Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 01:03
Static task
static1
Behavioral task
behavioral1
Sample
4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll
-
Size
169KB
-
MD5
4c2c6d613ac9a7c119a194e92a28b041
-
SHA1
a31378f1e851a9d24ce45045f10004725eb8c20e
-
SHA256
3f02e8b4f4e40392be955566f116ff1594e788f41388f311b6157220b847a804
-
SHA512
bfef43d83eb73effd8b2327dc37ba00decb160ff96d6f2b3cbd4166f975d49cc3ea86647136b51046e0ff62b5157759565ec18a0144bf2143adc457f040e57a5
-
SSDEEP
3072:vcgOPyMfbpji5F9xB1DpafD0Je9eknGjFLSsGrLP6aytkKkgZz:11MfRiTl1DJ89rnGhQ6Xr1
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17348 dwm.exe Token: SeChangeNotifyPrivilege 17348 dwm.exe Token: 33 17348 dwm.exe Token: SeIncBasePriorityPrivilege 17348 dwm.exe Token: SeShutdownPrivilege 17348 dwm.exe Token: SeCreatePagefilePrivilege 17348 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1076 wrote to memory of 628 1076 rundll32.exe 83 PID 1076 wrote to memory of 628 1076 rundll32.exe 83 PID 1076 wrote to memory of 628 1076 rundll32.exe 83 PID 628 wrote to memory of 2272 628 rundll32.exe 85 PID 628 wrote to memory of 2272 628 rundll32.exe 85 PID 628 wrote to memory of 2272 628 rundll32.exe 85 PID 2272 wrote to memory of 2644 2272 rundll32.exe 86 PID 2272 wrote to memory of 2644 2272 rundll32.exe 86 PID 2272 wrote to memory of 2644 2272 rundll32.exe 86 PID 2644 wrote to memory of 3632 2644 rundll32.exe 87 PID 2644 wrote to memory of 3632 2644 rundll32.exe 87 PID 2644 wrote to memory of 3632 2644 rundll32.exe 87 PID 3632 wrote to memory of 1188 3632 rundll32.exe 88 PID 3632 wrote to memory of 1188 3632 rundll32.exe 88 PID 3632 wrote to memory of 1188 3632 rundll32.exe 88 PID 1188 wrote to memory of 1264 1188 rundll32.exe 89 PID 1188 wrote to memory of 1264 1188 rundll32.exe 89 PID 1188 wrote to memory of 1264 1188 rundll32.exe 89 PID 1264 wrote to memory of 2252 1264 rundll32.exe 90 PID 1264 wrote to memory of 2252 1264 rundll32.exe 90 PID 1264 wrote to memory of 2252 1264 rundll32.exe 90 PID 2252 wrote to memory of 1992 2252 rundll32.exe 91 PID 2252 wrote to memory of 1992 2252 rundll32.exe 91 PID 2252 wrote to memory of 1992 2252 rundll32.exe 91 PID 1992 wrote to memory of 4880 1992 rundll32.exe 92 PID 1992 wrote to memory of 4880 1992 rundll32.exe 92 PID 1992 wrote to memory of 4880 1992 rundll32.exe 92 PID 4880 wrote to memory of 556 4880 rundll32.exe 93 PID 4880 wrote to memory of 556 4880 rundll32.exe 93 PID 4880 wrote to memory of 556 4880 rundll32.exe 93 PID 556 wrote to memory of 944 556 rundll32.exe 94 PID 556 wrote to memory of 944 556 rundll32.exe 94 PID 556 wrote to memory of 944 556 rundll32.exe 94 PID 944 wrote to memory of 3224 944 rundll32.exe 95 PID 944 wrote to memory of 3224 944 rundll32.exe 95 PID 944 wrote to memory of 3224 944 rundll32.exe 95 PID 3224 wrote to memory of 2540 3224 rundll32.exe 96 PID 3224 wrote to memory of 2540 3224 rundll32.exe 96 PID 3224 wrote to memory of 2540 3224 rundll32.exe 96 PID 2540 wrote to memory of 384 2540 rundll32.exe 97 PID 2540 wrote to memory of 384 2540 rundll32.exe 97 PID 2540 wrote to memory of 384 2540 rundll32.exe 97 PID 384 wrote to memory of 4060 384 rundll32.exe 99 PID 384 wrote to memory of 4060 384 rundll32.exe 99 PID 384 wrote to memory of 4060 384 rundll32.exe 99 PID 4060 wrote to memory of 216 4060 rundll32.exe 100 PID 4060 wrote to memory of 216 4060 rundll32.exe 100 PID 4060 wrote to memory of 216 4060 rundll32.exe 100 PID 216 wrote to memory of 912 216 rundll32.exe 101 PID 216 wrote to memory of 912 216 rundll32.exe 101 PID 216 wrote to memory of 912 216 rundll32.exe 101 PID 912 wrote to memory of 4884 912 rundll32.exe 102 PID 912 wrote to memory of 4884 912 rundll32.exe 102 PID 912 wrote to memory of 4884 912 rundll32.exe 102 PID 4884 wrote to memory of 224 4884 rundll32.exe 104 PID 4884 wrote to memory of 224 4884 rundll32.exe 104 PID 4884 wrote to memory of 224 4884 rundll32.exe 104 PID 224 wrote to memory of 4308 224 rundll32.exe 105 PID 224 wrote to memory of 4308 224 rundll32.exe 105 PID 224 wrote to memory of 4308 224 rundll32.exe 105 PID 4308 wrote to memory of 2524 4308 rundll32.exe 106 PID 4308 wrote to memory of 2524 4308 rundll32.exe 106 PID 4308 wrote to memory of 2524 4308 rundll32.exe 106 PID 2524 wrote to memory of 4332 2524 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#123⤵PID:4332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#124⤵PID:4964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#125⤵PID:1868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#126⤵PID:4768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#127⤵PID:3096
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#128⤵PID:2140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#129⤵PID:4008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#130⤵PID:2552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#131⤵PID:1460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#132⤵PID:736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#133⤵PID:2444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#134⤵PID:3872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#135⤵PID:2260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#136⤵PID:2408
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#137⤵PID:1560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#138⤵PID:1792
