Analysis
-
max time kernel
125s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 08:03
Static task
static1
Behavioral task
behavioral1
Sample
0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll
-
Size
43KB
-
MD5
0eb50f5ce343556a71f9614e4639a93e
-
SHA1
30cae385d3012495a71a38ad545734023ac2d898
-
SHA256
16a19de097992d99cd4979e40a9cea7902a78c56405f4ed792086fc93294cfd9
-
SHA512
aff9da05322d7363c54dcf878c3cb30ea6c94901912f6a2f2b5799c55b3296f9f912dac2d5eab2bd538dad127ad0af7a545a8b15805f41461d444903e31747a5
-
SSDEEP
768:ls0raflA2PVbp28Y2Vfmgm4ZHFREay4+XSXhNq2kVqhK27JH:ij62Nd2Imgm4ZManxk2XhKkJH
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17400 dwm.exe Token: SeChangeNotifyPrivilege 17400 dwm.exe Token: 33 17400 dwm.exe Token: SeIncBasePriorityPrivilege 17400 dwm.exe Token: SeShutdownPrivilege 17400 dwm.exe Token: SeCreatePagefilePrivilege 17400 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2792 2152 rundll32.exe 82 PID 2152 wrote to memory of 2792 2152 rundll32.exe 82 PID 2152 wrote to memory of 2792 2152 rundll32.exe 82 PID 2792 wrote to memory of 3848 2792 rundll32.exe 83 PID 2792 wrote to memory of 3848 2792 rundll32.exe 83 PID 2792 wrote to memory of 3848 2792 rundll32.exe 83 PID 3848 wrote to memory of 1104 3848 rundll32.exe 84 PID 3848 wrote to memory of 1104 3848 rundll32.exe 84 PID 3848 wrote to memory of 1104 3848 rundll32.exe 84 PID 1104 wrote to memory of 2252 1104 rundll32.exe 85 PID 1104 wrote to memory of 2252 1104 rundll32.exe 85 PID 1104 wrote to memory of 2252 1104 rundll32.exe 85 PID 2252 wrote to memory of 5028 2252 rundll32.exe 86 PID 2252 wrote to memory of 5028 2252 rundll32.exe 86 PID 2252 wrote to memory of 5028 2252 rundll32.exe 86 PID 5028 wrote to memory of 1532 5028 rundll32.exe 87 PID 5028 wrote to memory of 1532 5028 rundll32.exe 87 PID 5028 wrote to memory of 1532 5028 rundll32.exe 87 PID 1532 wrote to memory of 4568 1532 rundll32.exe 88 PID 1532 wrote to memory of 4568 1532 rundll32.exe 88 PID 1532 wrote to memory of 4568 1532 rundll32.exe 88 PID 4568 wrote to memory of 2224 4568 rundll32.exe 89 PID 4568 wrote to memory of 2224 4568 rundll32.exe 89 PID 4568 wrote to memory of 2224 4568 rundll32.exe 89 PID 2224 wrote to memory of 864 2224 rundll32.exe 90 PID 2224 wrote to memory of 864 2224 rundll32.exe 90 PID 2224 wrote to memory of 864 2224 rundll32.exe 90 PID 864 wrote to memory of 3104 864 rundll32.exe 91 PID 864 wrote to memory of 3104 864 rundll32.exe 91 PID 864 wrote to memory of 3104 864 rundll32.exe 91 PID 3104 wrote to memory of 3340 3104 rundll32.exe 92 PID 3104 wrote to memory of 3340 3104 rundll32.exe 92 PID 3104 wrote to memory of 3340 3104 rundll32.exe 92 PID 3340 wrote to memory of 1824 3340 rundll32.exe 93 PID 3340 wrote to memory of 1824 3340 rundll32.exe 93 PID 3340 wrote to memory of 1824 3340 rundll32.exe 93 PID 1824 wrote to memory of 1540 1824 rundll32.exe 94 PID 1824 wrote to memory of 1540 1824 rundll32.exe 94 PID 1824 wrote to memory of 1540 1824 rundll32.exe 94 PID 1540 wrote to memory of 3532 1540 rundll32.exe 95 PID 1540 wrote to memory of 3532 1540 rundll32.exe 95 PID 1540 wrote to memory of 3532 1540 rundll32.exe 95 PID 3532 wrote to memory of 3992 3532 rundll32.exe 96 PID 3532 wrote to memory of 3992 3532 rundll32.exe 96 PID 3532 wrote to memory of 3992 3532 rundll32.exe 96 PID 3992 wrote to memory of 2076 3992 rundll32.exe 97 PID 3992 wrote to memory of 2076 3992 rundll32.exe 97 PID 3992 wrote to memory of 2076 3992 rundll32.exe 97 PID 2076 wrote to memory of 1832 2076 rundll32.exe 98 PID 2076 wrote to memory of 1832 2076 rundll32.exe 98 PID 2076 wrote to memory of 1832 2076 rundll32.exe 98 PID 1832 wrote to memory of 5052 1832 rundll32.exe 99 PID 1832 wrote to memory of 5052 1832 rundll32.exe 99 PID 1832 wrote to memory of 5052 1832 rundll32.exe 99 PID 5052 wrote to memory of 1552 5052 rundll32.exe 100 PID 5052 wrote to memory of 1552 5052 rundll32.exe 100 PID 5052 wrote to memory of 1552 5052 rundll32.exe 100 PID 1552 wrote to memory of 208 1552 rundll32.exe 101 PID 1552 wrote to memory of 208 1552 rundll32.exe 101 PID 1552 wrote to memory of 208 1552 rundll32.exe 101 PID 208 wrote to memory of 824 208 rundll32.exe 102 PID 208 wrote to memory of 824 208 rundll32.exe 102 PID 208 wrote to memory of 824 208 rundll32.exe 102 PID 824 wrote to memory of 1704 824 rundll32.exe 103
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#15⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#123⤵PID:1704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#124⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#125⤵PID:720
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#126⤵PID:5036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#127⤵PID:3284
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#128⤵PID:3320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#129⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#130⤵PID:4732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#131⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#132⤵PID:2964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#133⤵PID:3524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#134⤵PID:2528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#135⤵PID:5056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#136⤵PID:3620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#137⤵PID:3300
