Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27-06-2024 05:19
Static task
static1
Behavioral task
behavioral1
Sample
14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll
Resource
win10v2004-20240226-en
General
-
Target
14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll
-
Size
122KB
-
MD5
14ceeeabeb4263ec7834669333df8bd7
-
SHA1
6bcfd12e662dce5b02f560b41a050b36e55af03e
-
SHA256
8eca6e28e5369a6be0d1af9bcb0b91dc6435fea91288394a23b6af2726e66be1
-
SHA512
743ae949f3fdd249c39c385965516678a58bc948f675fdec3780eafe1b0ac12619ea81890446669ce2b51eec9b80c86c7ad45e8a8b5e2331256cee07f46e152f
-
SSDEEP
3072:rWpByHvCDO7s+4hA94G6lfEXpHNihDgB9r1SxhLpV:6yPCa7s+4694TlM5HwDgB9r1S1V
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 14236 dwm.exe Token: SeChangeNotifyPrivilege 14236 dwm.exe Token: 33 14236 dwm.exe Token: SeIncBasePriorityPrivilege 14236 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4860 2116 rundll32.exe 91 PID 2116 wrote to memory of 4860 2116 rundll32.exe 91 PID 2116 wrote to memory of 4860 2116 rundll32.exe 91 PID 4860 wrote to memory of 660 4860 rundll32.exe 92 PID 4860 wrote to memory of 660 4860 rundll32.exe 92 PID 4860 wrote to memory of 660 4860 rundll32.exe 92 PID 660 wrote to memory of 1032 660 rundll32.exe 93 PID 660 wrote to memory of 1032 660 rundll32.exe 93 PID 660 wrote to memory of 1032 660 rundll32.exe 93 PID 1032 wrote to memory of 3868 1032 rundll32.exe 94 PID 1032 wrote to memory of 3868 1032 rundll32.exe 94 PID 1032 wrote to memory of 3868 1032 rundll32.exe 94 PID 3868 wrote to memory of 3428 3868 rundll32.exe 95 PID 3868 wrote to memory of 3428 3868 rundll32.exe 95 PID 3868 wrote to memory of 3428 3868 rundll32.exe 95 PID 3428 wrote to memory of 3068 3428 rundll32.exe 96 PID 3428 wrote to memory of 3068 3428 rundll32.exe 96 PID 3428 wrote to memory of 3068 3428 rundll32.exe 96 PID 3068 wrote to memory of 4556 3068 rundll32.exe 97 PID 3068 wrote to memory of 4556 3068 rundll32.exe 97 PID 3068 wrote to memory of 4556 3068 rundll32.exe 97 PID 4556 wrote to memory of 2296 4556 rundll32.exe 98 PID 4556 wrote to memory of 2296 4556 rundll32.exe 98 PID 4556 wrote to memory of 2296 4556 rundll32.exe 98 PID 2296 wrote to memory of 4720 2296 rundll32.exe 99 PID 2296 wrote to memory of 4720 2296 rundll32.exe 99 PID 2296 wrote to memory of 4720 2296 rundll32.exe 99 PID 4720 wrote to memory of 4080 4720 rundll32.exe 100 PID 4720 wrote to memory of 4080 4720 rundll32.exe 100 PID 4720 wrote to memory of 4080 4720 rundll32.exe 100 PID 4080 wrote to memory of 4924 4080 rundll32.exe 101 PID 4080 wrote to memory of 4924 4080 rundll32.exe 101 PID 4080 wrote to memory of 4924 4080 rundll32.exe 101 PID 4924 wrote to memory of 4160 4924 rundll32.exe 102 PID 4924 wrote to memory of 4160 4924 rundll32.exe 102 PID 4924 wrote to memory of 4160 4924 rundll32.exe 102 PID 4160 wrote to memory of 1052 4160 rundll32.exe 103 PID 4160 wrote to memory of 1052 4160 rundll32.exe 103 PID 4160 wrote to memory of 1052 4160 rundll32.exe 103 PID 1052 wrote to memory of 3828 1052 rundll32.exe 104 PID 1052 wrote to memory of 3828 1052 rundll32.exe 104 PID 1052 wrote to memory of 3828 1052 rundll32.exe 104 PID 3828 wrote to memory of 3992 3828 rundll32.exe 105 PID 3828 wrote to memory of 3992 3828 rundll32.exe 105 PID 3828 wrote to memory of 3992 3828 rundll32.exe 105 PID 3992 wrote to memory of 2340 3992 rundll32.exe 106 PID 3992 wrote to memory of 2340 3992 rundll32.exe 106 PID 3992 wrote to memory of 2340 3992 rundll32.exe 106 PID 2340 wrote to memory of 4640 2340 rundll32.exe 107 PID 2340 wrote to memory of 4640 2340 rundll32.exe 107 PID 2340 wrote to memory of 4640 2340 rundll32.exe 107 PID 4640 wrote to memory of 3624 4640 rundll32.exe 108 PID 4640 wrote to memory of 3624 4640 rundll32.exe 108 PID 4640 wrote to memory of 3624 4640 rundll32.exe 108 PID 3624 wrote to memory of 4012 3624 rundll32.exe 109 PID 3624 wrote to memory of 4012 3624 rundll32.exe 109 PID 3624 wrote to memory of 4012 3624 rundll32.exe 109 PID 4012 wrote to memory of 3452 4012 rundll32.exe 110 PID 4012 wrote to memory of 3452 4012 rundll32.exe 110 PID 4012 wrote to memory of 3452 4012 rundll32.exe 110 PID 3452 wrote to memory of 4352 3452 rundll32.exe 111 PID 3452 wrote to memory of 4352 3452 rundll32.exe 111 PID 3452 wrote to memory of 4352 3452 rundll32.exe 111 PID 4352 wrote to memory of 3636 4352 rundll32.exe 112
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#123⤵PID:3636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#124⤵PID:116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#125⤵PID:112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#126⤵PID:5000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#127⤵PID:1216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#128⤵PID:3316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#129⤵PID:1824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#130⤵PID:4472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#131⤵PID:4912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#132⤵PID:1772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#133⤵PID:5044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#134⤵PID:3172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#135⤵PID:900
