Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
136s -
max time network
106s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 03:30
Static task
static1
Behavioral task
behavioral1
Sample
b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll
-
Size
97KB
-
MD5
b62e57fa0eab4e46b208f6db8d5ebe69
-
SHA1
c6974dc589a14d3c11d5ae877691a0cd291483c8
-
SHA256
a0cc2729f72d0aabee043c371fdde71d42af40c138b5011a741cd1656562cedc
-
SHA512
690bff1254b473c7e7b75dfcf2e67520e954d4210bafd03fd98bda65921a98b80821f22e073fb6b23b3e57e8b8229934d37c9614343956191bb7a2c702013c1c
-
SSDEEP
1536:mnzilvK8k/N6P3OR0PS2IJhr/QceqVry5J2WoCCI+dZk3/S9E+f5sjd/j7:EilYN6P3RAQceuWPnTvS97IdH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17200 dwm.exe Token: SeChangeNotifyPrivilege 17200 dwm.exe Token: 33 17200 dwm.exe Token: SeIncBasePriorityPrivilege 17200 dwm.exe Token: SeShutdownPrivilege 17200 dwm.exe Token: SeCreatePagefilePrivilege 17200 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1812 wrote to memory of 1392 1812 rundll32.exe 84 PID 1812 wrote to memory of 1392 1812 rundll32.exe 84 PID 1812 wrote to memory of 1392 1812 rundll32.exe 84 PID 1392 wrote to memory of 2776 1392 rundll32.exe 85 PID 1392 wrote to memory of 2776 1392 rundll32.exe 85 PID 1392 wrote to memory of 2776 1392 rundll32.exe 85 PID 2776 wrote to memory of 3848 2776 rundll32.exe 86 PID 2776 wrote to memory of 3848 2776 rundll32.exe 86 PID 2776 wrote to memory of 3848 2776 rundll32.exe 86 PID 3848 wrote to memory of 2252 3848 rundll32.exe 87 PID 3848 wrote to memory of 2252 3848 rundll32.exe 87 PID 3848 wrote to memory of 2252 3848 rundll32.exe 87 PID 2252 wrote to memory of 4776 2252 rundll32.exe 88 PID 2252 wrote to memory of 4776 2252 rundll32.exe 88 PID 2252 wrote to memory of 4776 2252 rundll32.exe 88 PID 4776 wrote to memory of 2584 4776 rundll32.exe 89 PID 4776 wrote to memory of 2584 4776 rundll32.exe 89 PID 4776 wrote to memory of 2584 4776 rundll32.exe 89 PID 2584 wrote to memory of 3080 2584 rundll32.exe 90 PID 2584 wrote to memory of 3080 2584 rundll32.exe 90 PID 2584 wrote to memory of 3080 2584 rundll32.exe 90 PID 3080 wrote to memory of 3816 3080 rundll32.exe 91 PID 3080 wrote to memory of 3816 3080 rundll32.exe 91 PID 3080 wrote to memory of 3816 3080 rundll32.exe 91 PID 3816 wrote to memory of 3944 3816 rundll32.exe 92 PID 3816 wrote to memory of 3944 3816 rundll32.exe 92 PID 3816 wrote to memory of 3944 3816 rundll32.exe 92 PID 3944 wrote to memory of 2784 3944 rundll32.exe 93 PID 3944 wrote to memory of 2784 3944 rundll32.exe 93 PID 3944 wrote to memory of 2784 3944 rundll32.exe 93 PID 2784 wrote to memory of 3520 2784 rundll32.exe 94 PID 2784 wrote to memory of 3520 2784 rundll32.exe 94 PID 2784 wrote to memory of 3520 2784 rundll32.exe 94 PID 3520 wrote to memory of 3528 3520 rundll32.exe 95 PID 3520 wrote to memory of 3528 3520 rundll32.exe 95 PID 3520 wrote to memory of 3528 3520 rundll32.exe 95 PID 3528 wrote to memory of 1952 3528 rundll32.exe 96 PID 3528 wrote to memory of 1952 3528 rundll32.exe 96 PID 3528 wrote to memory of 1952 3528 rundll32.exe 96 PID 1952 wrote to memory of 4868 1952 rundll32.exe 97 PID 1952 wrote to memory of 4868 1952 rundll32.exe 97 PID 1952 wrote to memory of 4868 1952 rundll32.exe 97 PID 4868 wrote to memory of 4688 4868 rundll32.exe 98 PID 4868 wrote to memory of 4688 4868 rundll32.exe 98 PID 4868 wrote to memory of 4688 4868 rundll32.exe 98 PID 4688 wrote to memory of 1344 4688 rundll32.exe 99 PID 4688 wrote to memory of 1344 4688 rundll32.exe 99 PID 4688 wrote to memory of 1344 4688 rundll32.exe 99 PID 1344 wrote to memory of 4260 1344 rundll32.exe 100 PID 1344 wrote to memory of 4260 1344 rundll32.exe 100 PID 1344 wrote to memory of 4260 1344 rundll32.exe 100 PID 4260 wrote to memory of 1400 4260 rundll32.exe 101 PID 4260 wrote to memory of 1400 4260 rundll32.exe 101 PID 4260 wrote to memory of 1400 4260 rundll32.exe 101 PID 1400 wrote to memory of 5040 1400 rundll32.exe 103 PID 1400 wrote to memory of 5040 1400 rundll32.exe 103 PID 1400 wrote to memory of 5040 1400 rundll32.exe 103 PID 5040 wrote to memory of 4248 5040 rundll32.exe 104 PID 5040 wrote to memory of 4248 5040 rundll32.exe 104 PID 5040 wrote to memory of 4248 5040 rundll32.exe 104 PID 4248 wrote to memory of 3620 4248 rundll32.exe 105 PID 4248 wrote to memory of 3620 4248 rundll32.exe 105 PID 4248 wrote to memory of 3620 4248 rundll32.exe 105 PID 3620 wrote to memory of 3556 3620 rundll32.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#18⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#113⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#123⤵PID:3556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#124⤵PID:2084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#125⤵PID:1560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#126⤵PID:2800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#127⤵PID:552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#128⤵PID:4976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#129⤵PID:3120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#130⤵PID:2160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#131⤵PID:5084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#132⤵
- System Location Discovery: System Language Discovery
PID:1228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#133⤵PID:4588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#134⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#135⤵PID:4196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#136⤵PID:2992
