Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-01-2025 09:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll
-
Size
640KB
-
MD5
e2b4a78005ab98d090f1e9ebf9727ee4
-
SHA1
5c1e047a440bedb6dfd7e7a50b2d2cd7d9d513a5
-
SHA256
4ba32f9e368f82b5fceab2a53352c84b10d92cc2652301e3ec41308632980126
-
SHA512
39759f286c32458075870f702a1ad793358481974c1ba4e6d31211501088fbce8a9985b3c562e00def493a524ca45fb45fc56e3e14b50f5f7c84ead8e9df2b99
-
SSDEEP
12288:cUmptj+TNPzcKKa5RsLCclPzl+byBOkxo:c/ipzcKKWRsLCclPEbyBOkxo
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17256 dwm.exe Token: SeChangeNotifyPrivilege 17256 dwm.exe Token: 33 17256 dwm.exe Token: SeIncBasePriorityPrivilege 17256 dwm.exe Token: SeShutdownPrivilege 17256 dwm.exe Token: SeCreatePagefilePrivilege 17256 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4872 wrote to memory of 1968 4872 rundll32.exe 82 PID 4872 wrote to memory of 1968 4872 rundll32.exe 82 PID 4872 wrote to memory of 1968 4872 rundll32.exe 82 PID 1968 wrote to memory of 2028 1968 rundll32.exe 83 PID 1968 wrote to memory of 2028 1968 rundll32.exe 83 PID 1968 wrote to memory of 2028 1968 rundll32.exe 83 PID 2028 wrote to memory of 888 2028 rundll32.exe 84 PID 2028 wrote to memory of 888 2028 rundll32.exe 84 PID 2028 wrote to memory of 888 2028 rundll32.exe 84 PID 888 wrote to memory of 4648 888 rundll32.exe 85 PID 888 wrote to memory of 4648 888 rundll32.exe 85 PID 888 wrote to memory of 4648 888 rundll32.exe 85 PID 4648 wrote to memory of 884 4648 rundll32.exe 86 PID 4648 wrote to memory of 884 4648 rundll32.exe 86 PID 4648 wrote to memory of 884 4648 rundll32.exe 86 PID 884 wrote to memory of 4932 884 rundll32.exe 87 PID 884 wrote to memory of 4932 884 rundll32.exe 87 PID 884 wrote to memory of 4932 884 rundll32.exe 87 PID 4932 wrote to memory of 3732 4932 rundll32.exe 88 PID 4932 wrote to memory of 3732 4932 rundll32.exe 88 PID 4932 wrote to memory of 3732 4932 rundll32.exe 88 PID 3732 wrote to memory of 4588 3732 rundll32.exe 89 PID 3732 wrote to memory of 4588 3732 rundll32.exe 89 PID 3732 wrote to memory of 4588 3732 rundll32.exe 89 PID 4588 wrote to memory of 3616 4588 rundll32.exe 90 PID 4588 wrote to memory of 3616 4588 rundll32.exe 90 PID 4588 wrote to memory of 3616 4588 rundll32.exe 90 PID 3616 wrote to memory of 980 3616 rundll32.exe 91 PID 3616 wrote to memory of 980 3616 rundll32.exe 91 PID 3616 wrote to memory of 980 3616 rundll32.exe 91 PID 980 wrote to memory of 2068 980 rundll32.exe 92 PID 980 wrote to memory of 2068 980 rundll32.exe 92 PID 980 wrote to memory of 2068 980 rundll32.exe 92 PID 2068 wrote to memory of 4836 2068 rundll32.exe 93 PID 2068 wrote to memory of 4836 2068 rundll32.exe 93 PID 2068 wrote to memory of 4836 2068 rundll32.exe 93 PID 4836 wrote to memory of 1660 4836 rundll32.exe 94 PID 4836 wrote to memory of 1660 4836 rundll32.exe 94 PID 4836 wrote to memory of 1660 4836 rundll32.exe 94 PID 1660 wrote to memory of 2064 1660 rundll32.exe 95 PID 1660 wrote to memory of 2064 1660 rundll32.exe 95 PID 1660 wrote to memory of 2064 1660 rundll32.exe 95 PID 2064 wrote to memory of 1180 2064 rundll32.exe 96 PID 2064 wrote to memory of 1180 2064 rundll32.exe 96 PID 2064 wrote to memory of 1180 2064 rundll32.exe 96 PID 1180 wrote to memory of 2180 1180 rundll32.exe 97 PID 1180 wrote to memory of 2180 1180 rundll32.exe 97 PID 1180 wrote to memory of 2180 1180 rundll32.exe 97 PID 2180 wrote to memory of 4020 2180 rundll32.exe 98 PID 2180 wrote to memory of 4020 2180 rundll32.exe 98 PID 2180 wrote to memory of 4020 2180 rundll32.exe 98 PID 4020 wrote to memory of 2248 4020 rundll32.exe 99 PID 4020 wrote to memory of 2248 4020 rundll32.exe 99 PID 4020 wrote to memory of 2248 4020 rundll32.exe 99 PID 2248 wrote to memory of 4968 2248 rundll32.exe 100 PID 2248 wrote to memory of 4968 2248 rundll32.exe 100 PID 2248 wrote to memory of 4968 2248 rundll32.exe 100 PID 4968 wrote to memory of 3424 4968 rundll32.exe 101 PID 4968 wrote to memory of 3424 4968 rundll32.exe 101 PID 4968 wrote to memory of 3424 4968 rundll32.exe 101 PID 3424 wrote to memory of 1172 3424 rundll32.exe 102 PID 3424 wrote to memory of 1172 3424 rundll32.exe 102 PID 3424 wrote to memory of 1172 3424 rundll32.exe 102 PID 1172 wrote to memory of 3444 1172 rundll32.exe 103
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:884 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#112⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#114⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#120⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#123⤵PID:3444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#124⤵PID:3020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#125⤵PID:508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#126⤵PID:920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#127⤵PID:2588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#128⤵PID:1884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#129⤵PID:1876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#130⤵PID:2024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#131⤵PID:2656
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#132⤵PID:4544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#133⤵PID:4112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#134⤵PID:2280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#135⤵PID:3620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#136⤵PID:3528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#137⤵PID:4104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#138⤵PID:2644
