Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll
-
Size
281KB
-
MD5
4a8826a7b87e15ec748820109c4124ae
-
SHA1
1830bcd2e037298e10681a2cb75cc283f607cdce
-
SHA256
43d0e290e9e62c39181b89a74bb39a53cb0e474f8873ac854c96879ef7692978
-
SHA512
24266943127d05880b7971fe2c50b39a8042c87ba3f5dc0bfb63c67397254f75570273703241fe5d830c945d576ce5a1434c335fc6a65af57e87bcc14028324e
-
SSDEEP
6144:crIYfo5EcZQS6wYkQ+Yjut9Z2MH17KcUD1R6xg:dY/EQhu7Z2MV7KxD1t
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17316 dwm.exe Token: SeChangeNotifyPrivilege 17316 dwm.exe Token: 33 17316 dwm.exe Token: SeIncBasePriorityPrivilege 17316 dwm.exe Token: SeShutdownPrivilege 17316 dwm.exe Token: SeCreatePagefilePrivilege 17316 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2760 wrote to memory of 4156 2760 rundll32.exe 83 PID 2760 wrote to memory of 4156 2760 rundll32.exe 83 PID 2760 wrote to memory of 4156 2760 rundll32.exe 83 PID 4156 wrote to memory of 928 4156 rundll32.exe 85 PID 4156 wrote to memory of 928 4156 rundll32.exe 85 PID 4156 wrote to memory of 928 4156 rundll32.exe 85 PID 928 wrote to memory of 2228 928 rundll32.exe 86 PID 928 wrote to memory of 2228 928 rundll32.exe 86 PID 928 wrote to memory of 2228 928 rundll32.exe 86 PID 2228 wrote to memory of 2148 2228 rundll32.exe 87 PID 2228 wrote to memory of 2148 2228 rundll32.exe 87 PID 2228 wrote to memory of 2148 2228 rundll32.exe 87 PID 2148 wrote to memory of 1376 2148 rundll32.exe 88 PID 2148 wrote to memory of 1376 2148 rundll32.exe 88 PID 2148 wrote to memory of 1376 2148 rundll32.exe 88 PID 1376 wrote to memory of 1208 1376 rundll32.exe 89 PID 1376 wrote to memory of 1208 1376 rundll32.exe 89 PID 1376 wrote to memory of 1208 1376 rundll32.exe 89 PID 1208 wrote to memory of 1088 1208 rundll32.exe 90 PID 1208 wrote to memory of 1088 1208 rundll32.exe 90 PID 1208 wrote to memory of 1088 1208 rundll32.exe 90 PID 1088 wrote to memory of 1236 1088 rundll32.exe 91 PID 1088 wrote to memory of 1236 1088 rundll32.exe 91 PID 1088 wrote to memory of 1236 1088 rundll32.exe 91 PID 1236 wrote to memory of 3648 1236 rundll32.exe 92 PID 1236 wrote to memory of 3648 1236 rundll32.exe 92 PID 1236 wrote to memory of 3648 1236 rundll32.exe 92 PID 3648 wrote to memory of 2220 3648 rundll32.exe 93 PID 3648 wrote to memory of 2220 3648 rundll32.exe 93 PID 3648 wrote to memory of 2220 3648 rundll32.exe 93 PID 2220 wrote to memory of 3976 2220 rundll32.exe 95 PID 2220 wrote to memory of 3976 2220 rundll32.exe 95 PID 2220 wrote to memory of 3976 2220 rundll32.exe 95 PID 3976 wrote to memory of 116 3976 rundll32.exe 96 PID 3976 wrote to memory of 116 3976 rundll32.exe 96 PID 3976 wrote to memory of 116 3976 rundll32.exe 96 PID 116 wrote to memory of 1644 116 rundll32.exe 97 PID 116 wrote to memory of 1644 116 rundll32.exe 97 PID 116 wrote to memory of 1644 116 rundll32.exe 97 PID 1644 wrote to memory of 1640 1644 rundll32.exe 98 PID 1644 wrote to memory of 1640 1644 rundll32.exe 98 PID 1644 wrote to memory of 1640 1644 rundll32.exe 98 PID 1640 wrote to memory of 1156 1640 rundll32.exe 99 PID 1640 wrote to memory of 1156 1640 rundll32.exe 99 PID 1640 wrote to memory of 1156 1640 rundll32.exe 99 PID 1156 wrote to memory of 4192 1156 rundll32.exe 100 PID 1156 wrote to memory of 4192 1156 rundll32.exe 100 PID 1156 wrote to memory of 4192 1156 rundll32.exe 100 PID 4192 wrote to memory of 3020 4192 rundll32.exe 101 PID 4192 wrote to memory of 3020 4192 rundll32.exe 101 PID 4192 wrote to memory of 3020 4192 rundll32.exe 101 PID 3020 wrote to memory of 3232 3020 rundll32.exe 102 PID 3020 wrote to memory of 3232 3020 rundll32.exe 102 PID 3020 wrote to memory of 3232 3020 rundll32.exe 102 PID 3232 wrote to memory of 440 3232 rundll32.exe 104 PID 3232 wrote to memory of 440 3232 rundll32.exe 104 PID 3232 wrote to memory of 440 3232 rundll32.exe 104 PID 440 wrote to memory of 1880 440 rundll32.exe 105 PID 440 wrote to memory of 1880 440 rundll32.exe 105 PID 440 wrote to memory of 1880 440 rundll32.exe 105 PID 1880 wrote to memory of 4256 1880 rundll32.exe 106 PID 1880 wrote to memory of 4256 1880 rundll32.exe 106 PID 1880 wrote to memory of 4256 1880 rundll32.exe 106 PID 4256 wrote to memory of 1956 4256 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#123⤵PID:1956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#124⤵PID:3660
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#125⤵PID:456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#126⤵PID:2328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#127⤵PID:796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#128⤵PID:2844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#129⤵PID:4944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#130⤵PID:8
