Overview
overview
10Static
static
1058b64582e2...99.dll
windows7-x64
358b64582e2...99.dll
windows10-2004-x64
38bb29205d5...0b.dll
windows7-x64
38bb29205d5...0b.dll
windows10-2004-x64
3b262e47d42...bc.dll
windows7-x64
3b262e47d42...bc.dll
windows10-2004-x64
3c9390a1f7f...ca.dll
windows7-x64
3c9390a1f7f...ca.dll
windows10-2004-x64
3ec56a6bf59...12.dll
windows7-x64
3ec56a6bf59...12.dll
windows10-2004-x64
3ece3f43b8d...99.dll
windows7-x64
3ece3f43b8d...99.dll
windows10-2004-x64
3ef01bd51c0...e0.dll
windows7-x64
3ef01bd51c0...e0.dll
windows10-2004-x64
3f5da3e1d8e...20.dll
windows7-x64
3f5da3e1d8e...20.dll
windows10-2004-x64
3f77e988ff3...67.dll
windows7-x64
3f77e988ff3...67.dll
windows10-2004-x64
3fbaf9bcf1f...42.dll
windows7-x64
3fbaf9bcf1f...42.dll
windows10-2004-x64
3Analysis
-
max time kernel
125s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 23:42
Behavioral task
behavioral1
Sample
58b64582e298888676585cb3fe67f3c1f48b74e7ca56ba96b1b63d9baaa0fa99.dll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
58b64582e298888676585cb3fe67f3c1f48b74e7ca56ba96b1b63d9baaa0fa99.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
8bb29205d5fd1c8dcff683dbcca2c70697f2fcafc799e4060b987868f4838c0b.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
8bb29205d5fd1c8dcff683dbcca2c70697f2fcafc799e4060b987868f4838c0b.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
b262e47d429a9705e173ca20401db353e887c1adec9d16c649503b31b7b2dcbc.dll
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
b262e47d429a9705e173ca20401db353e887c1adec9d16c649503b31b7b2dcbc.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
c9390a1f7fcb2250a77b952b66272ec2272a0e371725ab0d50a435e012d299ca.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
c9390a1f7fcb2250a77b952b66272ec2272a0e371725ab0d50a435e012d299ca.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
ec56a6bf598c179d048d457ccb42f6b39cc4d37d7252b403a0947c942b53fc12.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
ec56a6bf598c179d048d457ccb42f6b39cc4d37d7252b403a0947c942b53fc12.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
ece3f43b8dbc408716c3b9acbdc3a02a4b8f11eab204e3c5f1f5bdcfa5bfe599.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
ece3f43b8dbc408716c3b9acbdc3a02a4b8f11eab204e3c5f1f5bdcfa5bfe599.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
ef01bd51c036d68316dfe8e98adc30fffecd521bd36cfac6dc86b06c0f9188e0.dll
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
ef01bd51c036d68316dfe8e98adc30fffecd521bd36cfac6dc86b06c0f9188e0.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
f5da3e1d8ea95ea2d969c460396447a9bdab242c2df1dcbc2e88a98452393620.dll
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
f5da3e1d8ea95ea2d969c460396447a9bdab242c2df1dcbc2e88a98452393620.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
f77e988ff3f0ff5af39bb4d769606ec49acd0e32551be27bfdca84782ab5f667.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
f77e988ff3f0ff5af39bb4d769606ec49acd0e32551be27bfdca84782ab5f667.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll
Resource
win10v2004-20241007-en
General
-
Target
fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll
-
Size
599KB
-
MD5
a94e30d475b5ebb5e945ad86c7124376
-
SHA1
72611dbd4fe68629db24ee1f7d154d8cf6facbd0
-
SHA256
fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042
-
SHA512
1fa1185212e4388711ce82c1c5856104736c482abc1b3ce91bf55344f3989a6c4d645fe47ecb2cfbb4698845800aad4dd432381bb4e4cf7e8dabcbf54fd17b5b
-
SSDEEP
12288:u95F5VQsSFR8pczokIUCkmr/7unbQxIpI2eE:65jVQsSFR8pPl72eE
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17136 dwm.exe Token: SeChangeNotifyPrivilege 17136 dwm.exe Token: 33 17136 dwm.exe Token: SeIncBasePriorityPrivilege 17136 dwm.exe Token: SeShutdownPrivilege 17136 dwm.exe Token: SeCreatePagefilePrivilege 17136 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 872 wrote to memory of 4328 872 rundll32.exe 81 PID 872 wrote to memory of 4328 872 rundll32.exe 81 PID 872 wrote to memory of 4328 872 rundll32.exe 81 PID 4328 wrote to memory of 1020 4328 rundll32.exe 82 PID 4328 wrote to memory of 1020 4328 rundll32.exe 82 PID 4328 wrote to memory of 1020 4328 rundll32.exe 82 PID 1020 wrote to memory of 2344 1020 rundll32.exe 83 PID 1020 wrote to memory of 2344 1020 rundll32.exe 83 PID 1020 wrote to memory of 2344 1020 rundll32.exe 83 PID 2344 wrote to memory of 4384 2344 rundll32.exe 84 PID 2344 wrote to memory of 4384 2344 rundll32.exe 84 PID 2344 wrote to memory of 4384 2344 rundll32.exe 84 PID 4384 wrote to memory of 3520 4384 rundll32.exe 85 PID 4384 wrote to memory of 3520 4384 rundll32.exe 85 PID 4384 wrote to memory of 3520 4384 rundll32.exe 85 PID 3520 wrote to memory of 744 3520 rundll32.exe 86 PID 3520 wrote to memory of 744 