID 1628 wrote to memory of 4640 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 111 PID 1628 wrote to memory of 4640 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 111 PID 1628 wrote to memory of 2660 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 112 PID 1628 wrote to memory of 2660 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 112 PID 1628 wrote to memory of 2660 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 112 PID 1628 wrote to memory of 1592 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 113 PID 1628 wrote to memory of 1592 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 113 PID 1628 wrote to memory of 1592 1628 edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe 113 PID 2472 wrote to memory of 3912 2472 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\OakEQkYM\ZAAQAsgI.exe"C:\Users\Admin\OakEQkYM\ZAAQAsgI.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2024
-
-
C:\ProgramData\xUkUcgkM\MckkQUIU.exe"C:\ProgramData\xUkUcgkM\MckkQUIU.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:4900
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:3912 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"8⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:1212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"10⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:3336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"12⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:3104 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"14⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"16⤵PID:4540
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"18⤵PID:3844
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"20⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:3672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"22⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:3888 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"24⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:3156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"26⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11827⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4820 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"28⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"30⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"32⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11833⤵PID:4456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"34⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11835⤵PID:2896
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"36⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11837⤵PID:4296
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"38⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11839⤵PID:3176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"40⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11841⤵PID:4048
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"42⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11843⤵PID:2588
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"44⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11845⤵PID:3772
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"46⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11847⤵PID:2836
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"48⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11849⤵PID:4404
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"50⤵
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11851⤵PID:1592
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"52⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11853⤵PID:1360
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"54⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11855⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"56⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11857⤵
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"58⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11859⤵PID:5000
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"60⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11861⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"62⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11863⤵PID:1732
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"64⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11865⤵PID:768
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"66⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11867⤵PID:4016
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"68⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11869⤵PID:4872
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"70⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11871⤵PID:1684
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"72⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11873⤵PID:4856
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"74⤵PID:3360
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11875⤵PID:2072
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"76⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11877⤵PID:3236
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"78⤵
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11879⤵PID:2776
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"80⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11881⤵PID:2208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"82⤵PID:3788
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11883⤵PID:2716
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"84⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11885⤵PID:4088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"86⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11887⤵PID:1720
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"88⤵PID:3236
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11889⤵PID:1984
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"90⤵PID:3172
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11891⤵PID:5076
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"92⤵
- System Location Discovery: System Language Discovery
PID:444 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11893⤵PID:740
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"94⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11895⤵PID:2508
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"96⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11897⤵PID:888
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"98⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes11899⤵PID:4176
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"100⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118101⤵PID:3792
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"102⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118103⤵PID:3192
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"104⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118105⤵PID:4464
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"106⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118107⤵PID:1824
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"108⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118109⤵
- System Location Discovery: System Language Discovery
PID:4292 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"110⤵
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118111⤵PID:4156
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"112⤵PID:3336
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118113⤵PID:208
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"114⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118115⤵PID:4864
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"116⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118117⤵PID:784
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"118⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118119⤵PID:416
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"120⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118121⤵PID:3756
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\edc74c7aa1713e06f800326ccb7912dd_JaffaCakes118"122⤵PID:4156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-