Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2024, 17:40
Static task
static1
Behavioral task
behavioral1
Sample
2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll
-
Size
252KB
-
MD5
2d3e490af7364b029a0a14c63ca7c222
-
SHA1
e6d0527d1c8043c0d41a57fe6f34a113a46dde12
-
SHA256
c79a383d074f63d987de1ce3c9a606a5d11a89321ae99d9f0808befa721727f2
-
SHA512
61a63597b3d6bcaabeb60d3263e39d683541b28b9c32ec2e0f9aca89e3ce47bc60f93486ae5f6852303b18d186a7324a652f13e6d5f3b51106d39ee14d2abaf7
-
SSDEEP
6144:ALWNtv1W01fvKFGiS5hvqRpXz/AKKYv850W7nMNQxcNeMJqxah:ltv1W0IFGiS5JeprW70QxcPJHh
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17400 dwm.exe Token: SeChangeNotifyPrivilege 17400 dwm.exe Token: 33 17400 dwm.exe Token: SeIncBasePriorityPrivilege 17400 dwm.exe Token: SeShutdownPrivilege 17400 dwm.exe Token: SeCreatePagefilePrivilege 17400 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5000 wrote to memory of 3780 5000 rundll32.exe 82 PID 5000 wrote to memory of 3780 5000 rundll32.exe 82 PID 5000 wrote to memory of 3780 5000 rundll32.exe 82 PID 3780 wrote to memory of 3764 3780 rundll32.exe 83 PID 3780 wrote to memory of 3764 3780 rundll32.exe 83 PID 3780 wrote to memory of 3764 3780 rundll32.exe 83 PID 3764 wrote to memory of 1624 3764 rundll32.exe 84 PID 3764 wrote to memory of 1624 3764 rundll32.exe 84 PID 3764 wrote to memory of 1624 3764 rundll32.exe 84 PID 1624 wrote to memory of 4580 1624 rundll32.exe 85 PID 1624 wrote to memory of 4580 1624 rundll32.exe 85 PID 1624 wrote to memory of 4580 1624 rundll32.exe 85 PID 4580 wrote to memory of 436 4580 rundll32.exe 86 PID 4580 wrote to memory of 436 4580 rundll32.exe 86 PID 4580 wrote to memory of 436 4580 rundll32.exe 86 PID 436 wrote to memory of 1108 436 rundll32.exe 87 PID 436 wrote to memory of 1108 436 rundll32.exe 87 PID 436 wrote to memory of 1108 436 rundll32.exe 87 PID 1108 wrote to memory of 2968 1108 rundll32.exe 88 PID 1108 wrote to memory of 2968 1108 rundll32.exe 88 PID 1108 wrote to memory of 2968 1108 rundll32.exe 88 PID 2968 wrote to memory of 1312 2968 rundll32.exe 89 PID 2968 wrote to memory of 1312 2968 rundll32.exe 89 PID 2968 wrote to memory of 1312 2968 rundll32.exe 89 PID 1312 wrote to memory of 2600 1312 rundll32.exe 90 PID 1312 wrote to memory of 2600 1312 rundll32.exe 90 PID 1312 wrote to memory of 2600 1312 rundll32.exe 90 PID 2600 wrote to memory of 3008 2600 rundll32.exe 91 PID 2600 wrote to memory of 3008 2600 rundll32.exe 91 PID 2600 wrote to memory of 3008 2600 rundll32.exe 91 PID 3008 wrote to memory of 3968 3008 rundll32.exe 92 PID 3008 wrote to memory of 3968 3008 rundll32.exe 92 PID 3008 wrote to memory of 3968 3008 rundll32.exe 92 PID 3968 wrote to memory of 1284 3968 rundll32.exe 93 PID 3968 wrote to memory of 1284 3968 rundll32.exe 93 PID 3968 wrote to memory of 1284 3968 rundll32.exe 93 PID 1284 wrote to memory of 1428 1284 rundll32.exe 94 PID 1284 wrote to memory of 1428 1284 rundll32.exe 94 PID 1284 wrote to memory of 1428 1284 rundll32.exe 94 PID 1428 wrote to memory of 540 1428 rundll32.exe 95 PID 1428 wrote to memory of 540 1428 rundll32.exe 95 PID 1428 wrote to memory of 540 1428 rundll32.exe 95 PID 540 wrote to memory of 4424 540 rundll32.exe 97 PID 540 wrote to memory of 4424 540 rundll32.exe 97 PID 540 wrote to memory of 4424 540 rundll32.exe 97 PID 4424 wrote to memory of 4072 4424 rundll32.exe 98 PID 4424 wrote to memory of 4072 4424 rundll32.exe 98 PID 4424 wrote to memory of 4072 4424 rundll32.exe 98 PID 4072 wrote to memory of 1388 4072 rundll32.exe 99 PID 4072 wrote to memory of 1388 4072 rundll32.exe 99 PID 4072 wrote to memory of 1388 4072 rundll32.exe 99 PID 1388 wrote to memory of 2432 1388 rundll32.exe 100 PID 1388 wrote to memory of 2432 1388 rundll32.exe 100 PID 1388 wrote to memory of 2432 1388 rundll32.exe 100 PID 2432 wrote to memory of 1920 2432 rundll32.exe 101 PID 2432 wrote to memory of 1920 2432 rundll32.exe 101 PID 2432 wrote to memory of 1920 2432 rundll32.exe 101 PID 1920 wrote to memory of 4888 1920 rundll32.exe 102 PID 1920 wrote to memory of 4888 1920 rundll32.exe 102 PID 1920 wrote to memory of 4888 1920 rundll32.exe 102 PID 4888 wrote to memory of 2460 4888 rundll32.exe 104 PID 4888 wrote to memory of 2460 4888 rundll32.exe 104 PID 4888 wrote to memory of 2460 4888 rundll32.exe 104 PID 2460 wrote to memory of 3172 2460 rundll32.exe 105
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#123⤵PID:3172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#124⤵PID:2996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#125⤵PID:2020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#126⤵PID:1572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#127⤵PID:5076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#128⤵PID:184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#129⤵PID:4724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#130⤵PID:216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#131⤵PID:3252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#132⤵PID:4904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#133⤵PID:1480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#134⤵PID:232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#135⤵PID:3676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#136⤵PID:2340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#137⤵PID:864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#138⤵PID:4984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#139⤵PID:2216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#140⤵PID:4440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#141⤵PID:4268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#142⤵PID:636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#143⤵PID:3624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#144⤵PID:2524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#145⤵PID:4036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#146⤵PID:3772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#147⤵PID:3428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#148⤵PID:3456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#149⤵PID:1096
