Analysis
-
max time kernel
145s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 08:26
Static task
static1
Behavioral task
behavioral1
Sample
f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll
-
Size
3KB
-
MD5
f5991c7e5c50ce7b1478cf28a88098a4
-
SHA1
b510d6aa75a61068966a9b47c72d6dd58da184bf
-
SHA256
1c25e9b43f11fb92406773cd72a71f5d41bf491352bf1c436e8cdd4b819b3d3d
-
SHA512
437c0d42fdcecea67aa937c5ff4d129ce3eb986041da5017fa1bccbabab7e34700883a9872c44d7fadf4baa62034a357c759d3279a6ab431e544aa245b2624d7
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17404 dwm.exe Token: SeChangeNotifyPrivilege 17404 dwm.exe Token: 33 17404 dwm.exe Token: SeIncBasePriorityPrivilege 17404 dwm.exe Token: SeShutdownPrivilege 17404 dwm.exe Token: SeCreatePagefilePrivilege 17404 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1380 wrote to memory of 4360 1380 rundll32.exe 82 PID 1380 wrote to memory of 4360 1380 rundll32.exe 82 PID 1380 wrote to memory of 4360 1380 rundll32.exe 82 PID 4360 wrote to memory of 852 4360 rundll32.exe 83 PID 4360 wrote to memory of 852 4360 rundll32.exe 83 PID 4360 wrote to memory of 852 4360 rundll32.exe 83 PID 852 wrote to memory of 452 852 rundll32.exe 84 PID 852 wrote to memory of 452 852 rundll32.exe 84 PID 852 wrote to memory of 452 852 rundll32.exe 84 PID 452 wrote to memory of 4444 452 rundll32.exe 85 PID 452 wrote to memory of 4444 452 rundll32.exe 85 PID 452 wrote to memory of 4444 452 rundll32.exe 85 PID 4444 wrote to memory of 4916 4444 rundll32.exe 86 PID 4444 wrote to memory of 4916 4444 rundll32.exe 86 PID 4444 wrote to memory of 4916 4444 rundll32.exe 86 PID 4916 wrote to memory of 3732 4916 rundll32.exe 87 PID 4916 wrote to memory of 3732 4916 rundll32.exe 87 PID 4916 wrote to memory of 3732 4916 rundll32.exe 87 PID 3732 wrote to memory of 4316 3732 rundll32.exe 88 PID 3732 wrote to memory of 4316 3732 rundll32.exe 88 PID 3732 wrote to memory of 4316 3732 rundll32.exe 88 PID 4316 wrote to memory of 4168 4316 rundll32.exe 89 PID 4316 wrote to memory of 4168 4316 rundll32.exe 89 PID 4316 wrote to memory of 4168 4316 rundll32.exe 89 PID 4168 wrote to memory of 3616 4168 rundll32.exe 90 PID 4168 wrote to memory of 3616 4168 rundll32.exe 90 PID 4168 wrote to memory of 3616 4168 rundll32.exe 90 PID 3616 wrote to memory of 2268 3616 rundll32.exe 91 PID 3616 wrote to memory of 2268 3616 rundll32.exe 91 PID 3616 wrote to memory of 2268 3616 rundll32.exe 91 PID 2268 wrote to memory of 4132 2268 rundll32.exe 92 PID 2268 wrote to memory of 4132 2268 rundll32.exe 92 PID 2268 wrote to memory of 4132 2268 rundll32.exe 92 PID 4132 wrote to memory of 3312 4132 rundll32.exe 93 PID 4132 wrote to memory of 3312 4132 rundll32.exe 93 PID 4132 wrote to memory of 3312 4132 rundll32.exe 93 PID 3312 wrote to memory of 4200 3312 rundll32.exe 94 PID 3312 wrote to memory of 4200 3312 rundll32.exe 94 PID 3312 wrote to memory of 4200 3312 rundll32.exe 94 PID 4200 wrote to memory of 2588 4200 rundll32.exe 95 PID 4200 wrote to memory of 2588 4200 rundll32.exe 95 PID 4200 wrote to memory of 2588 4200 rundll32.exe 95 PID 2588 wrote to memory of 1976 2588 rundll32.exe 96 PID 2588 wrote to memory of 1976 2588 rundll32.exe 96 PID 2588 wrote to memory of 1976 2588 rundll32.exe 96 PID 1976 wrote to memory of 5060 1976 rundll32.exe 97 PID 1976 wrote to memory of 5060 1976 rundll32.exe 97 PID 1976 wrote to memory of 5060 1976 rundll32.exe 97 PID 5060 wrote to memory of 1124 5060 rundll32.exe 98 PID 5060 wrote to memory of 1124 5060 rundll32.exe 98 PID 5060 wrote to memory of 1124 5060 rundll32.exe 98 PID 1124 wrote to memory of 3360 1124 rundll32.exe 99 PID 1124 wrote to memory of 3360 1124 rundll32.exe 99 PID 1124 wrote to memory of 3360 1124 rundll32.exe 99 PID 3360 wrote to memory of 4848 3360 rundll32.exe 100 PID 3360 wrote to memory of 4848 3360 rundll32.exe 100 PID 3360 wrote to memory of 4848 3360 rundll32.exe 100 PID 4848 wrote to memory of 5068 4848 rundll32.exe 101 PID 4848 wrote to memory of 5068 4848 rundll32.exe 101 PID 4848 wrote to memory of 5068 4848 rundll32.exe 101 PID 5068 wrote to memory of 4332 5068 rundll32.exe 102 PID 5068 wrote to memory of 4332 5068 rundll32.exe 102 PID 5068 wrote to memory of 4332 5068 rundll32.exe 102 PID 4332 wrote to memory of 2816 4332 rundll32.exe 103
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#17⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#123⤵PID:2816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#124⤵PID:4652
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#125⤵PID:1808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#126⤵PID:3196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#127⤵PID:5028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#128⤵PID:4000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#129⤵PID:3092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#130⤵PID:1736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#131⤵PID:2472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#132⤵
- System Location Discovery: System Language Discovery
PID:2372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#133⤵PID:2720
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#134⤵PID:2656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#135⤵PID:4880
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#136⤵PID:2908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#137⤵PID:4892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#138⤵PID:2224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#139⤵PID:2528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#140⤵PID:3248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#141⤵
