Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
16/07/2024, 09:39
Static task
static1
Behavioral task
behavioral1
Sample
4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll
Resource
win10v2004-20240709-en
General
-
Target
4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll
-
Size
6KB
-
MD5
4dc0e6a45d877a0760103c00738f6651
-
SHA1
b9ca3de0c637cba1eb6028f2eb2073d09e8323be
-
SHA256
16eeb5e054c1835e5b2ab9fb36935217a269bd9d98a9d88ab90ae37376ef54d0
-
SHA512
f7adb501a5eaef1446ad9ffd6b8c3a94c31f4d13b7a47fc655fb41a5feedcb6458487d48831e0a6aae206b7c54718c01b9e9c3d177fd2e86f0d00a00b75230ac
-
SSDEEP
96:nPzPo6uzAuAqlEOCksTWPlCrg7ej4X/J3EEPX4P7Kk6P1nR6s:n7Po6MAyuOxXlrdZEEPVk6tnJ
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17220 dwm.exe Token: SeChangeNotifyPrivilege 17220 dwm.exe Token: 33 17220 dwm.exe Token: SeIncBasePriorityPrivilege 17220 dwm.exe Token: SeShutdownPrivilege 17220 dwm.exe Token: SeCreatePagefilePrivilege 17220 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4616 1528 rundll32.exe 83 PID 1528 wrote to memory of 4616 1528 rundll32.exe 83 PID 1528 wrote to memory of 4616 1528 rundll32.exe 83 PID 4616 wrote to memory of 1544 4616 rundll32.exe 84 PID 4616 wrote to memory of 1544 4616 rundll32.exe 84 PID 4616 wrote to memory of 1544 4616 rundll32.exe 84 PID 1544 wrote to memory of 1480 1544 rundll32.exe 85 PID 1544 wrote to memory of 1480 1544 rundll32.exe 85 PID 1544 wrote to memory of 1480 1544 rundll32.exe 85 PID 1480 wrote to memory of 4356 1480 rundll32.exe 86 PID 1480 wrote to memory of 4356 1480 rundll32.exe 86 PID 1480 wrote to memory of 4356 1480 rundll32.exe 86 PID 4356 wrote to memory of 2292 4356 rundll32.exe 88 PID 4356 wrote to memory of 2292 4356 rundll32.exe 88 PID 4356 wrote to memory of 2292 4356 rundll32.exe 88 PID 2292 wrote to memory of 4036 2292 rundll32.exe 89 PID 2292 wrote to memory of 4036 2292 rundll32.exe 89 PID 2292 wrote to memory of 4036 2292 rundll32.exe 89 PID 4036 wrote to memory of 884 4036 rundll32.exe 90 PID 4036 wrote to memory of 884 4036 rundll32.exe 90 PID 4036 wrote to memory of 884 4036 rundll32.exe 90 PID 884 wrote to memory of 2652 884 rundll32.exe 91 PID 884 wrote to memory of 2652 884 rundll32.exe 91 PID 884 wrote to memory of 2652 884 rundll32.exe 91 PID 2652 wrote to memory of 2764 2652 rundll32.exe 92 PID 2652 wrote to memory of 2764 2652 rundll32.exe 92 PID 2652 wrote to memory of 2764 2652 rundll32.exe 92 PID 2764 wrote to memory of 3628 2764 rundll32.exe 93 PID 2764 wrote to memory of 3628 2764 rundll32.exe 93 PID 2764 wrote to memory of 3628 2764 rundll32.exe 93 PID 3628 wrote to memory of 3788 3628 rundll32.exe 94 PID 3628 wrote to memory of 3788 3628 rundll32.exe 94 PID 3628 wrote to memory of 3788 3628 rundll32.exe 94 PID 3788 wrote to memory of 2912 3788 rundll32.exe 95 PID 3788 wrote to memory of 2912 3788 rundll32.exe 95 PID 3788 wrote to memory of 2912 3788 rundll32.exe 95 PID 2912 wrote to memory of 2220 2912 rundll32.exe 96 PID 2912 wrote to memory of 2220 2912 rundll32.exe 96 PID 2912 wrote to memory of 2220 2912 rundll32.exe 96 PID 2220 wrote to memory of 1908 2220 rundll32.exe 98 PID 2220 wrote to memory of 1908 2220 rundll32.exe 98 PID 2220 wrote to memory of 1908 2220 rundll32.exe 98 PID 1908 wrote to memory of 2040 1908 rundll32.exe 99 PID 1908 wrote to memory of 2040 1908 rundll32.exe 99 PID 1908 wrote to memory of 2040 1908 rundll32.exe 99 PID 2040 wrote to memory of 4044 2040 rundll32.exe 100 PID 2040 wrote to memory of 4044 2040 rundll32.exe 100 PID 2040 wrote to memory of 4044 2040 rundll32.exe 100 PID 4044 wrote to memory of 2552 4044 rundll32.exe 101 PID 4044 wrote to memory of 2552 4044 rundll32.exe 101 PID 4044 wrote to memory of 2552 4044 rundll32.exe 101 PID 2552 wrote to memory of 1044 2552 rundll32.exe 102 PID 2552 wrote to memory of 1044 2552 rundll32.exe 102 PID 2552 wrote to memory of 1044 2552 rundll32.exe 102 PID 1044 wrote to memory of 5000 1044 rundll32.exe 103 PID 1044 wrote to memory of 5000 1044 rundll32.exe 103 PID 1044 wrote to memory of 5000 1044 rundll32.exe 103 PID 5000 wrote to memory of 2452 5000 rundll32.exe 104 PID 5000 wrote to memory of 2452 5000 rundll32.exe 104 PID 5000 wrote to memory of 2452 5000 rundll32.exe 104 PID 2452 wrote to memory of 4648 2452 rundll32.exe 106 PID 2452 wrote to memory of 4648 2452 rundll32.exe 106 PID 2452 wrote to memory of 4648 2452 rundll32.exe 106 PID 4648 wrote to memory of 1932 4648 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#123⤵PID:1932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#124⤵PID:4028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#125⤵PID:3044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#126⤵PID:3844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#127⤵PID:5072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#128⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#129⤵PID:404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#130⤵PID:1160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#131⤵PID:1088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#132⤵PID:4152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#133⤵PID:2380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#134⤵PID:3544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#135⤵PID:4576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#136⤵PID:3616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#137⤵PID:4132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#138⤵PID:4496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#139⤵PID:4760