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#137⤵PID:3456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#138⤵PID:2380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#139⤵PID:5088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#140⤵PID:640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#141⤵PID:3668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#142⤵PID:4692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#143⤵PID:3712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#144⤵PID:1028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#145⤵PID:2136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#146⤵PID:4920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#147⤵PID:384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#148⤵PID:4700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#149⤵PID:4124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#150⤵PID:3864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#151⤵PID:2344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#152⤵
- System Location Discovery: System Language Discovery
PID:620 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#153⤵PID:3956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#154⤵PID:4656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#155⤵PID:2820
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#156⤵PID:2600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#157⤵PID:1260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#158⤵PID:3476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#159⤵
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#160⤵PID:2564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#161⤵PID:3216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#162⤵PID:3740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#163⤵
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#164⤵PID:3796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#165⤵
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#166⤵PID:2856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#167⤵
- System Location Discovery: System Language Discovery
PID:3888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#168⤵PID:4460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#169⤵PID:1176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#170⤵PID:1724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#171⤵PID:2432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#172⤵PID:2904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#173⤵PID:2948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#174⤵PID:3428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#175⤵PID:4064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#176⤵PID:3412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#177⤵PID:4328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#178⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#179⤵PID:1136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#180⤵PID:5092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#181⤵
- System Location Discovery: System Language Discovery
PID:5104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#182⤵PID:2788
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#183⤵PID:228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#184⤵PID:4796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#185⤵PID:3972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#186⤵PID:2044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#187⤵PID:4436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#188⤵PID:4820
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#189⤵PID:2464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#190⤵PID:4724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#191⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#192⤵PID:3516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#193⤵PID:2016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#194⤵PID:2112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#195⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#196⤵PID:3632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#197⤵PID:3364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#198⤵PID:2520
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#199⤵PID:1596
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1100⤵PID:5132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1101⤵PID:5148
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1102⤵PID:5164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1103⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1104⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1105⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1106⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1107⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1108⤵
- System Location Discovery: System Language Discovery
PID:5284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1109⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1110⤵PID:5316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1111⤵PID:5328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1112⤵PID:5344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1113⤵PID:5368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1114⤵PID:5380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1115⤵PID:5392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1116⤵PID:5408
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1117⤵PID:5420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1118⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1119⤵
- System Location Discovery: System Language Discovery
PID:5448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1120⤵PID:5464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1121⤵PID:5480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\b62e57fa0eab4e46b208f6db8d5ebe69_JaffaCakes118.dll,#1122⤵PID:5492
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-