Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 19:14
Static task
static1
Behavioral task
behavioral1
Sample
4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll
-
Size
97KB
-
MD5
4b0ab55b1e2d99823c03345e6f4d4359
-
SHA1
9d75d2d1426123c77d08bdbd2c2d6e6e4c9fb900
-
SHA256
376e9f6d05f8832a4f99b1fb19741e67f278d5417a178e769fb1b5bae914faea
-
SHA512
7ecc1dd144e7291d4f85803972c9a7e864f7528cb6df8832e6a667bc53eaf5b502a9da2676d891e72fafe4887505fe87b4ce607e40c4fc5c1ed3b1f757fb6d6b
-
SSDEEP
3072:z3BlVuG1lnetMNOehBJvIpgkFWhOb2aPNsGEK+V0H:LXcGlnetMNOehBJvIpgkFWhY2ap
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 16540 dwm.exe Token: SeChangeNotifyPrivilege 16540 dwm.exe Token: 33 16540 dwm.exe Token: SeIncBasePriorityPrivilege 16540 dwm.exe Token: SeShutdownPrivilege 16540 dwm.exe Token: SeCreatePagefilePrivilege 16540 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1484 wrote to memory of 4708 1484 rundll32.exe 85 PID 1484 wrote to memory of 4708 1484 rundll32.exe 85 PID 1484 wrote to memory of 4708 1484 rundll32.exe 85 PID 4708 wrote to memory of 400 4708 rundll32.exe 86 PID 4708 wrote to memory of 400 4708 rundll32.exe 86 PID 4708 wrote to memory of 400 4708 rundll32.exe 86 PID 400 wrote to memory of 4068 400 rundll32.exe 87 PID 400 wrote to memory of 4068 400 rundll32.exe 87 PID 400 wrote to memory of 4068 400 rundll32.exe 87 PID 4068 wrote to memory of 3368 4068 rundll32.exe 88 PID 4068 wrote to memory of 3368 4068 rundll32.exe 88 PID 4068 wrote to memory of 3368 4068 rundll32.exe 88 PID 3368 wrote to memory of 684 3368 rundll32.exe 89 PID 3368 wrote to memory of 684 3368 rundll32.exe 89 PID 3368 wrote to memory of 684 3368 rundll32.exe 89 PID 684 wrote to memory of 3348 684 rundll32.exe 90 PID 684 wrote to memory of 3348 684 rundll32.exe 90 PID 684 wrote to memory of 3348 684 rundll32.exe 90 PID 3348 wrote to memory of 3548 3348 rundll32.exe 91 PID 3348 wrote to memory of 3548 3348 rundll32.exe 91 PID 3348 wrote to memory of 3548 3348 rundll32.exe 91 PID 3548 wrote to memory of 1920 3548 rundll32.exe 92 PID 3548 wrote to memory of 1920 3548 rundll32.exe 92 PID 3548 wrote to memory of 1920 3548 rundll32.exe 92 PID 1920 wrote to memory of 3012 1920 rundll32.exe 93 PID 1920 wrote to memory of 3012 1920 rundll32.exe 93 PID 1920 wrote to memory of 3012 1920 rundll32.exe 93 PID 3012 wrote to memory of 4928 3012 rundll32.exe 95 PID 3012 wrote to memory of 4928 3012 rundll32.exe 95 PID 3012 wrote to memory of 4928 3012 rundll32.exe 95 PID 4928 wrote to memory of 3496 4928 rundll32.exe 96 PID 4928 wrote to memory of 3496 4928 rundll32.exe 96 PID 4928 wrote to memory of 3496 4928 rundll32.exe 96 PID 3496 wrote to memory of 3132 3496 rundll32.exe 97 PID 3496 wrote to memory of 3132 3496 rundll32.exe 97 PID 3496 wrote to memory of 3132 3496 rundll32.exe 97 PID 3132 wrote to memory of 2592 3132 rundll32.exe 98 PID 3132 wrote to memory of 2592 3132 rundll32.exe 98 PID 3132 wrote to memory of 2592 3132 rundll32.exe 98 PID 2592 wrote to memory of 2324 2592 rundll32.exe 99 PID 2592 wrote to memory of 2324 2592 rundll32.exe 99 PID 2592 wrote to memory of 2324 2592 rundll32.exe 99 PID 2324 wrote to memory of 4484 2324 rundll32.exe 100 PID 2324 wrote to memory of 4484 2324 rundll32.exe 100 PID 2324 wrote to memory of 4484 2324 rundll32.exe 100 PID 4484 wrote to memory of 1944 4484 rundll32.exe 101 PID 4484 wrote to memory of 1944 4484 rundll32.exe 101 PID 4484 wrote to memory of 1944 4484 rundll32.exe 101 PID 1944 wrote to memory of 4644 1944 rundll32.exe 102 PID 1944 wrote to memory of 4644 1944 rundll32.exe 102 PID 1944 wrote to memory of 4644 1944 rundll32.exe 102 PID 4644 wrote to memory of 232 4644 rundll32.exe 103 PID 4644 wrote to memory of 232 4644 rundll32.exe 103 PID 4644 wrote to memory of 232 4644 rundll32.exe 103 PID 232 wrote to memory of 2844 232 rundll32.exe 104 PID 232 wrote to memory of 2844 232 rundll32.exe 104 PID 232 wrote to memory of 2844 232 rundll32.exe 104 PID 2844 wrote to memory of 3692 2844 rundll32.exe 105 PID 2844 wrote to memory of 3692 2844 rundll32.exe 105 PID 2844 wrote to memory of 3692 2844 rundll32.exe 105 PID 3692 wrote to memory of 1988 3692 rundll32.exe 107 PID 3692 wrote to memory of 1988 3692 rundll32.exe 107 PID 3692 wrote to memory of 1988 3692 rundll32.exe 107 PID 1988 wrote to memory of 1468 1988 rundll32.exe 108
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#123⤵PID:1468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#124⤵PID:528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#125⤵PID:3016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#126⤵PID:4084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#127⤵PID:1500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#128⤵PID:2636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#129⤵PID:3196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#130⤵PID:4608
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#131⤵PID:3284
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#132⤵PID:396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#133⤵PID:3336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#134⤵PID:3580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#135⤵PID:1940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#136⤵PID:1856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#137⤵PID:4908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#138⤵PID:2016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#139⤵PID:4856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#140⤵PID:1708
