Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2024, 15:38
Static task
static1
Behavioral task
behavioral1
Sample
40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll
-
Size
38KB
-
MD5
40ac5db6947edf4ac6fb39a0a1c26e1c
-
SHA1
51da5a0e9b9b2239886fd403935ed065115f7fd6
-
SHA256
ac1a207e4d5f1bf5c701a71c27fa00498b339b955e19aa00bb8410f0cbac55fa
-
SHA512
00ffc30cc41908299040ec2469d0ad3f492d6f7e311ae5c77fa99404397bf7da2d3ae837b866a04b7167c8e76878617a7dc01703e7e4b3188a37ac985e4edc9e
-
SSDEEP
768:jH37fBmXDdoFnxvYbF9Ypr+Uj4UGI414wnbxnbs:T7Jm5oFxvYbb6RGD7pbs
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17336 dwm.exe Token: SeChangeNotifyPrivilege 17336 dwm.exe Token: 33 17336 dwm.exe Token: SeIncBasePriorityPrivilege 17336 dwm.exe Token: SeShutdownPrivilege 17336 dwm.exe Token: SeCreatePagefilePrivilege 17336 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3928 wrote to memory of 4744 3928 rundll32.exe 83 PID 3928 wrote to memory of 4744 3928 rundll32.exe 83 PID 3928 wrote to memory of 4744 3928 rundll32.exe 83 PID 4744 wrote to memory of 4892 4744 rundll32.exe 84 PID 4744 wrote to memory of 4892 4744 rundll32.exe 84 PID 4744 wrote to memory of 4892 4744 rundll32.exe 84 PID 4892 wrote to memory of 2952 4892 rundll32.exe 85 PID 4892 wrote to memory of 2952 4892 rundll32.exe 85 PID 4892 wrote to memory of 2952 4892 rundll32.exe 85 PID 2952 wrote to memory of 1692 2952 rundll32.exe 86 PID 2952 wrote to memory of 1692 2952 rundll32.exe 86 PID 2952 wrote to memory of 1692 2952 rundll32.exe 86 PID 1692 wrote to memory of 3204 1692 rundll32.exe 87 PID 1692 wrote to memory of 3204 1692 rundll32.exe 87 PID 1692 wrote to memory of 3204 1692 rundll32.exe 87 PID 3204 wrote to memory of 1848 3204 rundll32.exe 88 PID 3204 wrote to memory of 1848 3204 rundll32.exe 88 PID 3204 wrote to memory of 1848 3204 rundll32.exe 88 PID 1848 wrote to memory of 1624 1848 rundll32.exe 89 PID 1848 wrote to memory of 1624 1848 rundll32.exe 89 PID 1848 wrote to memory of 1624 1848 rundll32.exe 89 PID 1624 wrote to memory of 2900 1624 rundll32.exe 90 PID 1624 wrote to memory of 2900 1624 rundll32.exe 90 PID 1624 wrote to memory of 2900 1624 rundll32.exe 90 PID 2900 wrote to memory of 2508 2900 rundll32.exe 92 PID 2900 wrote to memory of 2508 2900 rundll32.exe 92 PID 2900 wrote to memory of 2508 2900 rundll32.exe 92 PID 2508 wrote to memory of 2128 2508 rundll32.exe 93 PID 2508 wrote to memory of 2128 2508 rundll32.exe 93 PID 2508 wrote to memory of 2128 2508 rundll32.exe 93 PID 2128 wrote to memory of 4992 2128 rundll32.exe 94 PID 2128 wrote to memory of 4992 2128 rundll32.exe 94 PID 2128 wrote to memory of 4992 2128 rundll32.exe 94 PID 4992 wrote to memory of 3724 4992 rundll32.exe 95 PID 4992 wrote to memory of 3724 4992 rundll32.exe 95 PID 4992 wrote to memory of 3724 4992 rundll32.exe 95 PID 3724 wrote to memory of 2400 3724 rundll32.exe 96 PID 3724 wrote to memory of 2400 3724 rundll32.exe 96 PID 3724 wrote to memory of 2400 3724 rundll32.exe 96 PID 2400 wrote to memory of 3652 2400 rundll32.exe 97 PID 2400 wrote to memory of 3652 2400 rundll32.exe 97 PID 2400 wrote to memory of 3652 2400 rundll32.exe 97 PID 3652 wrote to memory of 3932 3652 rundll32.exe 98 PID 3652 wrote to memory of 3932 3652 rundll32.exe 98 PID 3652 wrote to memory of 3932 3652 rundll32.exe 98 PID 3932 wrote to memory of 1108 3932 rundll32.exe 99 PID 3932 wrote to memory of 1108 3932 rundll32.exe 99 PID 3932 wrote to memory of 1108 3932 rundll32.exe 99 PID 1108 wrote to memory of 3160 1108 rundll32.exe 101 PID 1108 wrote to memory of 3160 1108 rundll32.exe 101 PID 1108 wrote to memory of 3160 1108 rundll32.exe 101 PID 3160 wrote to memory of 852 3160 rundll32.exe 102 PID 3160 wrote to memory of 852 3160 rundll32.exe 102 PID 3160 wrote to memory of 852 3160 rundll32.exe 102 PID 852 wrote to memory of 3856 852 rundll32.exe 103 PID 852 wrote to memory of 3856 852 rundll32.exe 103 PID 852 wrote to memory of 3856 852 rundll32.exe 103 PID 3856 wrote to memory of 4700 3856 rundll32.exe 104 PID 3856 wrote to memory of 4700 3856 rundll32.exe 104 PID 3856 wrote to memory of 4700 3856 rundll32.exe 104 PID 4700 wrote to memory of 1628 4700 rundll32.exe 105 PID 4700 wrote to memory of 1628 4700 rundll32.exe 105 PID 4700 wrote to memory of 1628 4700 rundll32.exe 105 PID 1628 wrote to memory of 1576 1628 rundll32.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#118⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#123⤵PID:1576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#124⤵PID:2744
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#125⤵PID:3464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#126⤵PID:4372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#127⤵PID:4684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#128⤵PID:640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#129⤵PID:5088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#130⤵PID:2700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#131⤵PID:2136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#132⤵PID:4456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#133⤵PID:5068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#134⤵PID:4592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#135⤵PID:3184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#136⤵PID:3676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#137⤵PID:3556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#138⤵PID:1676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#139⤵PID:4152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#140⤵PID:5084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#141⤵PID:428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#142⤵PID:4964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#143⤵PID:3280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#144⤵PID:4344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#145⤵
