Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
110s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
14/07/2024, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
4460c03ce7dfecc102f74bf5e1f7e68e_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4460c03ce7dfecc102f74bf5e1f7e68e_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$R0/ivzucplz.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$R0/ivzucplz.dll
Resource
win10v2004-20240709-en
General
-
Target
$R0/ivzucplz.dll
-
Size
71KB
-
MD5
b18dc99e46a984cda15520bed050b182
-
SHA1
d3758400c96913b55bcc6476f8e4a80f6b407c82
-
SHA256
2c7ab1ba8b6391fe196055fc6d6bdd27624a917dd2c81937cb525849de1f19b5
-
SHA512
351baa79057884ee9ce18f49c85089bf5877b0c40d16b558c62dfc2a792d91292a7b03c42d227b2a492c935c0d3689d63331d012471904bb1d6e949cdff042c7
-
SSDEEP
1536:dmt0lNnvaTfOo/XjLg1Gn61y9yMDZWj8SGdw1+8DS/ITZQQ:MexvaSmjLZn6/MDBdwkNI9
Malware Config
Signatures
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4868 wrote to memory of 3888 4868 rundll32.exe 83 PID 4868 wrote to memory of 3888 4868 rundll32.exe 83 PID 4868 wrote to memory of 3888 4868 rundll32.exe 83 PID 3888 wrote to memory of 4556 3888 rundll32.exe 84 PID 3888 wrote to memory of 4556 3888 rundll32.exe 84 PID 3888 wrote to memory of 4556 3888 rundll32.exe 84 PID 4556 wrote to memory of 4528 4556 rundll32.exe 85 PID 4556 wrote to memory of 4528 4556 rundll32.exe 85 PID 4556 wrote to memory of 4528 4556 rundll32.exe 85 PID 4528 wrote to memory of 2928 4528 rundll32.exe 86 PID 4528 wrote to memory of 2928 4528 rundll32.exe 86 PID 4528 wrote to memory of 2928 4528 rundll32.exe 86 PID 2928 wrote to memory of 1072 2928 rundll32.exe 87 PID 2928 wrote to memory of 1072 2928 rundll32.exe 87 PID 2928 wrote to memory of 1072 2928 rundll32.exe 87 PID 1072 wrote to memory of 3688 1072 rundll32.exe 88 PID 1072 wrote to memory of 3688 1072 rundll32.exe 88 PID 1072 wrote to memory of 3688 1072 rundll32.exe 88 PID 3688 wrote to memory of 2300 3688 rundll32.exe 89 PID 3688 wrote to memory of 2300 3688 rundll32.exe 89 PID 3688 wrote to memory of 2300 3688 rundll32.exe 89 PID 2300 wrote to memory of 3260 2300 rundll32.exe 90 PID 2300 wrote to memory of 3260 2300 rundll32.exe 90 PID 2300 wrote to memory of 3260 2300 rundll32.exe 90 PID 3260 wrote to memory of 4692 3260 rundll32.exe 92 PID 3260 wrote to memory of 4692 3260 rundll32.exe 92 PID 3260 wrote to memory of 4692 3260 rundll32.exe 92 PID 4692 wrote to memory of 5072 4692 rundll32.exe 93 PID 4692 wrote to memory of 5072 4692 rundll32.exe 93 PID 4692 wrote to memory of 5072 4692 rundll32.exe 93 PID 5072 wrote to memory of 4736 5072 rundll32.exe 94 PID 5072 wrote to memory of 4736 5072 rundll32.exe 94 PID 5072 wrote to memory of 4736 5072 rundll32.exe 94 PID 4736 wrote to memory of 1500 4736 rundll32.exe 95 PID 4736 wrote to memory of 1500 4736 rundll32.exe 95 PID 4736 wrote to memory of 1500 4736 rundll32.exe 95 PID 1500 wrote to memory of 1172 1500 rundll32.exe 97 PID 1500 wrote to memory of 1172 1500 rundll32.exe 97 PID 1500 wrote to memory of 1172 1500 rundll32.exe 97 PID 1172 wrote to memory of 4420 1172 rundll32.exe 98 PID 1172 wrote to memory of 4420 1172 rundll32.exe 98 PID 1172 wrote to memory of 4420 1172 rundll32.exe 98 PID 4420 wrote to memory of 5088 4420 rundll32.exe 99 PID 4420 wrote to memory of 5088 4420 rundll32.exe 99 PID 4420 wrote to memory of 5088 4420 rundll32.exe 99 PID 5088 wrote to memory of 1136 5088 rundll32.exe 100 PID 5088 wrote to memory of 1136 5088 rundll32.exe 100 PID 5088 wrote to memory of 1136 5088 rundll32.exe 100 PID 1136 wrote to memory of 644 1136 rundll32.exe 102 PID 1136 wrote to memory of 644 1136 rundll32.exe 102 PID 1136 wrote to memory of 644 1136 rundll32.exe 102 PID 644 wrote to memory of 964 644 rundll32.exe 103 PID 644 wrote to memory of 964 644 rundll32.exe 103 PID 644 wrote to memory of 964 644 rundll32.exe 103 PID 964 wrote to memory of 5032 964 rundll32.exe 104 PID 964 wrote to memory of 5032 964 rundll32.exe 104 PID 964 wrote to memory of 5032 964 rundll32.exe 104 PID 5032 wrote to memory of 4004 5032 rundll32.exe 105 PID 5032 wrote to memory of 4004 5032 rundll32.exe 105 PID 5032 wrote to memory of 4004 5032 rundll32.exe 105 PID 4004 wrote to memory of 1960 4004 rundll32.exe 106 PID 4004 wrote to memory of 1960 4004 rundll32.exe 106 PID 4004 wrote to memory of 1960 4004 rundll32.exe 106 PID 1960 wrote to memory of 1724 1960 rundll32.exe 107
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#13⤵
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#14⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#15⤵
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#16⤵
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#17⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#18⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#19⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#110⤵
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#111⤵
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#112⤵
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#113⤵
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#114⤵
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#115⤵
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#116⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#117⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#118⤵
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#119⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#120⤵
- Suspicious use of WriteProcessMemory
PID:5032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#121⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#122⤵
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#123⤵PID:1724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#124⤵PID:2480
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#125⤵PID:2976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#126⤵PID:4928
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#127⤵PID:2408
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#128⤵PID:3168
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#129⤵PID:4912
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#130⤵PID:3444
