Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
61s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
07/02/2023, 17:30
Static task
static1
Behavioral task
behavioral1
Sample
gb.jpg.dll
Resource
win7-20220812-en
1 signatures
150 seconds
Behavioral task
behavioral2
Sample
gb.jpg.dll
Resource
win10v2004-20221111-en
1 signatures
150 seconds
General
-
Target
gb.jpg.dll
-
Size
4KB
-
MD5
31a12ae662573380939a6df764d372e4
-
SHA1
54701819ad994c68a06afc5b020cf35e938a1914
-
SHA256
4cfcc983609d06a8b6be4472247adb4651fe4749d1b620f0ef920b5b9775b7c0
-
SHA512
3706f466d090c43c5c33dd9ddcec566671dbf79a8772b4113ce87035a8e82e4a45112920e67169e69f2d1459c7a39a4eb6e469a6ed0f31da6dee4bcf518ec3d1
Score
1/10
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2360 wrote to memory of 1224 2360 rundll32.exe 82 PID 2360 wrote to memory of 1224 2360 rundll32.exe 82 PID 2360 wrote to memory of 1224 2360 rundll32.exe 82 PID 1224 wrote to memory of 2684 1224 rundll32.exe 83 PID 1224 wrote to memory of 2684 1224 rundll32.exe 83 PID 1224 wrote to memory of 2684 1224 rundll32.exe 83 PID 2684 wrote to memory of 2092 2684 rundll32.exe 84 PID 2684 wrote to memory of 2092 2684 rundll32.exe 84 PID 2684 wrote to memory of 2092 2684 rundll32.exe 84 PID 2092 wrote to memory of 3236 2092 rundll32.exe 85 PID 2092 wrote to memory of 3236 2092 rundll32.exe 85 PID 2092 wrote to memory of 3236 2092 rundll32.exe 85 PID 3236 wrote to memory of 2540 3236 rundll32.exe 86 PID 3236 wrote to memory of 2540 3236 rundll32.exe 86 PID 3236 wrote to memory of 2540 3236 rundll32.exe 86 PID 2540 wrote to memory of 5112 2540 rundll32.exe 87 PID 2540 wrote to memory of 5112 2540 rundll32.exe 87 PID 2540 wrote to memory of 5112 2540 rundll32.exe 87 PID 5112 wrote to memory of 3892 5112 rundll32.exe 88 PID 5112 wrote to memory of 3892 5112 rundll32.exe 88 PID 5112 wrote to memory of 3892 5112 rundll32.exe 88 PID 3892 wrote to memory of 4852 3892 rundll32.exe 89 PID 3892 wrote to memory of 4852 3892 rundll32.exe 89 PID 3892 wrote to memory of 4852 3892 rundll32.exe 89 PID 4852 wrote to memory of 1508 4852 rundll32.exe 90 PID 4852 wrote to memory of 1508 4852 rundll32.exe 90 PID 4852 wrote to memory of 1508 4852 rundll32.exe 90 PID 1508 wrote to memory of 1696 1508 rundll32.exe 91 PID 1508 wrote to memory of 1696 1508 rundll32.exe 91 PID 1508 wrote to memory of 1696 1508 rundll32.exe 91 PID 1696 wrote to memory of 1784 1696 rundll32.exe 92 PID 1696 wrote to memory of 1784 1696 rundll32.exe 92 PID 1696 wrote to memory of 1784 1696 rundll32.exe 92 PID 1784 wrote to memory of 4460 1784 rundll32.exe 93 PID 1784 wrote to memory of 4460 1784 rundll32.exe 93 PID 1784 wrote to memory of 4460 1784 rundll32.exe 93 PID 4460 wrote to memory of 4668 4460 rundll32.exe 94 PID 4460 wrote to memory of 4668 4460 rundll32.exe 94 PID 4460 wrote to memory of 4668 4460 rundll32.exe 94 PID 4668 wrote to memory of 1504 4668 rundll32.exe 95 PID 4668 wrote to memory of 1504 4668 rundll32.exe 95 PID 4668 wrote to memory of 1504 4668 rundll32.exe 95 PID 1504 wrote to memory of 1528 1504 rundll32.exe 96 PID 1504 wrote to memory of 1528 1504 rundll32.exe 96 PID 1504 wrote to memory of 1528 1504 rundll32.exe 96 PID 1528 wrote to memory of 3956 1528 rundll32.exe 97 PID 1528 wrote to memory of 3956 1528 rundll32.exe 97 PID 1528 wrote to memory of 3956 1528 rundll32.exe 97 PID 3956 wrote to memory of 2076 3956 rundll32.exe 98 PID 3956 wrote to memory of 2076 3956 rundll32.exe 98 PID 3956 wrote to memory of 2076 3956 rundll32.exe 98 PID 2076 wrote to memory of 2212 2076 rundll32.exe 99 PID 2076 wrote to memory of 2212 2076 rundll32.exe 99 PID 2076 wrote to memory of 2212 2076 rundll32.exe 99 PID 2212 wrote to memory of 4356 2212 rundll32.exe 100 PID 2212 wrote to memory of 4356 2212 rundll32.exe 100 PID 2212 wrote to memory of 4356 2212 rundll32.exe 100 PID 4356 wrote to memory of 5096 4356 rundll32.exe 101 PID 4356 wrote to memory of 5096 4356 rundll32.exe 101 PID 4356 wrote to memory of 5096 4356 rundll32.exe 101 PID 5096 wrote to memory of 3496 5096 rundll32.exe 102 PID 5096 wrote to memory of 3496 5096 rundll32.exe 102 PID 5096 wrote to memory of 3496 5096 rundll32.exe 102 PID 3496 wrote to memory of 3152 3496 rundll32.exe 103
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#123⤵PID:3152
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#124⤵PID:4684
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#125⤵PID:2256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#126⤵PID:212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#127⤵PID:1512
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#128⤵PID:1356
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#129⤵PID:3840
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#130⤵PID:2712
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#131⤵PID:60
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#132⤵PID:1064
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#133⤵PID:3008
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#134⤵PID:3056
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#135⤵PID:5032
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#136⤵PID:1436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#137⤵PID:1384
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#138⤵PID:3616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#139⤵PID:1492
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#140⤵PID:4640
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#141⤵PID:3344
