Analysis
-
max time kernel
144s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
30/03/2025, 16:05
Behavioral task
behavioral1
Sample
JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe
-
Size
273KB
-
MD5
98e324cc5334652e780f4b8aa0e6733b
-
SHA1
40e2f16194c8551a8f75c73e6be695e610510fc8
-
SHA256
2afb20aac3cccd113fec42aff9b1486f532f19dd24df5a0a28981cc6df06a8ac
-
SHA512
11534c07d495075dd6d4f6a945c992a45e52932aee7e0e2751af20da30288f749116652b3b253970a8eb9c1f591024c53ccec371b8dc1013bb512ef2d0cf9d3b
-
SSDEEP
6144:OU/s58MT8OVsN0tjWGiVCc5XuPgFBExBA8mDoH178KqwoMwiA:q8MQOVECq2PUOBAP0HxJ7w
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe" JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe -
resource yara_rule behavioral2/memory/4320-0-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4756-3-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4320-4-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3660-6-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2148-8-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6044-9-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4708-10-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4660-11-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3924-12-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3984-13-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4756-14-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/1664-15-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4748-16-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4152-17-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3200-18-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2032-19-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4108-20-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2916-21-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/1172-22-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/432-23-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2464-24-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3996-25-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3984-26-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/1664-27-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6208-28-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2544-29-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/1504-30-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6440-31-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/3304-32-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4568-33-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/440-34-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6856-36-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/1172-35-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2464-37-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/4804-38-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7068-39-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/2360-40-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6208-41-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6972-42-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7260-44-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6328-43-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7368-46-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6440-45-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6552-48-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7468-49-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6656-50-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6760-52-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7672-53-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7776-57-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6856-56-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6964-59-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7068-62-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7996-63-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6284-65-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/6972-67-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7232-68-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/8200-72-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7260-71-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7368-74-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/8368-75-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7468-77-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/8492-78-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/7572-80-0x0000000000400000-0x00000000004B9000-memory.dmp upx behavioral2/memory/8600-81-0x0000000000400000-0x00000000004B9000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4320 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4320 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3660 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3660 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2148 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2148 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6044 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6044 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4708 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4708 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4660 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4660 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3924 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3924 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4756 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4756 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4748 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4748 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4152 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4152 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3200 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3200 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2032 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2032 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4108 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4108 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2916 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2916 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 432 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 432 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3996 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3996 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3984 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3984 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 1664 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 1664 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2544 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2544 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 1504 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 1504 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3304 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 3304 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4568 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4568 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 440 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 440 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 1172 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 1172 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2464 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2464 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4804 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 4804 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2360 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 2360 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6208 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6208 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6328 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6328 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6440 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6440 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6552 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6552 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6656 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe 6656 JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3140 wrote to memory of 3660 3140 cmd.exe 89 PID 3140 wrote to memory of 3660 3140 cmd.exe 89 PID 3140 wrote to memory of 3660 3140 cmd.exe 89 PID 5964 wrote to memory of 2148 5964 cmd.exe 92 PID 5964 wrote to memory of 2148 5964 cmd.exe 92 PID 5964 wrote to memory of 2148 5964 cmd.exe 92 PID 3900 wrote to memory of 6044 3900 cmd.exe 96 PID 3900 wrote to memory of 6044 3900 cmd.exe 96 PID 3900 wrote to memory of 6044 3900 cmd.exe 96 PID 1028 wrote to memory of 4708 1028 cmd.exe 99 PID 1028 wrote to memory of 4708 1028 cmd.exe 99 PID 1028 wrote to memory of 4708 1028 cmd.exe 99 PID 4580 wrote to memory of 4660 4580 cmd.exe 103 PID 4580 wrote to memory of 4660 4580 cmd.exe 103 PID 4580 wrote to memory of 4660 4580 cmd.exe 103 PID 4712 wrote to memory of 3924 4712 cmd.exe 106 PID 4712 wrote to memory of 3924 4712 cmd.exe 106 PID 4712 wrote to memory of 3924 4712 cmd.exe 106 PID 4740 wrote to memory of 4756 4740 cmd.exe 109 PID 4740 wrote to memory of 4756 4740 cmd.exe 109 PID 4740 wrote to memory of 4756 4740 cmd.exe 109 PID 5292 wrote to memory of 4748 5292 cmd.exe 112 PID 5292 wrote to memory of 4748 5292 cmd.exe 112 PID 5292 wrote to memory of 4748 5292 cmd.exe 112 PID 5472 wrote to memory of 4152 5472 cmd.exe 115 PID 5472 wrote to memory of 4152 5472 cmd.exe 115 PID 5472 wrote to memory of 4152 5472 cmd.exe 115 PID 2180 wrote to memory of 3200 2180 cmd.exe 118 PID 2180 wrote to memory of 3200 2180 cmd.exe 118 PID 2180 wrote to memory of 3200 2180 cmd.exe 118 PID 5100 wrote to memory of 2032 5100 cmd.exe 121 PID 5100 wrote to memory of 2032 5100 cmd.exe 121 PID 5100 wrote to memory of 2032 5100 cmd.exe 121 PID 5372 wrote to memory of 4108 5372 cmd.exe 124 PID 5372 wrote to memory of 4108 5372 cmd.exe 124 PID 5372 wrote to memory of 4108 5372 cmd.exe 124 PID 3568 wrote to memory of 2916 3568 cmd.exe 127 PID 3568 wrote to memory of 2916 3568 cmd.exe 127 PID 3568 wrote to memory of 2916 3568 cmd.exe 127 PID 1352 wrote to memory of 432 1352 cmd.exe 130 PID 1352 wrote to memory of 432 1352 cmd.exe 130 PID 1352 wrote to memory of 432 1352 cmd.exe 130 PID 2612 wrote to memory of 3996 2612 cmd.exe 133 PID 2612 wrote to memory of 3996 2612 cmd.exe 133 PID 2612 wrote to memory of 3996 2612 cmd.exe 133 PID 2488 wrote to memory of 3984 2488 cmd.exe 136 PID 2488 wrote to memory of 3984 2488 cmd.exe 136 PID 2488 wrote to memory of 3984 2488 cmd.exe 136 PID 6120 wrote to memory of 1664 6120 cmd.exe 139 PID 6120 wrote to memory of 1664 6120 cmd.exe 139 PID 6120 wrote to memory of 1664 6120 cmd.exe 139 PID 5800 wrote to memory of 2544 5800 cmd.exe 142 PID 5800 wrote to memory of 2544 5800 cmd.exe 142 PID 5800 wrote to memory of 2544 5800 cmd.exe 142 PID 3756 wrote to memory of 1504 3756 cmd.exe 145 PID 3756 wrote to memory of 1504 3756 cmd.exe 145 PID 3756 wrote to memory of 1504 3756 cmd.exe 145 PID 3112 wrote to memory of 3304 3112 cmd.exe 148 PID 3112 wrote to memory of 3304 3112 cmd.exe 148 PID 3112 wrote to memory of 3304 3112 cmd.exe 148 PID 5652 wrote to memory of 4568 5652 cmd.exe 151 PID 5652 wrote to memory of 4568 5652 cmd.exe 151 PID 5652 wrote to memory of 4568 5652 cmd.exe 151 PID 2892 wrote to memory of 440 2892 cmd.exe 156
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe"1⤵
- Suspicious use of SetWindowsHookEx
PID:4320
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5964 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:6044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3924
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4756
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5292 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5472 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4152
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:3200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5372 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:4108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:1664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5800 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2544
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:3304
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4568
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1172
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:5696
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6268
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6328
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6388
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Suspicious use of SetWindowsHookEx
PID:6440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6496
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:6552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6604
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6708
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:6760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6812
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:6856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:6964
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7068
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7124
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:6284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6624
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:6972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7184
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:7260
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7304
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:7368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7408
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7512
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:7572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7608
