Analysis
-
max time kernel
136s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 08:59
Static task
static1
Behavioral task
behavioral1
Sample
bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll
-
Size
356KB
-
MD5
bb17df1bdf7347c5359bea0e088d24a8
-
SHA1
42505adc5d018b829067c4e5547662b617fe2f32
-
SHA256
fba45a51871e04ec73126b0e0080c4c6ddb9202e21baa793db952477cb609f1c
-
SHA512
b2f7812a7af982a249f52f81edf9f4bc2900d64b77755023ba6c6fcd1df28b489a404fe990c6d55d843136c8a322faea3159f3f0bfaeb25a89d012ac5b12b70a
-
SSDEEP
6144:uEu7yd7EIq5gEzNZl2c/wxeoJPTVZRcece6d45Qu9/JKZytPEe7BktCJp:P4c4x59ZZlBLoBYN4OWKZYPEQBQCL
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17060 dwm.exe Token: SeChangeNotifyPrivilege 17060 dwm.exe Token: 33 17060 dwm.exe Token: SeIncBasePriorityPrivilege 17060 dwm.exe Token: SeShutdownPrivilege 17060 dwm.exe Token: SeCreatePagefilePrivilege 17060 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2952 wrote to memory of 1636 2952 rundll32.exe 84 PID 2952 wrote to memory of 1636 2952 rundll32.exe 84 PID 2952 wrote to memory of 1636 2952 rundll32.exe 84 PID 1636 wrote to memory of 556 1636 rundll32.exe 85 PID 1636 wrote to memory of 556 1636 rundll32.exe 85 PID 1636 wrote to memory of 556 1636 rundll32.exe 85 PID 556 wrote to memory of 2176 556 rundll32.exe 86 PID 556 wrote to memory of 2176 556 rundll32.exe 86 PID 556 wrote to memory of 2176 556 rundll32.exe 86 PID 2176 wrote to memory of 808 2176 rundll32.exe 87 PID 2176 wrote to memory of 808 2176 rundll32.exe 87 PID 2176 wrote to memory of 808 2176 rundll32.exe 87 PID 808 wrote to memory of 2480 808 rundll32.exe 88 PID 808 wrote to memory of 2480 808 rundll32.exe 88 PID 808 wrote to memory of 2480 808 rundll32.exe 88 PID 2480 wrote to memory of 3616 2480 rundll32.exe 89 PID 2480 wrote to memory of 3616 2480 rundll32.exe 89 PID 2480 wrote to memory of 3616 2480 rundll32.exe 89 PID 3616 wrote to memory of 3156 3616 rundll32.exe 90 PID 3616 wrote to memory of 3156 3616 rundll32.exe 90 PID 3616 wrote to memory of 3156 3616 rundll32.exe 90 PID 3156 wrote to memory of 4408 3156 rundll32.exe 91 PID 3156 wrote to memory of 4408 3156 rundll32.exe 91 PID 3156 wrote to memory of 4408 3156 rundll32.exe 91 PID 4408 wrote to memory of 4900 4408 rundll32.exe 92 PID 4408 wrote to memory of 4900 4408 rundll32.exe 92 PID 4408 wrote to memory of 4900 4408 rundll32.exe 92 PID 4900 wrote to memory of 4072 4900 rundll32.exe 93 PID 4900 wrote to memory of 4072 4900 rundll32.exe 93 PID 4900 wrote to memory of 4072 4900 rundll32.exe 93 PID 4072 wrote to memory of 3540 4072 rundll32.exe 94 PID 4072 wrote to memory of 3540 4072 rundll32.exe 94 PID 4072 wrote to memory of 3540 4072 rundll32.exe 94 PID 3540 wrote to memory of 2656 3540 rundll32.exe 95 PID 3540 wrote to memory of 2656 3540 rundll32.exe 95 PID 3540 wrote to memory of 2656 3540 rundll32.exe 95 PID 2656 wrote to memory of 3340 2656 rundll32.exe 96 PID 2656 wrote to memory of 3340 2656 rundll32.exe 96 PID 2656 wrote to memory of 3340 2656 rundll32.exe 96 PID 3340 wrote to memory of 1576 3340 rundll32.exe 97 PID 3340 wrote to memory of 1576 3340 rundll32.exe 97 PID 3340 wrote to memory of 1576 3340 rundll32.exe 97 PID 1576 wrote to memory of 4960 1576 rundll32.exe 98 PID 1576 wrote to memory of 4960 1576 rundll32.exe 98 PID 1576 wrote to memory of 4960 1576 rundll32.exe 98 PID 4960 wrote to memory of 1852 4960 rundll32.exe 99 PID 4960 wrote to memory of 1852 4960 rundll32.exe 99 PID 4960 wrote to memory of 1852 4960 rundll32.exe 99 PID 1852 wrote to memory of 1932 1852 rundll32.exe 100 PID 1852 wrote to memory of 1932 1852 rundll32.exe 100 PID 1852 wrote to memory of 1932 1852 rundll32.exe 100 PID 1932 wrote to memory of 2936 1932 rundll32.exe 101 PID 1932 wrote to memory of 2936 1932 rundll32.exe 101 PID 1932 wrote to memory of 2936 1932 rundll32.exe 101 PID 2936 wrote to memory of 980 2936 rundll32.exe 102 PID 2936 wrote to memory of 980 2936 rundll32.exe 102 PID 2936 wrote to memory of 980 2936 rundll32.exe 102 PID 980 wrote to memory of 2076 980 rundll32.exe 103 PID 980 wrote to memory of 2076 980 rundll32.exe 103 PID 980 wrote to memory of 2076 980 rundll32.exe 103 PID 2076 wrote to memory of 3228 2076 rundll32.exe 104 PID 2076 wrote to memory of 3228 2076 rundll32.exe 104 PID 2076 wrote to memory of 3228 2076 rundll32.exe 104 PID 3228 wrote to memory of 216 3228 rundll32.exe 105
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#17⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#112⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#115⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#123⤵PID:216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#124⤵PID:5052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#125⤵PID:2444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#126⤵PID:4372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#127⤵PID:220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#128⤵PID:5024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#129⤵PID:1564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#130⤵PID:2980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#131⤵PID:1256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#132⤵PID:3428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#133⤵PID:5068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#134⤵PID:2276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#135⤵PID:4732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#136⤵PID:2576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#137⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#138⤵PID:1440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#139⤵PID:3888
