Analysis
-
max time kernel
141s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/05/2024, 07:33
Static task
static1
Behavioral task
behavioral1
Sample
10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll
Resource
win10v2004-20240508-en
General
-
Target
10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll
-
Size
1.2MB
-
MD5
bfc07a51a8b33205488af48d500f9ca8
-
SHA1
59444d0cbdefe6ceed458ba1e99f4d65dc33adef
-
SHA256
10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f
-
SHA512
d54642ee2ed0392f6e78e14d1fb5808468ffdb0410b7cfa3b2bf37021e04f092ea87e40c08b8023d8026bc69dfba94dc787de63be667731dd48e1232692e261d
-
SSDEEP
24576:6yS/lPOFGdSR4H2UJJ8cwiVf9LC+Tsph0LX7:6rlOGpH2mJ3f9LC+TAgX7
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2a\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17632 dwm.exe Token: SeChangeNotifyPrivilege 17632 dwm.exe Token: 33 17632 dwm.exe Token: SeIncBasePriorityPrivilege 17632 dwm.exe Token: SeShutdownPrivilege 17632 dwm.exe Token: SeCreatePagefilePrivilege 17632 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5036 wrote to memory of 1564 5036 rundll32.exe 83 PID 5036 wrote to memory of 1564 5036 rundll32.exe 83 PID 5036 wrote to memory of 1564 5036 rundll32.exe 83 PID 1564 wrote to memory of 1176 1564 rundll32.exe 84 PID 1564 wrote to memory of 1176 1564 rundll32.exe 84 PID 1564 wrote to memory of 1176 1564 rundll32.exe 84 PID 1176 wrote to memory of 404 1176 rundll32.exe 85 PID 1176 wrote to memory of 404 1176 rundll32.exe 85 PID 1176 wrote to memory of 404 1176 rundll32.exe 85 PID 404 wrote to memory of 4264 404 rundll32.exe 86 PID 404 wrote to memory of 4264 404 rundll32.exe 86 PID 404 wrote to memory of 4264 404 rundll32.exe 86 PID 4264 wrote to memory of 1096 4264 rundll32.exe 87 PID 4264 wrote to memory of 1096 4264 rundll32.exe 87 PID 4264 wrote to memory of 1096 4264 rundll32.exe 87 PID 1096 wrote to memory of 2924 1096 rundll32.exe 88 PID 1096 wrote to memory of 2924 1096 rundll32.exe 88 PID 1096 wrote to memory of 2924 1096 rundll32.exe 88 PID 2924 wrote to memory of 2916 2924 rundll32.exe 89 PID 2924 wrote to memory of 2916 2924 rundll32.exe 89 PID 2924 wrote to memory of 2916 2924 rundll32.exe 89 PID 2916 wrote to memory of 4568 2916 rundll32.exe 90 PID 2916 wrote to memory of 4568 2916 rundll32.exe 90 PID 2916 wrote to memory of 4568 2916 rundll32.exe 90 PID 4568 wrote to memory of 4208 4568 rundll32.exe 91 PID 4568 wrote to memory of 4208 4568 rundll32.exe 91 PID 4568 wrote to memory of 4208 4568 rundll32.exe 91 PID 4208 wrote to memory of 4588 4208 rundll32.exe 92 PID 4208 wrote to memory of 4588 4208 rundll32.exe 92 PID 4208 wrote to memory of 4588 4208 rundll32.exe 92 PID 4588 wrote to memory of 1160 4588 rundll32.exe 93 PID 4588 wrote to memory of 1160 4588 rundll32.exe 93 PID 4588 wrote to memory of 1160 4588 rundll32.exe 93 PID 1160 wrote to memory of 2592 1160 rundll32.exe 94 PID 1160 wrote to memory of 2592 1160 rundll32.exe 94 PID 1160 wrote to memory of 2592 1160 rundll32.exe 94 PID 2592 wrote to memory of 3084 2592 rundll32.exe 95 PID 2592 wrote to memory of 3084 2592 rundll32.exe 95 PID 2592 wrote to memory of 3084 2592 rundll32.exe 95 PID 3084 wrote to memory of 4704 3084 rundll32.exe 96 PID 3084 wrote to memory of 4704 3084 rundll32.exe 96 PID 3084 wrote to memory of 4704 3084 rundll32.exe 96 PID 4704 wrote to memory of 1912 4704 rundll32.exe 97 PID 4704 wrote to memory of 1912 4704 rundll32.exe 97 PID 4704 wrote to memory of 1912 4704 rundll32.exe 97 PID 1912 wrote to memory of 3496 1912 rundll32.exe 98 PID 1912 wrote to memory of 3496 1912 rundll32.exe 98 PID 1912 wrote to memory of 3496 1912 rundll32.exe 98 PID 3496 wrote to memory of 3572 3496 rundll32.exe 99 PID 3496 wrote to memory of 3572 3496 rundll32.exe 99 PID 3496 wrote to memory of 3572 3496 rundll32.exe 99 PID 3572 wrote to memory of 2624 3572 rundll32.exe 100 PID 3572 wrote to memory of 2624 3572 rundll32.exe 100 PID 3572 wrote to memory of 2624 3572 rundll32.exe 100 PID 2624 wrote to memory of 2240 2624 rundll32.exe 101 PID 2624 wrote to memory of 2240 2624 rundll32.exe 101 PID 2624 wrote to memory of 2240 2624 rundll32.exe 101 PID 2240 wrote to memory of 4132 2240 rundll32.exe 102 PID 2240 wrote to memory of 4132 2240 rundll32.exe 102 PID 2240 wrote to memory of 4132 2240 rundll32.exe 102 PID 4132 wrote to memory of 1216 4132 rundll32.exe 103 PID 4132 wrote to memory of 1216 4132 rundll32.exe 103 PID 4132 wrote to memory of 1216 4132 rundll32.exe 103 PID 1216 wrote to memory of 704 1216 rundll32.exe 104
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:3084 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#123⤵PID:704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#124⤵PID:2332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#125⤵PID:1272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#126⤵PID:4608
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#127⤵PID:440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#128⤵PID:4004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#129⤵PID:2304
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#130⤵PID:4732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#131⤵PID:2612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#132⤵PID:228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#133⤵PID:392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#134⤵PID:624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#135⤵PID:2080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#136⤵PID:2028
