Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
13/07/2024, 01:11 UTC
Static task
static1
Behavioral task
behavioral1
Sample
3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll
-
Size
68KB
-
MD5
3f9b712be290d666c5242b4d22c274a1
-
SHA1
2f6af2b9fb80af0c3ec8ff2b29ab7d5ca9d25ef5
-
SHA256
c855562a0e4faee5dd5a5d4c290dd7574770c9d6be3337465ff382cb5e42b8cf
-
SHA512
311cb0f57b5b8f7df34d7d0771eb442da5952d151ebaaa0b5fe033a84afb52be2420beebd607b3b96e729539fc771c67aae1511367609dc59745e19baf84f9b9
-
SSDEEP
1536:jhT8neDbzaHOA/NMCyK54EqHhZnnkaE4i/:lT4syOoOnKFqBWh/
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 16828 dwm.exe Token: SeChangeNotifyPrivilege 16828 dwm.exe Token: 33 16828 dwm.exe Token: SeIncBasePriorityPrivilege 16828 dwm.exe Token: SeShutdownPrivilege 16828 dwm.exe Token: SeCreatePagefilePrivilege 16828 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2240 4260 rundll32.exe 83 PID 4260 wrote to memory of 2240 4260 rundll32.exe 83 PID 4260 wrote to memory of 2240 4260 rundll32.exe 83 PID 2240 wrote to memory of 3912 2240 rundll32.exe 84 PID 2240 wrote to memory of 3912 2240 rundll32.exe 84 PID 2240 wrote to memory of 3912 2240 rundll32.exe 84 PID 3912 wrote to memory of 3284 3912 rundll32.exe 85 PID 3912 wrote to memory of 3284 3912 rundll32.exe 85 PID 3912 wrote to memory of 3284 3912 rundll32.exe 85 PID 3284 wrote to memory of 2304 3284 rundll32.exe 86 PID 3284 wrote to memory of 2304 3284 rundll32.exe 86 PID 3284 wrote to memory of 2304 3284 rundll32.exe 86 PID 2304 wrote to memory of 3468 2304 rundll32.exe 87 PID 2304 wrote to memory of 3468 2304 rundll32.exe 87 PID 2304 wrote to memory of 3468 2304 rundll32.exe 87 PID 3468 wrote to memory of 5100 3468 rundll32.exe 88 PID 3468 wrote to memory of 5100 3468 rundll32.exe 88 PID 3468 wrote to memory of 5100 3468 rundll32.exe 88 PID 5100 wrote to memory of 4740 5100 rundll32.exe 89 PID 5100 wrote to memory of 4740 5100 rundll32.exe 89 PID 5100 wrote to memory of 4740 5100 rundll32.exe 89 PID 4740 wrote to memory of 1508 4740 rundll32.exe 90 PID 4740 wrote to memory of 1508 4740 rundll32.exe 90 PID 4740 wrote to memory of 1508 4740 rundll32.exe 90 PID 1508 wrote to memory of 2864 1508 rundll32.exe 91 PID 1508 wrote to memory of 2864 1508 rundll32.exe 91 PID 1508 wrote to memory of 2864 1508 rundll32.exe 91 PID 2864 wrote to memory of 2396 2864 rundll32.exe 92 PID 2864 wrote to memory of 2396 2864 rundll32.exe 92 PID 2864 wrote to memory of 2396 2864 rundll32.exe 92 PID 2396 wrote to memory of 4676 2396 rundll32.exe 93 PID 2396 wrote to memory of 4676 2396 rundll32.exe 93 PID 2396 wrote to memory of 4676 2396 rundll32.exe 93 PID 4676 wrote to memory of 1000 4676 rundll32.exe 94 PID 4676 wrote to memory of 1000 4676 rundll32.exe 94 PID 4676 wrote to memory of 1000 4676 rundll32.exe 94 PID 1000 wrote to memory of 3728 1000 rundll32.exe 95 PID 1000 wrote to memory of 3728 1000 rundll32.exe 95 PID 1000 wrote to memory of 3728 1000 rundll32.exe 95 PID 3728 wrote to memory of 2496 3728 rundll32.exe 96 PID 3728 wrote to memory of 2496 3728 rundll32.exe 96 PID 3728 wrote to memory of 2496 3728 rundll32.exe 96 PID 2496 wrote to memory of 2928 2496 rundll32.exe 97 PID 2496 wrote to memory of 2928 2496 rundll32.exe 97 PID 2496 wrote to memory of 2928 2496 rundll32.exe 97 PID 2928 wrote to memory of 3780 2928 rundll32.exe 98 PID 2928 wrote to memory of 3780 2928 rundll32.exe 98 PID 2928 wrote to memory of 3780 2928 rundll32.exe 98 PID 3780 wrote to memory of 5076 3780 rundll32.exe 99 PID 3780 wrote to memory of 5076 3780 rundll32.exe 99 PID 3780 wrote to memory of 5076 3780 rundll32.exe 99 PID 5076 wrote to memory of 4784 5076 rundll32.exe 100 PID 5076 wrote to memory of 4784 5076 rundll32.exe 100 PID 5076 wrote to memory of 4784 5076 rundll32.exe 100 PID 4784 wrote to memory of 2632 4784 rundll32.exe 101 PID 4784 wrote to memory of 2632 4784 rundll32.exe 101 PID 4784 wrote to memory of 2632 4784 rundll32.exe 101 PID 2632 wrote to memory of 644 2632 rundll32.exe 102 PID 2632 wrote to memory of 644 2632 rundll32.exe 102 PID 2632 wrote to memory of 644 2632 rundll32.exe 102 PID 644 wrote to memory of 2768 644 rundll32.exe 103 PID 644 wrote to memory of 2768 644 rundll32.exe 103 PID 644 wrote to memory of 2768 644 rundll32.exe 103 PID 2768 wrote to memory of 2264 2768 rundll32.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#123⤵PID:2264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#124⤵PID:4172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#125⤵PID:3924
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#126⤵PID:4952
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#127⤵PID:1276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#128⤵PID:4180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#129⤵PID:5116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#130⤵PID:1420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#131⤵PID:4460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#132⤵PID:4036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#133⤵PID:2016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#134⤵PID:3680
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#135⤵PID:948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#136⤵PID:3700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#137⤵PID:1504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#138⤵PID:3172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#139⤵PID:3616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#140⤵PID:2948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#141⤵PID:4964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#142⤵PID:4016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#143⤵PID:2216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#144⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#145⤵PID:4208
