Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2024, 08:44
Static task
static1
Behavioral task
behavioral1
Sample
567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll
-
Size
102KB
-
MD5
567cb2a57e960c8303f68d5213900b81
-
SHA1
d970d4e183c1bc0947f60582d489c3edddc5e511
-
SHA256
a3cd34d99036ad59132278f6951ee50601af66fff61bb13fe3a36ad78c4d12d2
-
SHA512
28246a403a2f8652c2b651f1ad7f9d414ea54c18072819fd76c34e7789a4206bb93590b37a1b80f6354d8308cd67f9d1ef34b3fdedf36725519b55605ca1fb31
-
SSDEEP
3072:qaaRZLsD75CYwl/tWiMw4RQjergFoZAJ/zSk:fWl/tORJyoqOk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 3532 dwm.exe Token: SeChangeNotifyPrivilege 3532 dwm.exe Token: 33 3532 dwm.exe Token: SeIncBasePriorityPrivilege 3532 dwm.exe Token: SeShutdownPrivilege 3532 dwm.exe Token: SeCreatePagefilePrivilege 3532 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1352 wrote to memory of 4216 1352 rundll32.exe 86 PID 1352 wrote to memory of 4216 1352 rundll32.exe 86 PID 1352 wrote to memory of 4216 1352 rundll32.exe 86 PID 4216 wrote to memory of 2112 4216 rundll32.exe 87 PID 4216 wrote to memory of 2112 4216 rundll32.exe 87 PID 4216 wrote to memory of 2112 4216 rundll32.exe 87 PID 2112 wrote to memory of 1988 2112 rundll32.exe 88 PID 2112 wrote to memory of 1988 2112 rundll32.exe 88 PID 2112 wrote to memory of 1988 2112 rundll32.exe 88 PID 1988 wrote to memory of 2232 1988 rundll32.exe 89 PID 1988 wrote to memory of 2232 1988 rundll32.exe 89 PID 1988 wrote to memory of 2232 1988 rundll32.exe 89 PID 2232 wrote to memory of 3624 2232 rundll32.exe 90 PID 2232 wrote to memory of 3624 2232 rundll32.exe 90 PID 2232 wrote to memory of 3624 2232 rundll32.exe 90 PID 3624 wrote to memory of 3080 3624 rundll32.exe 91 PID 3624 wrote to memory of 3080 3624 rundll32.exe 91 PID 3624 wrote to memory of 3080 3624 rundll32.exe 91 PID 3080 wrote to memory of 3404 3080 rundll32.exe 92 PID 3080 wrote to memory of 3404 3080 rundll32.exe 92 PID 3080 wrote to memory of 3404 3080 rundll32.exe 92 PID 3404 wrote to memory of 232 3404 rundll32.exe 93 PID 3404 wrote to memory of 232 3404 rundll32.exe 93 PID 3404 wrote to memory of 232 3404 rundll32.exe 93 PID 232 wrote to memory of 2136 232 rundll32.exe 94 PID 232 wrote to memory of 2136 232 rundll32.exe 94 PID 232 wrote to memory of 2136 232 rundll32.exe 94 PID 2136 wrote to memory of 1428 2136 rundll32.exe 95 PID 2136 wrote to memory of 1428 2136 rundll32.exe 95 PID 2136 wrote to memory of 1428 2136 rundll32.exe 95 PID 1428 wrote to memory of 452 1428 rundll32.exe 96 PID 1428 wrote to memory of 452 1428 rundll32.exe 96 PID 1428 wrote to memory of 452 1428 rundll32.exe 96 PID 452 wrote to memory of 4108 452 rundll32.exe 97 PID 452 wrote to memory of 4108 452 rundll32.exe 97 PID 452 wrote to memory of 4108 452 rundll32.exe 97 PID 4108 wrote to memory of 4856 4108 rundll32.exe 98 PID 4108 wrote to memory of 4856 4108 rundll32.exe 98 PID 4108 wrote to memory of 4856 4108 rundll32.exe 98 PID 4856 wrote to memory of 1268 4856 rundll32.exe 99 PID 4856 wrote to memory of 1268 4856 rundll32.exe 99 PID 4856 wrote to memory of 1268 4856 rundll32.exe 99 PID 1268 wrote to memory of 556 1268 rundll32.exe 100 PID 1268 wrote to memory of 556 1268 rundll32.exe 100 PID 1268 wrote to memory of 556 1268 rundll32.exe 100 PID 556 wrote to memory of 2844 556 rundll32.exe 101 PID 556 wrote to memory of 2844 556 rundll32.exe 101 PID 556 wrote to memory of 2844 556 rundll32.exe 101 PID 2844 wrote to memory of 4652 2844 rundll32.exe 102 PID 2844 wrote to memory of 4652 2844 rundll32.exe 102 PID 2844 wrote to memory of 4652 2844 rundll32.exe 102 PID 4652 wrote to memory of 2200 4652 rundll32.exe 103 PID 4652 wrote to memory of 2200 4652 rundll32.exe 103 PID 4652 wrote to memory of 2200 4652 rundll32.exe 103 PID 2200 wrote to memory of 3700 2200 rundll32.exe 104 PID 2200 wrote to memory of 3700 2200 rundll32.exe 104 PID 2200 wrote to memory of 3700 2200 rundll32.exe 104 PID 3700 wrote to memory of 3972 3700 rundll32.exe 105 PID 3700 wrote to memory of 3972 3700 rundll32.exe 105 PID 3700 wrote to memory of 3972 3700 rundll32.exe 105 PID 3972 wrote to memory of 2984 3972 rundll32.exe 106 PID 3972 wrote to memory of 2984 3972 rundll32.exe 106 PID 3972 wrote to memory of 2984 3972 rundll32.exe 106 PID 2984 wrote to memory of 2996 2984 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:4108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#115⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#117⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#123⤵PID:2996
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#124⤵PID:4184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#125⤵PID:2004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#126⤵PID:1932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#127⤵PID:1060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#128⤵PID:3724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#129⤵PID:2464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#130⤵PID:3692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#131⤵PID:1620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#132⤵PID:4012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#133⤵PID:1064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#134⤵
- System Location Discovery: System Language Discovery
PID:4444 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#135⤵PID:1556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#136⤵PID:2976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#137⤵
- System Location Discovery: System Language Discovery
PID:960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#138⤵PID:2304