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#142⤵PID:3752
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#143⤵PID:5016
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#144⤵PID:1256
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#145⤵PID:2580
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#146⤵PID:3700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#147⤵PID:4748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#148⤵PID:2564
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#149⤵PID:2204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#150⤵PID:2072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#151⤵PID:1616
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#152⤵PID:3896
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#153⤵PID:4728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#154⤵PID:5068
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#155⤵PID:3812
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#156⤵PID:4948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#157⤵PID:3572
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#158⤵PID:856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#159⤵PID:4540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#160⤵PID:4240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#161⤵PID:4072
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#162⤵PID:1748
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#163⤵PID:1676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#164⤵PID:676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#165⤵PID:1324
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#166⤵PID:4716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#167⤵PID:4500
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#168⤵PID:1732
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#169⤵PID:3672
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#170⤵PID:3768
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#171⤵PID:3320
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#172⤵PID:1204
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#173⤵PID:1012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#174⤵PID:964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#175⤵PID:3940
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#176⤵PID:828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#177⤵PID:5080
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#178⤵PID:804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#179⤵PID:4888
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#180⤵PID:1588
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#181⤵PID:1592
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#182⤵PID:4136
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#183⤵PID:3560
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#184⤵PID:4452
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#185⤵PID:4012
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#186⤵PID:3412
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#187⤵PID:1540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#188⤵PID:1828
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#189⤵PID:4392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#190⤵PID:2824
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#191⤵PID:1168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#192⤵PID:3392
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#193⤵PID:3148
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#194⤵PID:872
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#195⤵PID:3224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#196⤵PID:2552
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#197⤵PID:2524
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#198⤵PID:2088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#199⤵PID:4596
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1100⤵PID:916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1101⤵PID:3776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1102⤵PID:4628
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1103⤵PID:1780
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1104⤵PID:4364
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1105⤵PID:4976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1106⤵PID:4464
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1107⤵PID:1032
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1108⤵PID:3460
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1109⤵PID:2084
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1110⤵PID:3312
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1111⤵PID:4328
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1112⤵PID:5128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1113⤵PID:5144
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1114⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1115⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1116⤵PID:5188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1117⤵PID:5200
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1118⤵PID:5212
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1119⤵PID:5232
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1120⤵PID:5248
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1121⤵PID:5260
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\gb.jpg.dll,#1122⤵PID:5276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-