Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 02:55
Static task
static1
Behavioral task
behavioral1
Sample
2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe
-
Size
377KB
-
MD5
2ec1a494ca2a2b7c439569e6658e2f45
-
SHA1
a76e8784f250db262f23af4950828a963b300cd9
-
SHA256
66b723e4037dae30a4fc387207b5e411466db71a6cb8c19d8499157ee8b4f76e
-
SHA512
24a39ef195c4e22a62b9589d106bbb35cf16fe2666994586f02f59edbddec964de4cc160a3ed0f8f549da11ab16d5e5494d7c20c0b7109ce8a0585abe9c323d1
-
SSDEEP
6144:6kSAIWHYXqq+vxiCrrZxSlj0KwQWJxXs5MWeKXf10w1X8f5x10TK1+cRMXYrXg1W:eATHYZyxZrZSjFwf3s/Xf2wG0zVXIA/e
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 14 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options idbvtczll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options aanrxzvmbu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options gjfkotqsmo.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run idbvtczll.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run aanrxzvmbu.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run gjfkotqsmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options upxdzzhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options wnsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run luxnfnqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options luxnfnqz.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run spngkystwm.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wnsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run upxdzzhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Explorer Options spngkystwm.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 4952 idbvtczll.exe 3844 aanrxzvmbu.exe 3284 luxnfnqz.exe 3324 gjfkotqsmo.exe 956 upxdzzhl.exe 4376 spngkystwm.exe 1496 wnsydrv.exe 1668 wnsydrv.exe 3940 ygtwvkya.exe 4424 wnsydrv.exe 3368 wnsydrv.exe 3228 wnsydrv.exe 1676 dhabhxeqhi.exe 4992 rwserdvj.exe 1528 pnihsbhrcg.exe 4844 wnsydrv.exe 3724 wnykdaspqv.exe 1152 uoonoon.exe 5032 soeapmyfn.exe 1596 dmqtukmgbfv.exe 3308 bnggfiho.exe 748 inwjgwsm.exe 2360 jltmwegnlop.exe 1664 oedpctzclao.exe 448 ufdyescah.exe 4836 nnpuioibxfc.exe 380 udfhtdtjwks.exe 3704 vlrazkhkt.exe 4028 gtndeivkqsy.exe 1072 ekdgpgqs.exe 4680 ospjvdetc.exe 688 jlawbswycz.exe 484 utwzgal.exe 2184 sjmcrowho.exe 4844 gyeusfn.exe 4636 ysekjiqoz.exe 2804 mxgntph.exe 4452 evikxldh.exe 408 pdumdjsiic.exe 644 kinjlor.exe 2892 turfzttwuj.exe 4176 eolsihok.exe 4472 zdtoqnnnfd.exe 3160 kbfrglb.exe 1688 xrxkhbigy.exe 4184 vdlgugl.exe 716 debjvfwa.exe 1408 wbegjrcaax.exe 3604 jhgiuij.exe 484 hdkvxnlptk.exe 956 sbgxnkz.exe 3380 ngouwqzsf.exe 2300 wdcqzvr.exe 4692 utstktmmr.exe 3276 zybqtpbffl.exe 224 mntiegs.exe 4592 isbpmbrbak.exe 3528 sanisjfbncy.exe 4168 ofvebffum.exe 1688 bvxhllwxilg.exe 1760 khbtpaoiv.exe 4852 iupqdfq.exe 3316 kdqgtjts.exe 1680 tqecxymnemj.exe -
Adds Run key to start application 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" idbvtczll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" aanrxzvmbu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" luxnfnqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" gjfkotqsmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" upxdzzhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" spngkystwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\Java Virtual Machine = "wingtsv.exe" wnsydrv.exe -
Modifies WinLogon 2 TTPs 21 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" wnsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" idbvtczll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" luxnfnqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" gjfkotqsmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" upxdzzhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" wnsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" idbvtczll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" idbvtczll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" aanrxzvmbu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" luxnfnqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" gjfkotqsmo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" spngkystwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" spngkystwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" wnsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" upxdzzhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" upxdzzhl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" spngkystwm.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" aanrxzvmbu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe wingtsv.exe" aanrxzvmbu.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows startup = "explorer.exe" luxnfnqz.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System Startup = "wingtsv.exe" gjfkotqsmo.exe -
Drops file in System32 directory 52 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnsydrv.exe luxnfnqz.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe upxdzzhl.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe upxdzzhl.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe idbvtczll.exe File opened for modification C:\Windows\SysWOW64\fsdutil.exe idbvtczll.exe File opened for modification C:\Windows\SysWOW64\fsdutil.exe spngkystwm.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe idbvtczll.exe File created C:\Windows\SysWOW64\wingtsv.exe luxnfnqz.exe File opened for modification C:\Windows\SysWOW64\fsdutil.exe gjfkotqsmo.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe wnsydrv.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe wnsydrv.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe luxnfnqz.exe File created C:\Windows\SysWOW64\fsdutil.exe upxdzzhl.exe File created C:\Windows\SysWOW64\wingtsv.exe aanrxzvmbu.exe File created C:\Windows\SysWOW64\fsdutil.exe luxnfnqz.exe File created C:\Windows\SysWOW64\wingtsv.exe spngkystwm.exe File created C:\Windows\SysWOW64\fsdutil.exe spngkystwm.exe File opened for modification C:\Windows\SysWOW64\fsdutil.exe aanrxzvmbu.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe aanrxzvmbu.exe File opened for modification C:\Windows\SysWOW64\fsdutil.exe luxnfnqz.exe File created C:\Windows\SysWOW64\ntvdc.exe aanrxzvmbu.exe File created C:\Windows\SysWOW64\wnsydrv.exe idbvtczll.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe gjfkotqsmo.exe File created C:\Windows\SysWOW64\wnsydrv.exe gjfkotqsmo.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe spngkystwm.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe spngkystwm.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe wnsydrv.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe aanrxzvmbu.exe File created C:\Windows\SysWOW64\ntvdc.exe idbvtczll.exe File created C:\Windows\SysWOW64\fsdutil.exe idbvtczll.exe File created C:\Windows\SysWOW64\wnsydrv.exe aanrxzvmbu.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe gjfkotqsmo.exe File created C:\Windows\SysWOW64\wnsydrv.exe upxdzzhl.exe File created C:\Windows\SysWOW64\wingtsv.exe upxdzzhl.exe File created C:\Windows\SysWOW64\ntvdc.exe upxdzzhl.exe File created C:\Windows\SysWOW64\wingtsv.exe idbvtczll.exe File created C:\Windows\SysWOW64\ntvdc.exe wnsydrv.exe File created C:\Windows\SysWOW64\wingtsv.exe gjfkotqsmo.