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#150⤵PID:4016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#151⤵PID:2256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#152⤵PID:3596
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#153⤵PID:4044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#154⤵PID:4048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#155⤵PID:4524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#156⤵PID:3060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#157⤵PID:3600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#158⤵PID:4324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#159⤵PID:1128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#160⤵PID:2148
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#161⤵PID:2068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#162⤵PID:4824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#163⤵PID:3396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#164⤵PID:1040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#165⤵PID:5116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#166⤵PID:900
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#167⤵PID:4860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#168⤵PID:1608
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#169⤵PID:4444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#170⤵PID:2172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#171⤵PID:944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#172⤵PID:3864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#173⤵PID:3480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#174⤵PID:5072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#175⤵PID:4996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#176⤵PID:3916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#177⤵PID:3412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#178⤵PID:4808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#179⤵PID:2136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#180⤵PID:3024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#181⤵PID:4592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#182⤵PID:5084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#183⤵PID:5056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#184⤵PID:2280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#185⤵PID:3052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#186⤵PID:3464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#187⤵PID:1172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#188⤵PID:2044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#189⤵PID:5044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#190⤵PID:3568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#191⤵PID:4436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#192⤵PID:2912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#193⤵PID:4404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#194⤵PID:4456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#195⤵PID:4164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#196⤵PID:472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#197⤵PID:3872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#198⤵PID:2512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#199⤵PID:3860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1100⤵PID:1356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1101⤵PID:5124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1102⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1103⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1104⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1105⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1106⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1107⤵PID:5212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1108⤵PID:5228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1109⤵PID:5244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1110⤵PID:5260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1111⤵PID:5276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1112⤵PID:5292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1113⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1114⤵PID:5320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1115⤵PID:5336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1116⤵PID:5352
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1117⤵PID:5368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1118⤵PID:5384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1119⤵PID:5400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1120⤵PID:5416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1121⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2d3e490af7364b029a0a14c63ca7c222_JaffaCakes118.dll,#1122⤵PID:5448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-