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#139⤵PID:4624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#140⤵PID:1580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#141⤵PID:892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#142⤵PID:3968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#143⤵PID:1096
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#144⤵PID:1948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#145⤵PID:4048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#146⤵PID:624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#147⤵PID:4648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#148⤵PID:3520
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#149⤵PID:5020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#150⤵PID:2660
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#151⤵PID:884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#152⤵PID:5076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#153⤵PID:4856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#154⤵PID:5036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#155⤵PID:4700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#156⤵PID:3764
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#157⤵PID:4180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#158⤵PID:4052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#159⤵PID:4040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#160⤵PID:744
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#161⤵PID:4028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#162⤵PID:1988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#163⤵PID:4952
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#164⤵PID:4944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#165⤵PID:4696
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#166⤵PID:3908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#167⤵PID:1892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#168⤵PID:388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#169⤵PID:1116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#170⤵PID:1436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#171⤵PID:3420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#172⤵PID:4012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#173⤵PID:1644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#174⤵PID:4392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#175⤵PID:3500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#176⤵PID:2292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#177⤵PID:3264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#178⤵PID:2148
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#179⤵PID:4080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#180⤵PID:4688
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#181⤵PID:724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#182⤵PID:1080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#183⤵PID:2404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#184⤵PID:3120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#185⤵PID:4956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#186⤵PID:5064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#187⤵PID:4792
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#188⤵PID:4568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#189⤵PID:2464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#190⤵PID:1512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#191⤵PID:4376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#192⤵PID:1564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#193⤵PID:1112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#194⤵PID:872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#195⤵PID:3380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#196⤵PID:4024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#197⤵PID:3212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#198⤵PID:2624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#199⤵PID:5008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1100⤵PID:4312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1101⤵PID:3868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1102⤵PID:4896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1103⤵PID:3428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1104⤵PID:1920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1105⤵PID:2896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1106⤵PID:960
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1107⤵PID:2212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1108⤵PID:3964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1109⤵PID:2224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1110⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1111⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1112⤵PID:5164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1113⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1114⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1115⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1116⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1117⤵PID:5244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1118⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1119⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1120⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1121⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4c2c6d613ac9a7c119a194e92a28b041_JaffaCakes118.dll,#1122⤵PID:5332
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-