Analysis
-
max time kernel
100s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-09-2024 15:52
Behavioral task
behavioral1
Sample
e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll
-
Size
320KB
-
MD5
e72bd5358d4c9c77f3701a10fa68d458
-
SHA1
6f15c9fae18691ff3bb6c924f70b1bdb17bc5db4
-
SHA256
c90dd7f986c701400fc6060d836936cec67482f370f841a5f9f2fb674f989bd9
-
SHA512
f4fc173e05dbed75a83ad88e42c20a2bedf60c15e853a442cb276c9256a87a9a9f60753e34bed98bb460ff3d84206cfc5085c808385285130cc2a727d805c1b8
-
SSDEEP
3072:4d7qRgouEcW8Hgz/lGUbeWSM1wyRPhRDg3LOk9tXP4:4uFEVYdGawWB8OYtXA
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 16892 dwm.exe Token: SeChangeNotifyPrivilege 16892 dwm.exe Token: 33 16892 dwm.exe Token: SeIncBasePriorityPrivilege 16892 dwm.exe Token: SeShutdownPrivilege 16892 dwm.exe Token: SeCreatePagefilePrivilege 16892 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4420 wrote to memory of 3844 4420 rundll32.exe 82 PID 4420 wrote to memory of 3844 4420 rundll32.exe 82 PID 4420 wrote to memory of 3844 4420 rundll32.exe 82 PID 3844 wrote to memory of 5000 3844 rundll32.exe 83 PID 3844 wrote to memory of 5000 3844 rundll32.exe 83 PID 3844 wrote to memory of 5000 3844 rundll32.exe 83 PID 5000 wrote to memory of 2508 5000 rundll32.exe 84 PID 5000 wrote to memory of 2508 5000 rundll32.exe 84 PID 5000 wrote to memory of 2508 5000 rundll32.exe 84 PID 2508 wrote to memory of 2008 2508 rundll32.exe 85 PID 2508 wrote to memory of 2008 2508 rundll32.exe 85 PID 2508 wrote to memory of 2008 2508 rundll32.exe 85 PID 2008 wrote to memory of 1752 2008 rundll32.exe 86 PID 2008 wrote to memory of 1752 2008 rundll32.exe 86 PID 2008 wrote to memory of 1752 2008 rundll32.exe 86 PID 1752 wrote to memory of 3064 1752 rundll32.exe 87 PID 1752 wrote to memory of 3064 1752 rundll32.exe 87 PID 1752 wrote to memory of 3064 1752 rundll32.exe 87 PID 3064 wrote to memory of 4556 3064 rundll32.exe 88 PID 3064 wrote to memory of 4556 3064 rundll32.exe 88 PID 3064 wrote to memory of 4556 3064 rundll32.exe 88 PID 4556 wrote to memory of 396 4556 rundll32.exe 89 PID 4556 wrote to memory of 396 4556 rundll32.exe 89 PID 4556 wrote to memory of 396 4556 rundll32.exe 89 PID 396 wrote to memory of 3728 396 rundll32.exe 90 PID 396 wrote to memory of 3728 396 rundll32.exe 90 PID 396 wrote to memory of 3728 396 rundll32.exe 90 PID 3728 wrote to memory of 4944 3728 rundll32.exe 91 PID 3728 wrote to memory of 4944 3728 rundll32.exe 91 PID 3728 wrote to memory of 4944 3728 rundll32.exe 91 PID 4944 wrote to memory of 2752 4944 rundll32.exe 92 PID 4944 wrote to memory of 2752 4944 rundll32.exe 92 PID 4944 wrote to memory of 2752 4944 rundll32.exe 92 PID 2752 wrote to memory of 5068 2752 rundll32.exe 93 PID 2752 wrote to memory of 5068 2752 rundll32.exe 93 PID 2752 wrote to memory of 5068 2752 rundll32.exe 93 PID 5068 wrote to memory of 764 5068 rundll32.exe 94 PID 5068 wrote to memory of 764 5068 rundll32.exe 94 PID 5068 wrote to memory of 764 5068 rundll32.exe 94 PID 764 wrote to memory of 4112 764 rundll32.exe 95 PID 764 wrote to memory of 4112 764 rundll32.exe 95 PID 764 wrote to memory of 4112 764 rundll32.exe 95 PID 4112 wrote to memory of 2520 4112 rundll32.exe 96 PID 4112 wrote to memory of 2520 4112 rundll32.exe 96 PID 4112 wrote to memory of 2520 4112 rundll32.exe 96 PID 2520 wrote to memory of 3184 2520 rundll32.exe 97 PID 2520 wrote to memory of 3184 2520 rundll32.exe 97 PID 2520 wrote to memory of 3184 2520 rundll32.exe 97 PID 3184 wrote to memory of 2980 3184 rundll32.exe 98 PID 3184 wrote to memory of 2980 3184 rundll32.exe 98 PID 3184 wrote to memory of 2980 3184 rundll32.exe 98 PID 2980 wrote to memory of 440 2980 rundll32.exe 99 PID 2980 wrote to memory of 440 2980 rundll32.exe 99 PID 2980 wrote to memory of 440 2980 rundll32.exe 99 PID 440 wrote to memory of 1460 440 rundll32.exe 100 PID 440 wrote to memory of 1460 440 rundll32.exe 100 PID 440 wrote to memory of 1460 440 rundll32.exe 100 PID 1460 wrote to memory of 2192 1460 rundll32.exe 101 PID 1460 wrote to memory of 2192 1460 rundll32.exe 101 PID 1460 wrote to memory of 2192 1460 rundll32.exe 101 PID 2192 wrote to memory of 4824 2192 rundll32.exe 102 PID 2192 wrote to memory of 4824 2192 rundll32.exe 102 PID 2192 wrote to memory of 4824 2192 rundll32.exe 102 PID 4824 wrote to memory of 2180 4824 rundll32.exe 103
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#111⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#123⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#124⤵PID:1492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#125⤵PID:5072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#126⤵PID:468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#127⤵PID:5040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#128⤵PID:228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#129⤵PID:3168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#130⤵
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#131⤵PID:380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#132⤵PID:3340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#133⤵PID:2772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#134⤵PID:4460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#135⤵PID:5048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#136⤵PID:4664
