Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
114s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 17:56
Behavioral task
behavioral1
Sample
2956-0-0x0000000010000000-0x00000000104B5000-memory.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2956-0-0x0000000010000000-0x00000000104B5000-memory.dll
Resource
win10v2004-20250217-en
General
-
Target
2956-0-0x0000000010000000-0x00000000104B5000-memory.dll
-
Size
4.7MB
-
MD5
03742d19843755bedacc445eaba82801
-
SHA1
af3860fcc43c056693af1e3a533b33ba408cb9f3
-
SHA256
269151290ec172daa999366dcaaf1a5719b7e40a40984821c2ff348ff1d60517
-
SHA512
5ac3afcf6fc84458a479b8146ba8690961235dca6f825495690c56c40076e892983b51905af1f5a8bc6093f408e10f01b20ae64591161549204f7303fcb643f2
-
SSDEEP
98304:acm3bMNI4j9HgcmhyOIFA/EeqDvzCkyqBwFwPD+8th5c:acm3ANIO9Hgc6oF6EeqD7Ckyqp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID dwm.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID dwm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 dwm.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS dwm.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwm.exe -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft dwm.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed dwm.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeCreateGlobalPrivilege 17364 dwm.exe Token: SeChangeNotifyPrivilege 17364 dwm.exe Token: 33 17364 dwm.exe Token: SeIncBasePriorityPrivilege 17364 dwm.exe Token: SeShutdownPrivilege 17364 dwm.exe Token: SeCreatePagefilePrivilege 17364 dwm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 824 wrote to memory of 1220 824 rundll32.exe 84 PID 824 wrote to memory of 1220 824 rundll32.exe 84 PID 824 wrote to memory of 1220 824 rundll32.exe 84 PID 1220 wrote to memory of 5104 1220 rundll32.exe 85 PID 1220 wrote to memory of 5104 1220 rundll32.exe 85 PID 1220 wrote to memory of 5104 1220 rundll32.exe 85 PID 5104 wrote to memory of 4868 5104 rundll32.exe 86 PID 5104 wrote to memory of 4868 5104 rundll32.exe 86 PID 5104 wrote to memory of 4868 5104 rundll32.exe 86 PID 4868 wrote to memory of 4004 4868 rundll32.exe 87 PID 4868 wrote to memory of 4004 4868 rundll32.exe 87 PID 4868 wrote to memory of 4004 4868 rundll32.exe 87 PID 4004 wrote to memory of 2952 4004 rundll32.exe 88 PID 4004 wrote to memory of 2952 4004 rundll32.exe 88 PID 4004 wrote to memory of 2952 4004 rundll32.exe 88 PID 2952 wrote to memory of 3816 2952 rundll32.exe 89 PID 2952 wrote to memory of 3816 2952 rundll32.exe 89 PID 2952 wrote to memory of 3816 2952 rundll32.exe 89 PID 3816 wrote to memory of 2384 3816 rundll32.exe 90 PID 3816 wrote to memory of 2384 3816 rundll32.exe 90 PID 3816 wrote to memory of 2384 3816 rundll32.exe 90 PID 2384 wrote to memory of 2380 2384 rundll32.exe 91 PID 2384 wrote to memory of 2380 2384 rundll32.exe 91 PID 2384 wrote to memory of 2380 2384 rundll32.exe 91 PID 2380 wrote to memory of 4860 2380 rundll32.exe 92 PID 2380 wrote to memory of 4860 2380 rundll32.exe 92 PID 2380 wrote to memory of 4860 2380 rundll32.exe 92 PID 4860 wrote to memory of 2416 4860 rundll32.exe 93 PID 4860 wrote to memory of 2416 4860 rundll32.exe 93 PID 4860 wrote to memory of 2416 4860 rundll32.exe 93 PID 2416 wrote to memory of 908 2416 rundll32.exe 94 PID 2416 wrote to memory of 908 2416 rundll32.exe 94 PID 2416 wrote to memory of 908 2416 rundll32.exe 94 PID 908 wrote to memory of 3168 908 rundll32.exe 95 PID 908 wrote to memory of 3168 908 rundll32.exe 95 PID 908 wrote to memory of 3168 908 rundll32.exe 95 PID 3168 wrote to memory of 392 3168 rundll32.exe 96 PID 3168 wrote to memory of 392 3168 rundll32.exe 96 PID 3168 wrote to memory of 392 3168 rundll32.exe 96 PID 392 wrote to memory of 1568 392 rundll32.exe 97 PID 392 wrote to memory of 1568 392 rundll32.exe 97 PID 392 wrote to memory of 1568 392 rundll32.exe 97 PID 1568 wrote to memory of 380 1568 rundll32.exe 98 PID 1568 wrote to memory of 380 1568 rundll32.exe 98 PID 1568 wrote to memory of 380 1568 rundll32.exe 98 PID 380 wrote to memory of 4512 380 rundll32.exe 100 PID 380 wrote to memory of 4512 380 rundll32.exe 100 PID 380 wrote to memory of 4512 380 rundll32.exe 100 PID 4512 wrote to memory of 4548 4512 rundll32.exe 101 PID 4512 wrote to memory of 4548 4512 rundll32.exe 101 PID 4512 wrote to memory of 4548 4512 rundll32.exe 101 PID 4548 wrote to memory of 2312 4548 rundll32.exe 102 PID 4548 wrote to memory of 2312 4548 rundll32.exe 102 PID 4548 wrote to memory of 2312 4548 rundll32.exe 102 PID 2312 wrote to memory of 3824 2312 rundll32.exe 103 PID 2312 wrote to memory of 3824 2312 rundll32.exe 103 PID 2312 wrote to memory of 3824 2312 rundll32.exe 103 PID 3824 wrote to memory of 4232 3824 rundll32.exe 104 PID 3824 wrote to memory of 4232 3824 rundll32.exe 104 PID 3824 wrote to memory of 4232 3824 rundll32.exe 104 PID 4232 wrote to memory of 1964 4232 rundll32.exe 105 PID 4232 wrote to memory of 1964 4232 rundll32.exe 105 PID 4232 wrote to memory of 1964 4232 rundll32.exe 105 PID 1964 wrote to memory of 212 1964 rundll32.exe 106
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#110⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#111⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#116⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:3824 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#123⤵PID:212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#124⤵PID:3620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#125⤵PID:2020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#126⤵PID:1448
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#127⤵PID:4740
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#128⤵PID:1796
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#129⤵PID:4724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#130⤵PID:116
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#131⤵PID:1552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#132⤵PID:2420
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#133⤵PID:3352