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#139⤵PID:3116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#140⤵PID:1876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#141⤵PID:3452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#142⤵PID:3016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#143⤵PID:1052
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#144⤵PID:2816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#145⤵PID:1916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#146⤵PID:1504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#147⤵PID:3620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#148⤵PID:2812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#149⤵PID:3616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#150⤵PID:3456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#151⤵PID:2204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#152⤵PID:3948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#153⤵PID:1472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#154⤵PID:4116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#155⤵PID:956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#156⤵PID:3396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#157⤵PID:3796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#158⤵PID:4492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#159⤵PID:4016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#160⤵PID:1400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#161⤵PID:1768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#162⤵PID:2484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#163⤵PID:5060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#164⤵PID:3280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#165⤵PID:1360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#166⤵PID:3880
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#167⤵PID:1256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#168⤵PID:1924
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#169⤵PID:5020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#170⤵PID:1944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#171⤵PID:1624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#172⤵PID:4092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#173⤵PID:1116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#174⤵PID:1616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#175⤵PID:4336
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#176⤵PID:2580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#177⤵PID:3400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#178⤵PID:4796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#179⤵PID:2024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#180⤵PID:4388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#181⤵PID:3920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#182⤵PID:1192
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#183⤵PID:3612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#184⤵PID:3684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#185⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#186⤵PID:1904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#187⤵PID:1704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#188⤵PID:4508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#189⤵PID:2760
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#190⤵PID:2372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#191⤵PID:2424
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#192⤵PID:404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#193⤵PID:4416
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#194⤵PID:3964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#195⤵PID:4196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#196⤵PID:2892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#197⤵PID:2324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#198⤵PID:3876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#199⤵PID:3084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1100⤵PID:4580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1101⤵PID:4636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1102⤵PID:5048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1103⤵PID:1772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1104⤵PID:3592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1105⤵PID:856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1106⤵PID:5124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1107⤵PID:5136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1108⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1109⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1110⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1111⤵PID:5204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1112⤵PID:5216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1113⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1114⤵PID:5248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1115⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1116⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1117⤵
- System Location Discovery: System Language Discovery
PID:5296 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1118⤵PID:5312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1119⤵PID:5328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1120⤵PID:5348
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1121⤵PID:5364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\567cb2a57e960c8303f68d5213900b81_JaffaCakes118.dll,#1122⤵PID:5396
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-