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:7672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7716
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:7776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7828
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:7892
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7932
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:7996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8044
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:8104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8144
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:7232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:7580
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:8200
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8300
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:8368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8424
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:8492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8540
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:8600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8644
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:8704
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8752
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:8808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8868
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:8976
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:9044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9084
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:9156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9192
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:8440
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6032
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:1604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:8836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9096
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:8620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:9220
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9292
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:9336
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9388
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9496
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:9560
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9596
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:9660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9700
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:9760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9796
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:9864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9900
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:9956
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10012
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10060
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10096
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:10164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10204
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:9460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:9608
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:9876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10216
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:10256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10312
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:10364
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10412
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:10464
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10504
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:10564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10616
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:10664
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10704
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:10772
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10836
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:10888
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10948
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:10992
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11052
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:11100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11160
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:11228
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10276
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:10680
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:10960
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:10796
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11300
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:11368
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11412
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:11460
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11512
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:11572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11612
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:11656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11712
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11820
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:11876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11928
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:11984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12032
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:12084
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12120
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:12180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12220
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:12280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:11524
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:11844
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12196
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:12320
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12360
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:12420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12460
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:12504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12556
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:12600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12656
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:12700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12740
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:12800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12852
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:12900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12956
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:13000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13056
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:13104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13160
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:13204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13244
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:13300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:12624
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:13216
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13320
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:13384
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13424
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:13484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13536
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:13580
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13632
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:13688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13736
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:13780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13836
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:13920
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13976
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:14044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14104
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:14156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14192
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:14272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:13332
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:13748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14056
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:3032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14340
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:14400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14460
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:14516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14568
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:14628
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14684
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:14748
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14792
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:14864
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14904
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:14976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15048
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:15128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15184
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:15240
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15292
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:15356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14540
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:14764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14984
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:13896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:14416
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:3836
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15408
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:15480
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15520
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:15588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15644
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:15720
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15764
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:15808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15852
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:15916
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15964
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:16024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16072
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:16116
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16172
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:16224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16280
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:16340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16372
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:2468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:15824
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:16136
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16392
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:16472
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16508
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:16572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16608
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:16688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16732
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:16780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16844
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:16900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:16948
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:17016
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17072
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:17128
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17164
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:17236
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17288
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:17360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17392
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:5808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:6956
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:17340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17416
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:17488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17528
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:17608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17640
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:17708
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17752
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:17812
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17860
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:17952
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17988
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:18064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:18096
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- Adds Run key to start application
PID:18164
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:18220
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵
- System Location Discovery: System Language Discovery
PID:18272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:18332
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:18400
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe1⤵PID:17536
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98e324cc5334652e780f4b8aa0e6733b.exe2⤵PID:5424
-
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵
- Modifies registry class
PID:18664