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#142⤵PID:4172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#143⤵PID:1700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#144⤵
- System Location Discovery: System Language Discovery
PID:3864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#145⤵PID:4904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#146⤵PID:1984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#147⤵PID:3320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#148⤵PID:2964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#149⤵PID:3032
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#150⤵PID:3528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#151⤵PID:3536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#152⤵PID:2388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#153⤵PID:2660
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#154⤵PID:4144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#155⤵PID:64
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#156⤵PID:1220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#157⤵PID:3324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#158⤵PID:4060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#159⤵PID:1172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#160⤵PID:1256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#161⤵PID:4136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#162⤵PID:2392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#163⤵PID:2368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#164⤵PID:848
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#165⤵PID:3588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#166⤵PID:4812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#167⤵PID:772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#168⤵PID:2644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#169⤵PID:3136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#170⤵PID:2504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#171⤵PID:816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#172⤵PID:4628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#173⤵PID:3612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#174⤵PID:4324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#175⤵PID:2440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#176⤵PID:4140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#177⤵PID:1044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#178⤵PID:2432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#179⤵PID:2920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#180⤵PID:4952
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#181⤵PID:4908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#182⤵PID:3548
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#183⤵PID:1956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#184⤵PID:984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#185⤵PID:60
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#186⤵PID:2936
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#187⤵PID:4564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#188⤵PID:4044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#189⤵PID:3132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#190⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#191⤵PID:4296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#192⤵PID:1052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#193⤵PID:4588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#194⤵PID:1012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#195⤵PID:1204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#196⤵PID:2620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#197⤵PID:392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#198⤵
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#199⤵PID:4828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1100⤵PID:3716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1101⤵
- System Location Discovery: System Language Discovery
PID:4984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1102⤵PID:3236
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1103⤵PID:4540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1104⤵PID:3120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1105⤵PID:4496
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1106⤵PID:3244
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1107⤵PID:2648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1108⤵PID:3172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1109⤵PID:1092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1110⤵PID:3116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1111⤵PID:4876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1112⤵
- System Location Discovery: System Language Discovery
PID:3452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1113⤵PID:3756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1114⤵PID:5020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1115⤵PID:3492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1116⤵PID:4808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1117⤵PID:5044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1118⤵PID:3408
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1119⤵PID:3620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1120⤵PID:2260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1121⤵PID:4956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\f5991c7e5c50ce7b1478cf28a88098a4_JaffaCakes118.dll,#1122⤵PID:2348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-