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#131⤵PID:4392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#132⤵PID:4656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#133⤵PID:1340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#134⤵PID:632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#135⤵PID:2444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#136⤵PID:4404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#137⤵PID:748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#138⤵PID:5076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#139⤵PID:1840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#140⤵PID:3052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#141⤵PID:4588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#142⤵PID:4796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#143⤵PID:2384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#144⤵PID:972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#145⤵PID:4364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#146⤵PID:4452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#147⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#148⤵PID:3000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#149⤵PID:4824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#150⤵PID:112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#151⤵PID:2268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#152⤵PID:4932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#153⤵PID:4484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#154⤵PID:4592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#155⤵PID:4556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#156⤵PID:2344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#157⤵PID:4116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#158⤵PID:3988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#159⤵PID:4276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#160⤵PID:4812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#161⤵PID:2864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#162⤵PID:2752
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#163⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#164⤵PID:3012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#165⤵PID:3832
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#166⤵PID:4316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#167⤵PID:3916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#168⤵PID:2632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#169⤵PID:3364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#170⤵PID:3496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#171⤵PID:1884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#172⤵PID:2720
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#173⤵PID:1216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#174⤵PID:4340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#175⤵PID:1464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#176⤵PID:216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#177⤵PID:1560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#178⤵PID:1848
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#179⤵PID:1548
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#180⤵PID:2592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#181⤵PID:3964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#182⤵PID:2556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#183⤵PID:1368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#184⤵PID:4084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#185⤵PID:3472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#186⤵PID:4236
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#187⤵PID:2732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#188⤵PID:1020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#189⤵PID:4800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#190⤵PID:3712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#191⤵PID:1620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#192⤵PID:4488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#193⤵PID:536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#194⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#195⤵PID:940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#196⤵PID:1028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#197⤵PID:3228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#198⤵PID:3064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#199⤵PID:4152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1100⤵PID:4260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1101⤵PID:4868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1102⤵PID:5132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1103⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1104⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1105⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1106⤵PID:5196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1107⤵PID:5208
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1108⤵PID:5228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1109⤵PID:5244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1110⤵PID:5256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1111⤵PID:5272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1112⤵PID:5288
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1113⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1114⤵PID:5320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1115⤵PID:5336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1116⤵PID:5356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1117⤵PID:5372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1118⤵PID:5384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1119⤵PID:5400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1120⤵PID:5416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1121⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4a8826a7b87e15ec748820109c4124ae_JaffaCakes118.dll,#1122⤵PID:5448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-