Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
107s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 21:17
Static task
static1
Behavioral task
behavioral1
Sample
4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll
-
Size
138KB
-
MD5
4b702c2c83a275315d5606a70e8488ae
-
SHA1
3a69ec0764739b046e8544d4f01ecfb2e61362c0
-
SHA256
1ce34a49247fe67c57e6a1cd8bd5dfe4c795896a4470d1a7f5b8d9aa1215eb45
-
SHA512
5b346dc0a3244ce5f6b3b6cb0152df2e533e620324f267e26bcd268061114f544a148c9134dad94dd75d7825bf91926af6ecbf1e8aaa2da1a0337bab95634cf7
-
SSDEEP
3072:LqoOQQjZ/WM09hlR9Ck1JjYRHXzBOT3rKTBC9zq9JcnG:LqfQQjZ/WMG7JjIBOrKlWzqUG
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 22 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 8 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe Key created \REGISTRY\USER\S-1-5-21-1750093773-264148664-1320403265-1000_Classes\Local Settings\MuiCache StartMenuExperienceHost.exe -
Suspicious use of AdjustPrivilegeToken 18 IoCs
description pid Process Token: SeCreateGlobalPrivilege 16756 dwm.exe Token: SeChangeNotifyPrivilege 16756 dwm.exe Token: 33 16756 dwm.exe Token: SeIncBasePriorityPrivilege 16756 dwm.exe Token: SeCreateGlobalPrivilege 17488 dwm.exe Token: SeChangeNotifyPrivilege 17488 dwm.exe Token: 33 17488 dwm.exe Token: SeIncBasePriorityPrivilege 17488 dwm.exe Token: SeCreateGlobalPrivilege 17680 dwm.exe Token: SeChangeNotifyPrivilege 17680 dwm.exe Token: 33 17680 dwm.exe Token: SeIncBasePriorityPrivilege 17680 dwm.exe Token: SeCreateGlobalPrivilege 18372 dwm.exe Token: SeChangeNotifyPrivilege 18372 dwm.exe Token: 33 18372 dwm.exe Token: SeIncBasePriorityPrivilege 18372 dwm.exe Token: SeShutdownPrivilege 18372 dwm.exe Token: SeCreatePagefilePrivilege 18372 dwm.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 18000 StartMenuExperienceHost.exe 17332 StartMenuExperienceHost.exe 17636 StartMenuExperienceHost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2356 2344 rundll32.exe 83 PID 2344 wrote to memory of 2356 2344 rundll32.exe 83 PID 2344 wrote to memory of 2356 2344 rundll32.exe 83 PID 2356 wrote to memory of 1712 2356 rundll32.exe 84 PID 2356 wrote to memory of 1712 2356 rundll32.exe 84 PID 2356 wrote to memory of 1712 2356 rundll32.exe 84 PID 1712 wrote to memory of 2044 1712 rundll32.exe 85 PID 1712 wrote to memory of 2044 1712 rundll32.exe 85 PID 1712 wrote to memory of 2044 1712 rundll32.exe 85 PID 2044 wrote to memory of 5096 2044 rundll32.exe 86 PID 2044 wrote to memory of 5096 2044 rundll32.exe 86 PID 2044 wrote to memory of 5096 2044 rundll32.exe 86 PID 5096 wrote to memory of 3724 5096 rundll32.exe 87 PID 5096 wrote to memory of 3724 5096 rundll32.exe 87 PID 5096 wrote to memory of 3724 5096 rundll32.exe 87 PID 3724 wrote to memory of 4904 3724 rundll32.exe 88 PID 3724 wrote to memory of 4904 3724 rundll32.exe 88 PID 3724 wrote to memory of 4904 3724 rundll32.exe 88 PID 4904 wrote to memory of 2908 4904 rundll32.exe 89 PID 4904 wrote to memory of 2908 4904 rundll32.exe 89 PID 4904 wrote to memory of 2908 4904 rundll32.exe 89 PID 2908 wrote to memory of 4364 2908 rundll32.exe 90 PID 2908 wrote to memory of 4364 2908 rundll32.exe 90 PID 2908 wrote to memory of 4364 2908 rundll32.exe 90 PID 4364 wrote to memory of 4060 4364 rundll32.exe 91 PID 4364 wrote to memory of 4060 4364 rundll32.exe 91 PID 4364 wrote to memory of 4060 4364 rundll32.exe 91 PID 4060 wrote to memory of 5020 4060 rundll32.exe 92 PID 4060 wrote to memory of 5020 4060 rundll32.exe 92 PID 4060 wrote to memory of 5020 4060 rundll32.exe 92 PID 5020 wrote to memory of 4428 5020 rundll32.exe 94 PID 5020 wrote to memory of 4428 5020 rundll32.exe 94 PID 5020 wrote to memory of 4428 5020 rundll32.exe 94 PID 4428 wrote to memory of 2760 4428 rundll32.exe 95 PID 4428 wrote to memory of 2760 4428 rundll32.exe 95 PID 4428 wrote to memory of 2760 4428 rundll32.exe 95 PID 2760 wrote to memory of 2936 2760 rundll32.exe 96 PID 2760 wrote to memory of 2936 2760 rundll32.exe 96 PID 2760 wrote to memory of 2936 2760 rundll32.exe 96 PID 2936 wrote to memory of 1924 2936 rundll32.exe 97 PID 2936 wrote to memory of 1924 2936 rundll32.exe 97 PID 2936 wrote to memory of 1924 2936 rundll32.exe 97 PID 1924 wrote to memory of 3056 1924 rundll32.exe 98 PID 1924 wrote to memory of 3056 1924 rundll32.exe 98 PID 1924 wrote to memory of 3056 1924 rundll32.exe 98 PID 3056 wrote to memory of 3456 3056 rundll32.exe 99 PID 3056 wrote to memory of 3456 3056 rundll32.exe 99 PID 3056 wrote to memory of 3456 3056 rundll32.exe 99 PID 3456 wrote to memory of 4568 3456 rundll32.exe 100 PID 3456 wrote to memory of 4568 3456 rundll32.exe 100 PID 3456 wrote to memory of 4568 3456 rundll32.exe 100 PID 4568 wrote to memory of 2168 4568 rundll32.exe 101 PID 4568 wrote to memory of 2168 4568 rundll32.exe 101 PID 4568 wrote to memory of 2168 4568 rundll32.exe 101 PID 2168 wrote to memory of 3256 2168 rundll32.exe 102 PID 2168 wrote to memory of 3256 2168 rundll32.exe 102 PID 2168 wrote to memory of 3256 2168 rundll32.exe 102 PID 3256 wrote to memory of 344 3256 rundll32.exe 103 PID 3256 wrote to memory of 344 3256 rundll32.exe 103 PID 3256 wrote to memory of 344 3256 rundll32.exe 103 PID 344 wrote to memory of 1688 344 rundll32.exe 104 PID 344 wrote to memory of 1688 344 rundll32.exe 104 PID 344 wrote to memory of 1688 344 rundll32.exe 104 PID 1688 wrote to memory of 448 1688 rundll32.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#123⤵PID:448
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#124⤵PID:4456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#125⤵PID:2988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#126⤵PID:3772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#127⤵PID:5112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#128⤵PID:228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#129⤵PID:5048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#130⤵PID:3660
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#131⤵PID:4072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#132⤵PID:3584