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#139⤵PID:4136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#140⤵PID:3492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#141⤵PID:4820
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#142⤵PID:620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#143⤵PID:1636
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#144⤵PID:1436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#145⤵PID:220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#146⤵PID:4628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#147⤵PID:1084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#148⤵PID:544
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#149⤵PID:1752
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#150⤵PID:3080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#151⤵PID:3468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#152⤵PID:3200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#153⤵PID:964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#154⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#155⤵PID:2232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#156⤵
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#157⤵PID:4944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#158⤵PID:3984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#159⤵PID:4912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#160⤵PID:1500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#161⤵PID:4484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#162⤵PID:4892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#163⤵PID:2652
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#164⤵PID:640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#165⤵PID:392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#166⤵PID:3524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#167⤵PID:4172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#168⤵PID:1076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#169⤵PID:4696
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#170⤵PID:2872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#171⤵PID:4884
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#172⤵PID:4876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#173⤵PID:3756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#174⤵PID:3084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#175⤵PID:3964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#176⤵PID:3504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#177⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#178⤵PID:3144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#179⤵PID:872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#180⤵PID:3180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#181⤵PID:5024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#182⤵PID:2860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#183⤵PID:4844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#184⤵PID:4984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#185⤵PID:1252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#186⤵PID:388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#187⤵PID:4676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#188⤵PID:452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#189⤵PID:2724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#190⤵PID:2444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#191⤵PID:4168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#192⤵
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#193⤵PID:4776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#194⤵PID:4200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#195⤵PID:1372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#196⤵PID:2072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#197⤵PID:2776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#198⤵
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#199⤵PID:2844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1100⤵PID:1576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1101⤵PID:3940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1102⤵PID:1188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1103⤵PID:4404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1104⤵PID:4504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1105⤵PID:5100
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1106⤵PID:4436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1107⤵PID:5048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1108⤵PID:4076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1109⤵PID:4748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1110⤵PID:5132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1111⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1112⤵PID:5168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1113⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1114⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1115⤵PID:5212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1116⤵PID:5224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1117⤵PID:5236
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1118⤵PID:5252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1119⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1120⤵PID:5276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1121⤵PID:5288
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e2b4a78005ab98d090f1e9ebf9727ee4.dll,#1122⤵PID:5304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-