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe spngkystwm.exe File created C:\Windows\SysWOW64\ntvdc.exe spngkystwm.exe File created C:\Windows\SysWOW64\wingtsv.exe wnsydrv.exe File created C:\Windows\SysWOW64\fsdutil.exe aanrxzvmbu.exe File created C:\Windows\SysWOW64\fsdutil.exe gjfkotqsmo.exe File opened for modification C:\Windows\SysWOW64\fsdutil.exe upxdzzhl.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe aanrxzvmbu.exe File created C:\Windows\SysWOW64\ntvdc.exe gjfkotqsmo.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe upxdzzhl.exe File opened for modification C:\Windows\SysWOW64\wingtsv.exe luxnfnqz.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe luxnfnqz.exe File created C:\Windows\SysWOW64\ntvdc.exe luxnfnqz.exe File opened for modification C:\Windows\SysWOW64\ntvdc.exe gjfkotqsmo.exe File opened for modification C:\Windows\SysWOW64\wnsydrv.exe idbvtczll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 1808 1996 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 83 PID 1996 wrote to memory of 1808 1996 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 83 PID 1996 wrote to memory of 1808 1996 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 83 PID 1996 wrote to memory of 4952 1996 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 84 PID 1996 wrote to memory of 4952 1996 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 84 PID 1996 wrote to memory of 4952 1996 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 84 PID 1808 wrote to memory of 1708 1808 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 85 PID 1808 wrote to memory of 1708 1808 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 85 PID 1808 wrote to memory of 1708 1808 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 85 PID 1808 wrote to memory of 3844 1808 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 86 PID 1808 wrote to memory of 3844 1808 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 86 PID 1808 wrote to memory of 3844 1808 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 86 PID 1708 wrote to memory of 3216 1708 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 87 PID 1708 wrote to memory of 3216 1708 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 87 PID 1708 wrote to memory of 3216 1708 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 87 PID 1708 wrote to memory of 3284 1708 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 88 PID 1708 wrote to memory of 3284 1708 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 88 PID 1708 wrote to memory of 3284 1708 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 88 PID 3216 wrote to memory of 2740 3216 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 89 PID 3216 wrote to memory of 2740 3216 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 89 PID 3216 wrote to memory of 2740 3216 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 89 PID 3216 wrote to memory of 3324 3216 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 90 PID 3216 wrote to memory of 3324 3216 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 90 PID 3216 wrote to memory of 3324 3216 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 90 PID 2740 wrote to memory of 2928 2740 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 91 PID 2740 wrote to memory of 2928 2740 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 91 PID 2740 wrote to memory of 2928 2740 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 91 PID 2740 wrote to memory of 956 2740 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 208 PID 2740 wrote to memory of 956 2740 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 208 PID 2740 wrote to memory of 956 2740 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 208 PID 2928 wrote to memory of 4644 2928 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 93 PID 2928 wrote to memory of 4644 2928 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 93 PID 2928 wrote to memory of 4644 2928 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 93 PID 2928 wrote to memory of 4376 2928 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 141 PID 2928 wrote to memory of 4376 2928 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 141 PID 2928 wrote to memory of 4376 2928 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 141 PID 4952 wrote to memory of 1496 4952 idbvtczll.exe 95 PID 4952 wrote to memory of 1496 4952 idbvtczll.exe 95 PID 4952 wrote to memory of 1496 4952 idbvtczll.exe 95 PID 4644 wrote to memory of 4056 4644 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 96 PID 4644 wrote to memory of 4056 4644 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 96 PID 4644 wrote to memory of 4056 4644 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 96 PID 3844 wrote to memory of 1668 3844 aanrxzvmbu.exe 246 PID 3844 wrote to memory of 1668 3844 aanrxzvmbu.exe 246 PID 3844 wrote to memory of 1668 3844 aanrxzvmbu.exe 246 PID 4644 wrote to memory of 3940 4644 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 98 PID 4644 wrote to memory of 3940 4644 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 98 PID 4644 wrote to memory of 3940 4644 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 98 PID 3284 wrote to memory of 4424 3284 luxnfnqz.exe 99 PID 3284 wrote to memory of 4424 3284 luxnfnqz.exe 99 PID 3284 wrote to memory of 4424 3284 luxnfnqz.exe 99 PID 3324 wrote to memory of 3368 3324 gjfkotqsmo.exe 100 PID 3324 wrote to memory of 3368 3324 gjfkotqsmo.exe 100 PID 3324 wrote to memory of 3368 3324 gjfkotqsmo.exe 100 PID 4056 wrote to memory of 744 4056 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 101 PID 4056 wrote to memory of 744 4056 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 101 PID 4056 wrote to memory of 744 4056 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 101 PID 4376 wrote to memory of 3228 4376 spngkystwm.exe 102 PID 4376 wrote to memory of 3228 4376 spngkystwm.exe 102 PID 4376 wrote to memory of 3228 4376 spngkystwm.exe 102 PID 4056 wrote to memory of 1676 4056 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 103 PID 4056 wrote to memory of 1676 4056 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 103 PID 4056 wrote to memory of 1676 4056 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 103 PID 744 wrote to memory of 4340 744 2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"5⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"8⤵
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"9⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"10⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"11⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"12⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"13⤵
- Checks computer location settings
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"14⤵PID:392
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"15⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"16⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"17⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"18⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"19⤵