3520 rundll32.exe 86 PID 3520 wrote to memory of 744 3520 rundll32.exe 86 PID 744 wrote to memory of 916 744 rundll32.exe 87 PID 744 wrote to memory of 916 744 rundll32.exe 87 PID 744 wrote to memory of 916 744 rundll32.exe 87 PID 916 wrote to memory of 912 916 rundll32.exe 88 PID 916 wrote to memory of 912 916 rundll32.exe 88 PID 916 wrote to memory of 912 916 rundll32.exe 88 PID 912 wrote to memory of 3492 912 rundll32.exe 89 PID 912 wrote to memory of 3492 912 rundll32.exe 89 PID 912 wrote to memory of 3492 912 rundll32.exe 89 PID 3492 wrote to memory of 4300 3492 rundll32.exe 90 PID 3492 wrote to memory of 4300 3492 rundll32.exe 90 PID 3492 wrote to memory of 4300 3492 rundll32.exe 90 PID 4300 wrote to memory of 4788 4300 rundll32.exe 91 PID 4300 wrote to memory of 4788 4300 rundll32.exe 91 PID 4300 wrote to memory of 4788 4300 rundll32.exe 91 PID 4788 wrote to memory of 4336 4788 rundll32.exe 92 PID 4788 wrote to memory of 4336 4788 rundll32.exe 92 PID 4788 wrote to memory of 4336 4788 rundll32.exe 92 PID 4336 wrote to memory of 4576 4336 rundll32.exe 93 PID 4336 wrote to memory of 4576 4336 rundll32.exe 93 PID 4336 wrote to memory of 4576 4336 rundll32.exe 93 PID 4576 wrote to memory of 3680 4576 rundll32.exe 94 PID 4576 wrote to memory of 3680 4576 rundll32.exe 94 PID 4576 wrote to memory of 3680 4576 rundll32.exe 94 PID 3680 wrote to memory of 4872 3680 rundll32.exe 95 PID 3680 wrote to memory of 4872 3680 rundll32.exe 95 PID 3680 wrote to memory of 4872 3680 rundll32.exe 95 PID 4872 wrote to memory of 4820 4872 rundll32.exe 96 PID 4872 wrote to memory of 4820 4872 rundll32.exe 96 PID 4872 wrote to memory of 4820 4872 rundll32.exe 96 PID 4820 wrote to memory of 1612 4820 rundll32.exe 97 PID 4820 wrote to memory of 1612 4820 rundll32.exe 97 PID 4820 wrote to memory of 1612 4820 rundll32.exe 97 PID 1612 wrote to memory of 3428 1612 rundll32.exe 98 PID 1612 wrote to memory of 3428 1612 rundll32.exe 98 PID 1612 wrote to memory of 3428 1612 rundll32.exe 98 PID 3428 wrote to memory of 3776 3428 rundll32.exe 99 PID 3428 wrote to memory of 3776 3428 rundll32.exe 99 PID 3428 wrote to memory of 3776 3428 rundll32.exe 99 PID 3776 wrote to memory of 760 3776 rundll32.exe 100 PID 3776 wrote to memory of 760 3776 rundll32.exe 100 PID 3776 wrote to memory of 760 3776 rundll32.exe 100 PID 760 wrote to memory of 3836 760 rundll32.exe 101 PID 760 wrote to memory of 3836 760 rundll32.exe 101 PID 760 wrote to memory of 3836 760 rundll32.exe 101 PID 3836 wrote to memory of 548 3836 rundll32.exe 102
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#16⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#111⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#114⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#117⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#123⤵PID:548
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#124⤵PID:1088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#125⤵PID:1368
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#126⤵PID:1064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#127⤵PID:2360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#128⤵PID:3172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#129⤵PID:3728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#130⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#131⤵
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#132⤵PID:4008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#133⤵PID:112
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#134⤵PID:5080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#135⤵PID:2364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#136⤵PID:4984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#137⤵PID:3256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#138⤵PID:3412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#139⤵PID:4756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#140⤵PID:4452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#141⤵PID:1904
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#142⤵PID:2464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#143⤵PID:2216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#144⤵PID:3312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#145⤵PID:936
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#146⤵PID:3840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#147⤵PID:1688
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#148⤵PID:2772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#149⤵PID:1040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#150⤵PID:612
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#151⤵PID:5036