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#141⤵PID:4076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#142⤵PID:920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#143⤵PID:3532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#144⤵PID:3944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#145⤵PID:4824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#146⤵PID:1280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#147⤵PID:4576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#148⤵PID:800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#149⤵PID:1088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#150⤵PID:3608
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#151⤵PID:4720
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#152⤵PID:3596
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#153⤵PID:868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#154⤵PID:4436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#155⤵PID:3652
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#156⤵PID:3556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#157⤵PID:2708
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#158⤵PID:4732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#159⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#160⤵PID:1996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#161⤵PID:1120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#162⤵PID:976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#163⤵PID:692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#164⤵PID:2004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#165⤵PID:1316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#166⤵PID:4988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#167⤵PID:4788
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#168⤵PID:4476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#169⤵PID:1748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#170⤵PID:1836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#171⤵PID:1564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#172⤵PID:3256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#173⤵PID:3668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#174⤵PID:1656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#175⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#176⤵PID:2428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#177⤵PID:4140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#178⤵PID:3644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#179⤵PID:3684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#180⤵PID:560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#181⤵PID:4544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#182⤵PID:4872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#183⤵PID:324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#184⤵PID:4800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#185⤵PID:3996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#186⤵PID:5008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#187⤵PID:4000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#188⤵PID:3060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#189⤵PID:1840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#190⤵PID:2508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#191⤵PID:4956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#192⤵PID:2136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#193⤵PID:2248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#194⤵PID:4064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#195⤵PID:4808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#196⤵PID:4312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#197⤵PID:4320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#198⤵PID:3960
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#199⤵PID:3968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1100⤵PID:4364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1101⤵PID:2664
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1102⤵PID:4240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1103⤵PID:1180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1104⤵PID:1508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1105⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1106⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1107⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1108⤵PID:5180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1109⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1110⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1111⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1112⤵PID:5248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1113⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1114⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1115⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1116⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1117⤵PID:5324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1118⤵PID:5340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1119⤵PID:5356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1120⤵PID:5372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1121⤵PID:5388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b0ab55b1e2d99823c03345e6f4d4359_JaffaCakes118.dll,#1122⤵PID:5404
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-