Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-09-2024 13:44
Static task
static1
Behavioral task
behavioral1
Sample
da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll
-
Size
3KB
-
MD5
da795b712e5c7408a127fb419dd10dbe
-
SHA1
ca3155d3bdde6ec4f8d0995d38a6ee40c82e12e9
-
SHA256
d7e158222afe191fefe61dfb0d6aeee512b6c9eaa1be51103280b548001831a9
-
SHA512
c985961326dd448b8c0de0d2cc4bc576d2c854b3aa5e46f75eb1882d3118eb9f38fa0612232fdebcace441f7600bb4dfef058a548b1e2800ba6c6835070ecf7c
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17208 dwm.exe Token: SeChangeNotifyPrivilege 17208 dwm.exe Token: 33 17208 dwm.exe Token: SeIncBasePriorityPrivilege 17208 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1492 wrote to memory of 2312 1492 rundll32.exe 83 PID 1492 wrote to memory of 2312 1492 rundll32.exe 83 PID 1492 wrote to memory of 2312 1492 rundll32.exe 83 PID 2312 wrote to memory of 3616 2312 rundll32.exe 85 PID 2312 wrote to memory of 3616 2312 rundll32.exe 85 PID 2312 wrote to memory of 3616 2312 rundll32.exe 85 PID 3616 wrote to memory of 1336 3616 rundll32.exe 86 PID 3616 wrote to memory of 1336 3616 rundll32.exe 86 PID 3616 wrote to memory of 1336 3616 rundll32.exe 86 PID 1336 wrote to memory of 4684 1336 rundll32.exe 87 PID 1336 wrote to memory of 4684 1336 rundll32.exe 87 PID 1336 wrote to memory of 4684 1336 rundll32.exe 87 PID 4684 wrote to memory of 1016 4684 rundll32.exe 88 PID 4684 wrote to memory of 1016 4684 rundll32.exe 88 PID 4684 wrote to memory of 1016 4684 rundll32.exe 88 PID 1016 wrote to memory of 3432 1016 rundll32.exe 89 PID 1016 wrote to memory of 3432 1016 rundll32.exe 89 PID 1016 wrote to memory of 3432 1016 rundll32.exe 89 PID 3432 wrote to memory of 4516 3432 rundll32.exe 90 PID 3432 wrote to memory of 4516 3432 rundll32.exe 90 PID 3432 wrote to memory of 4516 3432 rundll32.exe 90 PID 4516 wrote to memory of 3700 4516 rundll32.exe 92 PID 4516 wrote to memory of 3700 4516 rundll32.exe 92 PID 4516 wrote to memory of 3700 4516 rundll32.exe 92 PID 3700 wrote to memory of 4948 3700 rundll32.exe 93 PID 3700 wrote to memory of 4948 3700 rundll32.exe 93 PID 3700 wrote to memory of 4948 3700 rundll32.exe 93 PID 4948 wrote to memory of 2308 4948 rundll32.exe 94 PID 4948 wrote to memory of 2308 4948 rundll32.exe 94 PID 4948 wrote to memory of 2308 4948 rundll32.exe 94 PID 2308 wrote to memory of 4672 2308 rundll32.exe 95 PID 2308 wrote to memory of 4672 2308 rundll32.exe 95 PID 2308 wrote to memory of 4672 2308 rundll32.exe 95 PID 4672 wrote to memory of 2372 4672 rundll32.exe 96 PID 4672 wrote to memory of 2372 4672 rundll32.exe 96 PID 4672 wrote to memory of 2372 4672 rundll32.exe 96 PID 2372 wrote to memory of 1904 2372 rundll32.exe 97 PID 2372 wrote to memory of 1904 2372 rundll32.exe 97 PID 2372 wrote to memory of 1904 2372 rundll32.exe 97 PID 1904 wrote to memory of 1228 1904 rundll32.exe 98 PID 1904 wrote to memory of 1228 1904 rundll32.exe 98 PID 1904 wrote to memory of 1228 1904 rundll32.exe 98 PID 1228 wrote to memory of 2192 1228 rundll32.exe 99 PID 1228 wrote to memory of 2192 1228 rundll32.exe 99 PID 1228 wrote to memory of 2192 1228 rundll32.exe 99 PID 2192 wrote to memory of 3544 2192 rundll32.exe 100 PID 2192 wrote to memory of 3544 2192 rundll32.exe 100 PID 2192 wrote to memory of 3544 2192 rundll32.exe 100 PID 3544 wrote to memory of 5052 3544 rundll32.exe 101 PID 3544 wrote to memory of 5052 3544 rundll32.exe 101 PID 3544 wrote to memory of 5052 3544 rundll32.exe 101 PID 5052 wrote to memory of 1568 5052 rundll32.exe 102 PID 5052 wrote to memory of 1568 5052 rundll32.exe 102 PID 5052 wrote to memory of 1568 5052 rundll32.exe 102 PID 1568 wrote to memory of 1076 1568 rundll32.exe 103 PID 1568 wrote to memory of 1076 1568 rundll32.exe 103 PID 1568 wrote to memory of 1076 1568 rundll32.exe 103 PID 1076 wrote to memory of 4996 1076 rundll32.exe 105 PID 1076 wrote to memory of 4996 1076 rundll32.exe 105 PID 1076 wrote to memory of 4996 1076 rundll32.exe 105 PID 4996 wrote to memory of 2504 4996 rundll32.exe 106 PID 4996 wrote to memory of 2504 4996 rundll32.exe 106 PID 4996 wrote to memory of 2504 4996 rundll32.exe 106 PID 2504 wrote to memory of 2016 2504 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#123⤵PID:2016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#124⤵PID:3080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#125⤵PID:4836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#126⤵PID:4984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#127⤵PID:1100
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#128⤵PID:4844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#129⤵PID:4944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#130⤵
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#131⤵PID:2644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#132⤵PID:4560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#133⤵PID:2912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#134⤵PID:2776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#135⤵PID:1204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#136⤵PID:4992
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#137⤵PID:5080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#138⤵PID:3348
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#139⤵PID:3176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#140⤵PID:4888