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#134⤵PID:3384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#135⤵PID:2344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#136⤵PID:2124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#137⤵PID:2040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#138⤵PID:4764
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#139⤵PID:4308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#140⤵PID:4392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#141⤵PID:2188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#142⤵PID:3400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#143⤵PID:4620
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#144⤵PID:2880
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#145⤵PID:2508
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#146⤵PID:1640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#147⤵PID:3988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#148⤵PID:4896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#149⤵PID:3376
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#150⤵PID:4436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#151⤵PID:4840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#152⤵PID:728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#153⤵PID:3648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#154⤵PID:4000
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#155⤵PID:912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#156⤵PID:2308
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#157⤵PID:4176
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#158⤵PID:1032
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#159⤵PID:2800
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#160⤵PID:4412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#161⤵PID:2988
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#162⤵PID:3476
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#163⤵PID:4564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#164⤵PID:5056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#165⤵PID:1320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#166⤵PID:4972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#167⤵PID:3956
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#168⤵PID:2272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#169⤵PID:5020
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#170⤵PID:3324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#171⤵PID:3892
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#172⤵PID:4360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#173⤵PID:3080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#174⤵
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#175⤵PID:4040
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#176⤵PID:3060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#177⤵PID:1600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#178⤵PID:2784
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#179⤵
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#180⤵PID:3240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#181⤵
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#182⤵PID:4328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#183⤵PID:2592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#184⤵PID:2452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#185⤵PID:4296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#186⤵PID:1092
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#187⤵PID:3272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#188⤵PID:3064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#189⤵PID:4640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#190⤵PID:2816
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#191⤵PID:936
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#192⤵PID:3964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#193⤵PID:5148
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#194⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#195⤵PID:5196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#196⤵PID:5208
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#197⤵PID:5224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#198⤵
- System Location Discovery: System Language Discovery
PID:5244 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#199⤵PID:5260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1100⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1101⤵PID:5296
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1102⤵PID:5316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1103⤵PID:5332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1104⤵PID:5344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1105⤵PID:5360
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1106⤵PID:5380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1107⤵PID:5396
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1108⤵PID:5412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1109⤵PID:5428
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1110⤵PID:5452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1111⤵PID:5468
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1112⤵PID:5488
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1113⤵PID:5504
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1114⤵PID:5516
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1115⤵PID:5536
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1116⤵PID:5552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1117⤵PID:5568
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1118⤵
- System Location Discovery: System Language Discovery
PID:5584 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1119⤵PID:5600
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1120⤵PID:5632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1121⤵PID:5664
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\2956-0-0x0000000010000000-0x00000000104B5000-memory.dll,#1122⤵PID:5684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-