- Checks computer location settings
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"20⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"21⤵
- Checks computer location settings
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"22⤵
- Checks computer location settings
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"23⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"24⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"25⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"26⤵
- Checks computer location settings
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"27⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"28⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"29⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"30⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"31⤵
- Checks computer location settings
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"32⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"33⤵
- Checks computer location settings
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"34⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"35⤵
- Checks computer location settings
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"36⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"37⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"38⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"39⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"40⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"41⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"42⤵
- Checks computer location settings
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"43⤵PID:3312
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"44⤵
- Checks computer location settings
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"45⤵
- Checks computer location settings
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"46⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"47⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"48⤵
- Checks computer location settings
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"49⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"50⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"51⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"52⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"53⤵PID:3628
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"54⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"55⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"56⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"57⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"58⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"59⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"60⤵PID:3464
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"61⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"62⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"63⤵
- Checks computer location settings
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"64⤵
- Checks computer location settings
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"65⤵
- Checks computer location settings
PID:212 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"66⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"67⤵
- Checks computer location settings
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"68⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"69⤵
- Checks computer location settings
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"70⤵
- Checks computer location settings
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"71⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"72⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"73⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"74⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"75⤵
- Checks computer location settings
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"76⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"77⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"78⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"79⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"80⤵PID:3292
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"81⤵
- Checks computer location settings
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"82⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"83⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"84⤵PID:4240
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"85⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"86⤵
- Checks computer location settings
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"87⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"88⤵
- Checks computer location settings
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"89⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"90⤵
- Checks computer location settings
PID:436 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"91⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"92⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"93⤵
- Checks computer location settings
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"94⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"95⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"96⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"97⤵PID:4020
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"98⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"99⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"100⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"101⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"102⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"103⤵
- Checks computer location settings
PID:636 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"104⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"105⤵PID:3704
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"106⤵
- Checks computer location settings
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"107⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"108⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"109⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"110⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"111⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"112⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"113⤵PID:3536
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"114⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"115⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"116⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"117⤵PID:4508
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"118⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"119⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"120⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"121⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2ec1a494ca2a2b7c439569e6658e2f45_JaffaCakes118.exe"122⤵PID:2280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-