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#141⤵PID:3972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#142⤵PID:1580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#143⤵PID:4840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#144⤵PID:3164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#145⤵
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#146⤵PID:4800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#147⤵PID:5112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#148⤵PID:3812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#149⤵PID:3048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#150⤵PID:2320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#151⤵PID:1884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#152⤵PID:440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#153⤵PID:3808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#154⤵PID:2296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#155⤵PID:2524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#156⤵PID:3844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#157⤵PID:1188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#158⤵PID:1860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#159⤵PID:2416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#160⤵PID:952
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#161⤵PID:972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#162⤵PID:2648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#163⤵PID:1548
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#164⤵PID:2560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#165⤵PID:3560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#166⤵PID:4084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#167⤵PID:3020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#168⤵PID:756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#169⤵PID:2500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#170⤵PID:644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#171⤵PID:1832
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#172⤵PID:2496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#173⤵PID:4584
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#174⤵PID:1648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#175⤵PID:4148
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#176⤵PID:3372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#177⤵PID:1804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#178⤵PID:552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#179⤵PID:1968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#180⤵PID:1212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#181⤵PID:4288
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#182⤵PID:5116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#183⤵
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#184⤵
- System Location Discovery: System Language Discovery
PID:4108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#185⤵PID:2900
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#186⤵PID:3068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#187⤵PID:2068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#188⤵PID:3652
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#189⤵PID:5000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#190⤵PID:5064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#191⤵PID:1136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#192⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#193⤵PID:1496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#194⤵PID:4104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#195⤵PID:4588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#196⤵PID:2036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#197⤵PID:1476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#198⤵PID:4044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#199⤵PID:4464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1100⤵PID:5076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1101⤵PID:1512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1102⤵
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1103⤵
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1104⤵PID:2436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1105⤵PID:4772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1106⤵PID:1372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1107⤵PID:2292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1108⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1109⤵PID:3160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1110⤵PID:1420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1111⤵PID:4564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1112⤵PID:5128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1113⤵PID:5144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1114⤵PID:5160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1115⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1116⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1117⤵PID:5204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1118⤵PID:5220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1119⤵PID:5236
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1120⤵PID:5252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1121⤵PID:5268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\da795b712e5c7408a127fb419dd10dbe_JaffaCakes118.dll,#1122⤵PID:5284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-