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#140⤵PID:4632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#141⤵PID:2332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#142⤵PID:2432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#143⤵PID:4780
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#144⤵PID:1760
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#145⤵PID:2156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#146⤵PID:4420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#147⤵PID:3576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#148⤵PID:3524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#149⤵PID:2884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#150⤵PID:1248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#151⤵PID:1176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#152⤵PID:2704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#153⤵PID:4332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#154⤵PID:3488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#155⤵PID:4304
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#156⤵PID:2632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#157⤵PID:1948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#158⤵PID:3908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#159⤵PID:4364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#160⤵PID:3164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#161⤵PID:3228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#162⤵PID:1628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#163⤵PID:3356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#164⤵PID:4360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#165⤵PID:4500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#166⤵PID:1492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#167⤵PID:2636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#168⤵PID:228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#169⤵PID:1048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#170⤵PID:952
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#171⤵PID:1112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#172⤵PID:3744
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#173⤵PID:2500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#174⤵PID:2112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#175⤵PID:2736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#176⤵PID:4608
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#177⤵PID:2876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#178⤵PID:3204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#179⤵PID:2880
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#180⤵PID:4492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#181⤵PID:1776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#182⤵PID:4416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#183⤵PID:4384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#184⤵PID:4316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#185⤵PID:3768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#186⤵PID:2260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#187⤵PID:1164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#188⤵PID:1468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#189⤵PID:4216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#190⤵PID:3180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#191⤵PID:3280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#192⤵PID:4712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#193⤵PID:3156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#194⤵PID:780
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#195⤵PID:4372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#196⤵PID:1432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#197⤵PID:3340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#198⤵PID:3312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#199⤵PID:3992
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1100⤵PID:3860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1101⤵PID:2976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1102⤵PID:4088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1103⤵PID:1864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1104⤵PID:4692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1105⤵PID:1524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1106⤵PID:1264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1107⤵PID:4320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1108⤵PID:5124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1109⤵PID:5140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1110⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1111⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1112⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1113⤵PID:5196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1114⤵PID:5212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1115⤵PID:5228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1116⤵PID:5244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1117⤵PID:5260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1118⤵PID:5276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1119⤵PID:5288
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1120⤵PID:5308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1121⤵PID:5324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4dc0e6a45d877a0760103c00738f6651_JaffaCakes118.dll,#1122⤵PID:5336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-