Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2024 06:22
Static task
static1
Behavioral task
behavioral1
Sample
2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll
Resource
win10v2004-20240704-en
General
-
Target
2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll
-
Size
39KB
-
MD5
2f49b338b5893aed51eaa798d8a86fd2
-
SHA1
bdf31fbc8cf42137f7dd4d5de0d06935802bc5e9
-
SHA256
02d71c2d99ff09168bce9b43bba9151188a0ec583f5d534ff595b12c23d5ad5d
-
SHA512
1636ca18b9ee815df1a629ddd05ef26092c95e0b020acb90f6dfc1fe08723ccfb73a1afc26faaf103a1516199f4ce6db4fa1b7fbaa6840227a334a068542e946
-
SSDEEP
768:firVdDjSxFV5vSGD6GeIJ65vkwV19sl284T:fejSPJDja797/
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17032 dwm.exe Token: SeChangeNotifyPrivilege 17032 dwm.exe Token: 33 17032 dwm.exe Token: SeIncBasePriorityPrivilege 17032 dwm.exe Token: SeShutdownPrivilege 17032 dwm.exe Token: SeCreatePagefilePrivilege 17032 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3016 1996 rundll32.exe 82 PID 1996 wrote to memory of 3016 1996 rundll32.exe 82 PID 1996 wrote to memory of 3016 1996 rundll32.exe 82 PID 3016 wrote to memory of 4236 3016 rundll32.exe 83 PID 3016 wrote to memory of 4236 3016 rundll32.exe 83 PID 3016 wrote to memory of 4236 3016 rundll32.exe 83 PID 4236 wrote to memory of 1812 4236 rundll32.exe 84 PID 4236 wrote to memory of 1812 4236 rundll32.exe 84 PID 4236 wrote to memory of 1812 4236 rundll32.exe 84 PID 1812 wrote to memory of 4000 1812 rundll32.exe 85 PID 1812 wrote to memory of 4000 1812 rundll32.exe 85 PID 1812 wrote to memory of 4000 1812 rundll32.exe 85 PID 4000 wrote to memory of 4304 4000 rundll32.exe 86 PID 4000 wrote to memory of 4304 4000 rundll32.exe 86 PID 4000 wrote to memory of 4304 4000 rundll32.exe 86 PID 4304 wrote to memory of 2820 4304 rundll32.exe 87 PID 4304 wrote to memory of 2820 4304 rundll32.exe 87 PID 4304 wrote to memory of 2820 4304 rundll32.exe 87 PID 2820 wrote to memory of 2984 2820 rundll32.exe 88 PID 2820 wrote to memory of 2984 2820 rundll32.exe 88 PID 2820 wrote to memory of 2984 2820 rundll32.exe 88 PID 2984 wrote to memory of 3460 2984 rundll32.exe 89 PID 2984 wrote to memory of 3460 2984 rundll32.exe 89 PID 2984 wrote to memory of 3460 2984 rundll32.exe 89 PID 3460 wrote to memory of 3696 3460 rundll32.exe 90 PID 3460 wrote to memory of 3696 3460 rundll32.exe 90 PID 3460 wrote to memory of 3696 3460 rundll32.exe 90 PID 3696 wrote to memory of 3276 3696 rundll32.exe 92 PID 3696 wrote to memory of 3276 3696 rundll32.exe 92 PID 3696 wrote to memory of 3276 3696 rundll32.exe 92 PID 3276 wrote to memory of 4900 3276 rundll32.exe 93 PID 3276 wrote to memory of 4900 3276 rundll32.exe 93 PID 3276 wrote to memory of 4900 3276 rundll32.exe 93 PID 4900 wrote to memory of 3960 4900 rundll32.exe 94 PID 4900 wrote to memory of 3960 4900 rundll32.exe 94 PID 4900 wrote to memory of 3960 4900 rundll32.exe 94 PID 3960 wrote to memory of 4464 3960 rundll32.exe 95 PID 3960 wrote to memory of 4464 3960 rundll32.exe 95 PID 3960 wrote to memory of 4464 3960 rundll32.exe 95 PID 4464 wrote to memory of 2024 4464 rundll32.exe 96 PID 4464 wrote to memory of 2024 4464 rundll32.exe 96 PID 4464 wrote to memory of 2024 4464 rundll32.exe 96 PID 2024 wrote to memory of 1556 2024 rundll32.exe 97 PID 2024 wrote to memory of 1556 2024 rundll32.exe 97 PID 2024 wrote to memory of 1556 2024 rundll32.exe 97 PID 1556 wrote to memory of 1896 1556 rundll32.exe 98 PID 1556 wrote to memory of 1896 1556 rundll32.exe 98 PID 1556 wrote to memory of 1896 1556 rundll32.exe 98 PID 1896 wrote to memory of 2028 1896 rundll32.exe 99 PID 1896 wrote to memory of 2028 1896 rundll32.exe 99 PID 1896 wrote to memory of 2028 1896 rundll32.exe 99 PID 2028 wrote to memory of 4484 2028 rundll32.exe 101 PID 2028 wrote to memory of 4484 2028 rundll32.exe 101 PID 2028 wrote to memory of 4484 2028 rundll32.exe 101 PID 4484 wrote to memory of 1440 4484 rundll32.exe 102 PID 4484 wrote to memory of 1440 4484 rundll32.exe 102 PID 4484 wrote to memory of 1440 4484 rundll32.exe 102 PID 1440 wrote to memory of 4016 1440 rundll32.exe 103 PID 1440 wrote to memory of 4016 1440 rundll32.exe 103 PID 1440 wrote to memory of 4016 1440 rundll32.exe 103 PID 4016 wrote to memory of 2076 4016 rundll32.exe 104 PID 4016 wrote to memory of 2076 4016 rundll32.exe 104 PID 4016 wrote to memory of 2076 4016 rundll32.exe 104 PID 2076 wrote to memory of 212 2076 rundll32.exe 105
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#123⤵PID:212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#124⤵PID:224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#125⤵PID:1060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#126⤵PID:796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#127⤵PID:1076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#128⤵PID:5072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#129⤵PID:1172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#130⤵PID:4888
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#131⤵PID:1240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#132⤵PID:3324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#133⤵PID:4176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#134⤵PID:3624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#135⤵PID:1944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#136⤵PID:4260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#137⤵PID:2328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#138⤵PID:1632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#139⤵PID:3544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#140⤵PID:1428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#141⤵PID:4836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#142⤵PID:4448