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#136⤵PID:3336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#137⤵PID:2524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#138⤵PID:1280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#139⤵PID:1484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#140⤵PID:2476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#141⤵PID:1464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#142⤵PID:4496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#143⤵PID:3324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#144⤵PID:548
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#145⤵PID:3044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#146⤵PID:3876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#147⤵PID:3436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#148⤵PID:2512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#149⤵PID:4616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#150⤵PID:2376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#151⤵PID:3484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#152⤵PID:1652
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#153⤵PID:2968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#154⤵PID:2964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#155⤵PID:3532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#156⤵PID:3096
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#157⤵PID:4996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#158⤵PID:3464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#159⤵PID:4044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#160⤵PID:5068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#161⤵PID:4848
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#162⤵PID:3864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#163⤵PID:2092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#164⤵PID:5020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#165⤵PID:3948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#166⤵PID:2232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#167⤵PID:4980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#168⤵PID:4576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#169⤵PID:2276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#170⤵PID:688
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#171⤵PID:1156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#172⤵PID:4900
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#173⤵PID:3764
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#174⤵PID:2168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#175⤵PID:2700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#176⤵PID:956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#177⤵PID:4580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#178⤵PID:3688
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#179⤵PID:4284
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#180⤵PID:4712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#181⤵PID:832
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#182⤵PID:1404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#183⤵PID:4116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#184⤵PID:4444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#185⤵PID:2444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#186⤵PID:5056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#187⤵PID:4064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#188⤵PID:3672
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#189⤵PID:1456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#190⤵PID:3792
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#191⤵PID:3468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#192⤵PID:2064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#193⤵PID:4052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#194⤵PID:5128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#195⤵PID:5140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#196⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#197⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#198⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#199⤵PID:5204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1100⤵PID:5224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1101⤵PID:5236
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1102⤵PID:5252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1103⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1104⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1105⤵PID:5292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1106⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1107⤵PID:5324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1108⤵PID:5336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1109⤵PID:5356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1110⤵PID:5368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1111⤵PID:5380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1112⤵PID:5392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1113⤵PID:5404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1114⤵PID:5416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1115⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1116⤵PID:5444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1117⤵PID:5456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1118⤵PID:5472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1119⤵PID:5484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1120⤵PID:5500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1121⤵PID:5512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\14ceeeabeb4263ec7834669333df8bd7_JaffaCakes118.dll,#1122⤵PID:5528
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-