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#146⤵PID:1364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#147⤵PID:3388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#148⤵PID:4428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#149⤵PID:2528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#150⤵PID:3968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#151⤵PID:4600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#152⤵PID:436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#153⤵
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#154⤵PID:2768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#155⤵PID:2268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#156⤵PID:380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#157⤵PID:4020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#158⤵PID:4204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#159⤵PID:2616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#160⤵PID:2144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#161⤵PID:3580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#162⤵PID:3460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#163⤵PID:3180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#164⤵PID:3964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#165⤵PID:2736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#166⤵PID:3088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#167⤵PID:3000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#168⤵PID:1728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#169⤵PID:3484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#170⤵PID:544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#171⤵PID:4540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#172⤵PID:5092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#173⤵PID:2132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#174⤵PID:3380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#175⤵PID:224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#176⤵PID:4400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#177⤵PID:4016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#178⤵PID:996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#179⤵PID:2516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#180⤵
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#181⤵PID:3788
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#182⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#183⤵PID:3708
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#184⤵PID:3972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#185⤵PID:4324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#186⤵
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#187⤵PID:4328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#188⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#189⤵PID:384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#190⤵
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#191⤵PID:1784
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#192⤵PID:2160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#193⤵PID:4348
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#194⤵PID:932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#195⤵PID:4612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#196⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#197⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#198⤵
- System Location Discovery: System Language Discovery
PID:5164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#199⤵PID:5176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1100⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1101⤵PID:5204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1102⤵PID:5220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1103⤵PID:5236
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1104⤵PID:5252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1105⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1106⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1107⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1108⤵PID:5312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1109⤵PID:5328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1110⤵PID:5344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1111⤵PID:5356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1112⤵
- System Location Discovery: System Language Discovery
PID:5372 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1113⤵PID:5388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1114⤵PID:5404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1115⤵PID:5416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1116⤵PID:5432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1117⤵PID:5444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1118⤵PID:5460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1119⤵PID:5476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1120⤵PID:5492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1121⤵PID:5508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\40ac5db6947edf4ac6fb39a0a1c26e1c_JaffaCakes118.dll,#1122⤵PID:5524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-