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#143⤵PID:3988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#144⤵PID:3984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#145⤵PID:4572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#146⤵PID:3468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#147⤵PID:4508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#148⤵PID:836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#149⤵PID:4752
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#150⤵PID:1480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#151⤵PID:2184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#152⤵PID:4280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#153⤵PID:2280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#154⤵PID:2192
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#155⤵PID:2716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#156⤵PID:3800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#157⤵PID:3704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#158⤵PID:4004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#159⤵PID:4504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#160⤵PID:5048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#161⤵PID:3748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#162⤵PID:1300
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#163⤵PID:2516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#164⤵PID:2140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#165⤵PID:1876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#166⤵PID:1376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#167⤵PID:3316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#168⤵PID:1104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#169⤵PID:3204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#170⤵PID:3368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#171⤵PID:1168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#172⤵PID:1412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#173⤵PID:1312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#174⤵PID:372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#175⤵PID:1500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#176⤵PID:396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#177⤵PID:484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#178⤵PID:4340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#179⤵PID:1828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#180⤵PID:3464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#181⤵PID:1680
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#182⤵PID:4172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#183⤵PID:3444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#184⤵PID:4848
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#185⤵PID:1916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#186⤵PID:4088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#187⤵PID:3532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#188⤵PID:3508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#189⤵PID:2132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#190⤵PID:3712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#191⤵PID:1392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#192⤵PID:4744
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#193⤵PID:2680
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#194⤵PID:2604
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#195⤵PID:4636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#196⤵PID:2720
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#197⤵PID:556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#198⤵PID:4092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#199⤵PID:1948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1100⤵PID:2980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1101⤵PID:4984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1102⤵PID:2332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1103⤵PID:4704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1104⤵PID:4532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1105⤵PID:2260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1106⤵PID:5000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1107⤵PID:4240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1108⤵PID:4868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1109⤵PID:1576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1110⤵PID:644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1111⤵PID:3572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1112⤵PID:1068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1113⤵PID:1244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1114⤵PID:5128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1115⤵PID:5144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1116⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1117⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1118⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1119⤵PID:5204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1120⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1121⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2f49b338b5893aed51eaa798d8a86fd2_JaffaCakes118.dll,#1122⤵PID:5248
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-