Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2024, 11:44
Behavioral task
behavioral1
Sample
c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe
-
Size
272KB
-
MD5
c7887a7bb7e672192a58ef5d6f985932
-
SHA1
b9fb0daeed88638b7a965449bf0b9f01df35efd0
-
SHA256
f6c3d193a281dc20507a1dfdfc45cf5292d59c385640c61daf6fb475786ae0dd
-
SHA512
d4af49290ca8fb9329bd940461c855f4172c4e7ebc6ef2092091663ac6fffc5e427346d2c4671217e8f98bc1e542e298c198752cb8a0011e1226ab68f9019b89
-
SSDEEP
6144:wjlNv3g5OnD/ajNFB9FgXYhSEw6rfyxIXzuJhoiH:qlNvQ5OjajNFBzgXstXqGi
Malware Config
Signatures
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe File created C:\Windows\SysWOW64\4311286ndir\autoexec.bat c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3684 wrote to memory of 3544 3684 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 83 PID 3684 wrote to memory of 3544 3684 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 83 PID 3684 wrote to memory of 3544 3684 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 83 PID 3544 wrote to memory of 3944 3544 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 84 PID 3544 wrote to memory of 3944 3544 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 84 PID 3544 wrote to memory of 3944 3544 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 84 PID 3944 wrote to memory of 3488 3944 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 85 PID 3944 wrote to memory of 3488 3944 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 85 PID 3944 wrote to memory of 3488 3944 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 85 PID 3488 wrote to memory of 2760 3488 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 86 PID 3488 wrote to memory of 2760 3488 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 86 PID 3488 wrote to memory of 2760 3488 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 86 PID 2760 wrote to memory of 2616 2760 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 87 PID 2760 wrote to memory of 2616 2760 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 87 PID 2760 wrote to memory of 2616 2760 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 87 PID 2616 wrote to memory of 3572 2616 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 88 PID 2616 wrote to memory of 3572 2616 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 88 PID 2616 wrote to memory of 3572 2616 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 88 PID 3572 wrote to memory of 3036 3572 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 89 PID 3572 wrote to memory of 3036 3572 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 89 PID 3572 wrote to memory of 3036 3572 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 89 PID 3036 wrote to memory of 4568 3036 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 90 PID 3036 wrote to memory of 4568 3036 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 90 PID 3036 wrote to memory of 4568 3036 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 90 PID 4568 wrote to memory of 1948 4568 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 91 PID 4568 wrote to memory of 1948 4568 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 91 PID 4568 wrote to memory of 1948 4568 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 91 PID 1948 wrote to memory of 1512 1948 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 92 PID 1948 wrote to memory of 1512 1948 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 92 PID 1948 wrote to memory of 1512 1948 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 92 PID 1512 wrote to memory of 2284 1512 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 93 PID 1512 wrote to memory of 2284 1512 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 93 PID 1512 wrote to memory of 2284 1512 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 93 PID 2284 wrote to memory of 2336 2284 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 95 PID 2284 wrote to memory of 2336 2284 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 95 PID 2284 wrote to memory of 2336 2284 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 95 PID 2336 wrote to memory of 4008 2336 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 97 PID 2336 wrote to memory of 4008 2336 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 97 PID 2336 wrote to memory of 4008 2336 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 97 PID 4008 wrote to memory of 700 4008 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 99 PID 4008 wrote to memory of 700 4008 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 99 PID 4008 wrote to memory of 700 4008 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 99 PID 700 wrote to memory of 2856 700 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 101 PID 700 wrote to memory of 2856 700 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 101 PID 700 wrote to memory of 2856 700 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 101 PID 2856 wrote to memory of 2724 2856 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 103 PID 2856 wrote to memory of 2724 2856 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 103 PID 2856 wrote to memory of 2724 2856 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 103 PID 2724 wrote to memory of 4036 2724 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 105 PID 2724 wrote to memory of 4036 2724 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 105 PID 2724 wrote to memory of 4036 2724 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 105 PID 4036 wrote to memory of 4344 4036 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 107 PID 4036 wrote to memory of 4344 4036 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 107 PID 4036 wrote to memory of 4344 4036 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 107 PID 4344 wrote to memory of 1804 4344 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 109 PID 4344 wrote to memory of 1804 4344 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 109 PID 4344 wrote to memory of 1804 4344 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 109 PID 1804 wrote to memory of 2728 1804 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 111 PID 1804 wrote to memory of 2728 1804 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 111 PID 1804 wrote to memory of 2728 1804 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 111 PID 2728 wrote to memory of 964 2728 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 113 PID 2728 wrote to memory of 964 2728 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 113 PID 2728 wrote to memory of 964 2728 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 113 PID 964 wrote to memory of 4408 964 c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe3⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe4⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe5⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe6⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe8⤵
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe9⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe10⤵
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe11⤵
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe12⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe13⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe14⤵
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe15⤵
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe16⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe17⤵
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe18⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe19⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe20⤵
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe21⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe22⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe23⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe24⤵PID:4752
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe25⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe26⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe27⤵
- Drops file in System32 directory
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe28⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe29⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe30⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe31⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe32⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe33⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe34⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe35⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe36⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe37⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe38⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe39⤵
- Drops file in System32 directory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe40⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe41⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe42⤵
- Drops file in System32 directory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe43⤵PID:4716
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe44⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe45⤵
- Drops file in System32 directory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe46⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe47⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe48⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe49⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe50⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe51⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe52⤵
- Drops file in System32 directory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe53⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe54⤵
- Drops file in System32 directory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe55⤵
- Drops file in System32 directory
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe56⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe57⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe58⤵
- Drops file in System32 directory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe59⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe60⤵PID:4984
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe61⤵PID:208
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe62⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe63⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe64⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe65⤵
- Drops file in System32 directory
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe66⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe67⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe68⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe69⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe70⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe71⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe72⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe73⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe74⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe75⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe76⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe77⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe78⤵
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe79⤵
- System Location Discovery: System Language Discovery
PID:868 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe80⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe81⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe82⤵
- System Location Discovery: System Language Discovery
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe83⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe84⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe85⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe86⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe87⤵PID:4580
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe88⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe89⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe90⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe91⤵
- Drops file in System32 directory
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe92⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe93⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe94⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe95⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe96⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe97⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe98⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe99⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe100⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe101⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe102⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe103⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe104⤵
- Drops file in System32 directory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe105⤵
- Drops file in System32 directory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe106⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe107⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe108⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe109⤵PID:4064
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe110⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe111⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe112⤵PID:3872
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe113⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe114⤵
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe115⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe116⤵
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe117⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe118⤵PID:3356
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe119⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe120⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe121⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c7887a7bb7e672192a58ef5d6f985932_JaffaCakes118.exe122⤵PID:4156
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-