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#131⤵PID:1836
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#132⤵PID:2804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#133⤵PID:3716
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#134⤵PID:1048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#135⤵PID:2772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#136⤵PID:4188
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#137⤵PID:1848
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#138⤵PID:4224
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#139⤵PID:4984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#140⤵PID:3120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#141⤵PID:4964
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#142⤵PID:2316
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#143⤵PID:5024
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#144⤵PID:4388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#145⤵PID:3556
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#146⤵PID:1132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#147⤵PID:2972
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#148⤵PID:1948
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#149⤵PID:4976
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#150⤵PID:2632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#151⤵PID:1472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#152⤵PID:3388
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#153⤵PID:4436
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#154⤵PID:788
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#155⤵PID:2932
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#156⤵PID:3952
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#157⤵PID:4856
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#158⤵PID:1772
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#159⤵PID:2400
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#160⤵PID:2980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#161⤵PID:1272
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#162⤵PID:2268
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#163⤵PID:4724
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#164⤵PID:3132
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#165⤵PID:2780
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#166⤵PID:4456
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#167⤵PID:3604
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#168⤵PID:3700
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#169⤵PID:2864
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#170⤵PID:1104
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#171⤵PID:1596
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#172⤵PID:4920
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#173⤵PID:1164
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#174⤵PID:2540
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#175⤵PID:2124
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#176⤵PID:1980
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#177⤵PID:1728
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#178⤵PID:2576
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#179⤵PID:4120
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#180⤵PID:3048
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#181⤵PID:2044
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#182⤵PID:1804
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#183⤵PID:1876
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#184⤵PID:2776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#185⤵PID:4060
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#186⤵PID:2332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#187⤵PID:4332
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#188⤵PID:2936
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#189⤵PID:1196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#190⤵PID:4764
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#191⤵PID:472
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#192⤵PID:5076
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#193⤵PID:4380
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#194⤵PID:2372
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#195⤵PID:2032
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#196⤵PID:2088
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#197⤵PID:2180
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#198⤵PID:784
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#199⤵PID:4648
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1100⤵PID:1968
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1101⤵PID:4292
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1102⤵PID:3916
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1103⤵PID:3676
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1104⤵PID:1632
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1105⤵PID:3984
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1106⤵PID:4352
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1107⤵PID:2484
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1108⤵PID:776
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1109⤵PID:1192
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1110⤵PID:5128
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1111⤵PID:5140
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1112⤵PID:5156
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1113⤵PID:5172
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1114⤵PID:5184
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1115⤵PID:5196
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1116⤵PID:5208
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1117⤵PID:5220
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1118⤵PID:5240
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1119⤵PID:5252
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1120⤵PID:5264
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1121⤵PID:5280
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$R0\ivzucplz.dll,#1122⤵PID:5296
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-