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#137⤵PID:4024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#138⤵PID:4500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#139⤵PID:1344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#140⤵PID:220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#141⤵PID:1068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#142⤵PID:4580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#143⤵PID:3168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#144⤵PID:3264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#145⤵PID:3720
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#146⤵PID:2160
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#147⤵PID:4724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#148⤵PID:2964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#149⤵PID:2000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#150⤵PID:3740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#151⤵PID:3240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#152⤵PID:1104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#153⤵PID:3196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#154⤵PID:1576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#155⤵PID:4272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#156⤵PID:816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#157⤵PID:3716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#158⤵PID:3868
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#159⤵PID:2588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#160⤵PID:1844
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#161⤵PID:3836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#162⤵PID:4692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#163⤵PID:4068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#164⤵PID:4680
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#165⤵PID:4172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#166⤵PID:2280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#167⤵PID:512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#168⤵PID:2668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#169⤵PID:4944
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#170⤵PID:1572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#171⤵PID:3628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#172⤵PID:4740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#173⤵PID:5004
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#174⤵PID:1908
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#175⤵PID:2448
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#176⤵PID:1984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#177⤵PID:2368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#178⤵PID:2384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#179⤵PID:2040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#180⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#181⤵PID:3356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#182⤵PID:1144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#183⤵PID:2444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#184⤵PID:540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#185⤵PID:1360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#186⤵PID:3492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#187⤵PID:4492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#188⤵PID:1736
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#189⤵PID:2268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#190⤵PID:3520
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#191⤵PID:3280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#192⤵PID:2988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#193⤵PID:2704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#194⤵PID:1404
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#195⤵PID:2600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#196⤵PID:5124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#197⤵PID:5140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#198⤵PID:5152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#199⤵PID:5176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1100⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1101⤵PID:5204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1102⤵PID:5228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1103⤵PID:5240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1104⤵PID:5256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1105⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1106⤵PID:5312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1107⤵PID:5340
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1108⤵PID:5364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1109⤵PID:5380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1110⤵PID:5396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1111⤵PID:5408
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1112⤵PID:5424
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1113⤵PID:5436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1114⤵PID:5452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1115⤵PID:5468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1116⤵PID:5480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1117⤵PID:5500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1118⤵PID:5516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1119⤵PID:5536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1120⤵PID:5552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1121⤵PID:5568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\10faf2c6b730a4cda31f6af325d6cc99e05be7d34a5526219ec421cb37595b5f.dll,#1122⤵PID:5580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-