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#138⤵PID:2684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#139⤵PID:3112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#140⤵PID:232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#141⤵PID:5004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#142⤵PID:3224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#143⤵PID:1920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#144⤵PID:676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#145⤵PID:2704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#146⤵PID:1436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#147⤵PID:5048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#148⤵PID:348
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#149⤵PID:4656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#150⤵PID:1100
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#151⤵
- System Location Discovery: System Language Discovery
PID:3860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#152⤵PID:2216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#153⤵PID:4160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#154⤵PID:1996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#155⤵PID:3804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#156⤵PID:2264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#157⤵PID:4844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#158⤵PID:5104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#159⤵PID:3252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#160⤵PID:1908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#161⤵PID:2316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#162⤵PID:1420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#163⤵PID:1392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#164⤵PID:4628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#165⤵PID:1380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#166⤵PID:2640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#167⤵PID:3536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#168⤵PID:4492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#169⤵PID:5112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#170⤵PID:3108
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#171⤵PID:3908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#172⤵PID:4828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#173⤵PID:692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#174⤵PID:2584
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#175⤵PID:4368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#176⤵PID:4480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#177⤵PID:3912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#178⤵PID:852
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#179⤵PID:3248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#180⤵PID:1316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#181⤵PID:1096
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#182⤵PID:4836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#183⤵PID:1344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#184⤵PID:4424
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#185⤵PID:4804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#186⤵PID:2380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#187⤵PID:2928
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#188⤵PID:4924
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#189⤵PID:3288
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#190⤵PID:3228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#191⤵PID:1216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#192⤵PID:2744
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#193⤵PID:992
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#194⤵PID:2052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#195⤵PID:3024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#196⤵PID:1048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#197⤵PID:2896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#198⤵PID:3568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#199⤵PID:1728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1100⤵
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1101⤵PID:4140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1102⤵PID:1808
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1103⤵PID:1416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1104⤵PID:1492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1105⤵PID:5084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1106⤵PID:3488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1107⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1108⤵PID:2892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1109⤵PID:2436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1110⤵PID:4988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1111⤵PID:4032
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1112⤵PID:1224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1113⤵PID:3544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1114⤵PID:464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1115⤵PID:3316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1116⤵
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1117⤵PID:4384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1118⤵PID:1972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1119⤵PID:3760
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1120⤵PID:2116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1121⤵PID:3560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\0eb50f5ce343556a71f9614e4639a93e_JaffaCakes118.dll,#1122⤵PID:4412
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-