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#152⤵PID:800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#153⤵PID:3504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#154⤵PID:1316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#155⤵PID:4848
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#156⤵PID:4520
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#157⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#158⤵PID:1424
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#159⤵
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#160⤵PID:2620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#161⤵PID:2408
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#162⤵PID:4968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#163⤵PID:4216
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#164⤵PID:3940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#165⤵PID:4852
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#166⤵PID:1372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#167⤵PID:2468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#168⤵PID:4252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#169⤵PID:668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#170⤵PID:1048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#171⤵PID:4012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#172⤵PID:2704
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#173⤵PID:2012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#174⤵PID:3692
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#175⤵PID:976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#176⤵PID:796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#177⤵PID:4516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#178⤵
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#179⤵PID:2476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#180⤵PID:3528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#181⤵PID:4828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#182⤵PID:3592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#183⤵PID:2536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#184⤵PID:4992
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#185⤵PID:3796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#186⤵
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#187⤵PID:716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#188⤵PID:2632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#189⤵PID:4488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#190⤵PID:3276
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#191⤵PID:4588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#192⤵PID:4528
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#193⤵PID:1756
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#194⤵PID:4752
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#195⤵PID:1256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#196⤵PID:2412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#197⤵PID:3768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#198⤵PID:4572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#199⤵PID:4124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1100⤵PID:1920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1101⤵PID:1648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1102⤵PID:440
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1103⤵PID:1068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1104⤵PID:4684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1105⤵PID:5100
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1106⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1107⤵PID:4676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1108⤵PID:2624
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1109⤵PID:1432
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1110⤵PID:860
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1111⤵PID:1180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1112⤵PID:1044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1113⤵PID:4500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1114⤵PID:2668
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1115⤵PID:3452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1116⤵PID:4108
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1117⤵PID:212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1118⤵
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1119⤵PID:3228
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1120⤵PID:4816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1121⤵
- System Location Discovery: System Language Discovery
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\fbaf9bcf1f9fdbbccbcdf2060e791fc8392c8fdbee1381002e0bd45c1744e042.dll,#1122⤵PID:5068
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-