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#137⤵PID:2072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#138⤵PID:740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#139⤵PID:4232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#140⤵PID:2184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#141⤵PID:5060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#142⤵PID:2524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#143⤵PID:2252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#144⤵PID:1396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#145⤵PID:1956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#146⤵PID:4496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#147⤵PID:808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#148⤵PID:2128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#149⤵PID:2620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#150⤵PID:1544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#151⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#152⤵PID:4224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#153⤵PID:3412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#154⤵PID:2312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#155⤵PID:1860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#156⤵PID:4428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#157⤵
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#158⤵PID:1508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#159⤵PID:1628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#160⤵PID:3460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#161⤵PID:4736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#162⤵PID:3528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#163⤵PID:4336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#164⤵PID:3028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#165⤵PID:1612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#166⤵PID:4936
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#167⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#168⤵PID:1996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#169⤵
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#170⤵PID:3392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#171⤵PID:1764
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#172⤵PID:2284
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#173⤵PID:3532
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#174⤵PID:1416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#175⤵PID:4280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#176⤵PID:2464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#177⤵PID:3504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#178⤵PID:1684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#179⤵PID:4488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#180⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#181⤵PID:2936
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#182⤵PID:704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#183⤵PID:1340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#184⤵PID:4484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#185⤵PID:1668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#186⤵PID:1732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#187⤵PID:3616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#188⤵PID:2224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#189⤵PID:1060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#190⤵PID:1840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#191⤵PID:1292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#192⤵PID:4308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#193⤵PID:4716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#194⤵PID:3840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#195⤵PID:1836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#196⤵PID:4008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#197⤵PID:640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#198⤵PID:3216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#199⤵PID:4592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1100⤵PID:4036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1101⤵PID:1920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1102⤵PID:2912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1103⤵PID:5004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1104⤵PID:1852
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1105⤵PID:3908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1106⤵PID:4404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1107⤵PID:4060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1108⤵PID:4832
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1109⤵PID:1420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1110⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1111⤵PID:2944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1112⤵PID:4296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1113⤵PID:4268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1114⤵PID:1432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1115⤵
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1116⤵PID:2272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1117⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1118⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1119⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1120⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1121⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e72bd5358d4c9c77f3701a10fa68d458_JaffaCakes118.dll,#1122⤵PID:5232
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-