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#146⤵PID:220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#147⤵PID:3432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#148⤵PID:4508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#149⤵PID:1464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#150⤵PID:2584
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#151⤵PID:3844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#152⤵PID:4028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#153⤵PID:3676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#154⤵PID:3180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#155⤵PID:3684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#156⤵PID:3488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#157⤵PID:4316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#158⤵PID:3480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#159⤵PID:4812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#160⤵PID:396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#161⤵PID:4800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#162⤵PID:4420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#163⤵PID:4880
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#164⤵PID:4396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#165⤵PID:1176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#166⤵PID:448
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#167⤵PID:1328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#168⤵PID:4824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#169⤵PID:2172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#170⤵PID:3716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#171⤵PID:1460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#172⤵PID:4752
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#173⤵PID:928
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#174⤵PID:1212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#175⤵PID:2940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#176⤵PID:3068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#177⤵PID:1684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#178⤵PID:3108
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#179⤵PID:3872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#180⤵PID:2900
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#181⤵PID:2744
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#182⤵PID:860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#183⤵PID:4516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#184⤵PID:2876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#185⤵PID:920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#186⤵PID:4124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#187⤵PID:3084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#188⤵PID:2484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#189⤵PID:1624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#190⤵PID:1940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#191⤵PID:4888
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#192⤵PID:5016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#193⤵PID:884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#194⤵PID:2008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#195⤵PID:4088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#196⤵PID:2520
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#197⤵PID:2140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#198⤵PID:4380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#199⤵PID:4360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1100⤵PID:4356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1101⤵PID:4212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1102⤵PID:3956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1103⤵PID:116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1104⤵PID:376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1105⤵PID:1096
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1106⤵PID:2660
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1107⤵PID:1988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1108⤵PID:2072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1109⤵PID:1292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1110⤵PID:2976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1111⤵PID:1064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1112⤵PID:3712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1113⤵PID:3832
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1114⤵PID:3396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1115⤵PID:5124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1116⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1117⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1118⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1119⤵PID:5180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1120⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1121⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\3f9b712be290d666c5242b4d22c274a1_JaffaCakes118.dll,#1122⤵PID:5232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-