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#133⤵PID:1200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#134⤵PID:2392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#135⤵PID:4404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#136⤵PID:3916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#137⤵PID:2284
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#138⤵PID:3548
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#139⤵PID:1572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#140⤵PID:2868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#141⤵PID:1412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#142⤵PID:1776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#143⤵PID:2876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#144⤵PID:2244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#145⤵PID:2436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#146⤵PID:4416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#147⤵PID:3872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#148⤵PID:392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#149⤵PID:1292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#150⤵PID:2256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#151⤵PID:512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#152⤵PID:2620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#153⤵PID:1488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#154⤵PID:2376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#155⤵PID:5080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#156⤵PID:1740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#157⤵PID:2780
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#158⤵PID:4924
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#159⤵PID:4116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#160⤵PID:380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#161⤵PID:620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#162⤵PID:2020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#163⤵PID:3524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#164⤵PID:932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#165⤵PID:4940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#166⤵PID:3492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#167⤵PID:2340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#168⤵PID:1716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#169⤵PID:3836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#170⤵PID:4816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#171⤵PID:2516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#172⤵PID:2172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#173⤵PID:3956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#174⤵PID:1852
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#175⤵PID:4764
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#176⤵PID:4828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#177⤵PID:5036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#178⤵PID:5028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#179⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#180⤵PID:3288
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#181⤵PID:404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#182⤵PID:2016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#183⤵PID:668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#184⤵PID:740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#185⤵PID:4748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#186⤵PID:4340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#187⤵PID:1088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#188⤵PID:1112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#189⤵PID:2380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#190⤵PID:4432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#191⤵PID:4268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#192⤵PID:1372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#193⤵PID:1920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#194⤵PID:212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#195⤵PID:2768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#196⤵PID:4916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#197⤵PID:3120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#198⤵PID:208
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#199⤵PID:2852
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1100⤵PID:3544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1101⤵PID:5128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1102⤵PID:5144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1103⤵PID:5160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1104⤵PID:5176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1105⤵PID:5192
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1106⤵PID:5208
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1107⤵PID:5224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1108⤵PID:5240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1109⤵PID:5252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1110⤵PID:5268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1111⤵PID:5292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1112⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1113⤵PID:5320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1114⤵PID:5340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1115⤵PID:5352
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1116⤵PID:5380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1117⤵PID:5404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1118⤵PID:5420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1119⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1120⤵PID:5452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1121⤵PID:5468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4b702c2c83a275315d5606a70e8488ae_JaffaCakes118.dll,#1122⤵PID:5484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-