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#140⤵PID:2788
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#141⤵PID:2992
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#142⤵
- System Location Discovery: System Language Discovery
PID:3356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#143⤵PID:348
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#144⤵PID:1544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#145⤵PID:2028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#146⤵PID:924
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#147⤵
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#148⤵PID:4804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#149⤵PID:4264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#150⤵PID:1280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#151⤵PID:448
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#152⤵PID:1360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#153⤵PID:540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#154⤵
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#155⤵PID:5012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#156⤵
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#157⤵PID:1940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#158⤵PID:2852
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#159⤵PID:1372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#160⤵PID:4896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#161⤵PID:3444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#162⤵PID:2816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#163⤵PID:60
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#164⤵PID:3292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#165⤵PID:3628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#166⤵PID:3436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#167⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#168⤵PID:1068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#169⤵PID:4404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#170⤵
- System Location Discovery: System Language Discovery
PID:4972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#171⤵PID:2024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#172⤵PID:1260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#173⤵PID:3860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#174⤵PID:2932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#175⤵PID:4396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#176⤵PID:3800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#177⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#178⤵PID:1080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#179⤵PID:2040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#180⤵PID:4136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#181⤵PID:668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#182⤵PID:3192
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#183⤵PID:2336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#184⤵PID:2900
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#185⤵PID:1532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#186⤵PID:4116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#187⤵PID:4664
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#188⤵PID:1036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#189⤵PID:2008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#190⤵PID:4540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#191⤵PID:1964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#192⤵PID:3560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#193⤵PID:624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#194⤵PID:2472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#195⤵PID:4260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#196⤵PID:1904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#197⤵PID:2224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#198⤵PID:4532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#199⤵PID:3724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1100⤵PID:5056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1101⤵PID:5028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1102⤵PID:5144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1103⤵PID:5164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1104⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1105⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1106⤵PID:5220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1107⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1108⤵PID:5248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1109⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1110⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1111⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1112⤵PID:5312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1113⤵PID:5328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1114⤵PID:5344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1115⤵PID:5360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1116⤵PID:5376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1117⤵PID:5400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1118⤵PID:5416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1119⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1120⤵PID:5444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1121⤵PID:5472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\bb17df1bdf7347c5359bea0e088d24a8_JaffaCakes118.dll,#1122⤵
- System Location Discovery: System Language Discovery
PID:5488
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-