Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
159s -
max time network
134s -
platform
windows7_x64 -
resource
win7-20230712-en -
resource tags
arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system -
submitted
18/08/2023, 15:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe
Resource
win7-20230712-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe
Resource
win10v2004-20230703-en
2 signatures
150 seconds
General
-
Target
31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe
-
Size
488KB
-
MD5
31347044b7d1f529a58222eb9b17e9d1
-
SHA1
101b3c51df524ee75c5b21e80a3c8b6d02beebf2
-
SHA256
4ad2a7cb73cb4821753c745558250a5d54587fbfe35ef6a385f5dd9710a8e742
-
SHA512
0d5ee6f8394e605c4856f05672396afa45ce7dc68638d86e4479b296415903ec82ca0b615d820e63b9119d5c91f651d35be64e5a1be82017a7474ff117fc5ebc
-
SSDEEP
12288:/U5rCOTeiD9op6Rpw5xyy3an+hYPRUXT8NZ:/UQOJDGpepK++hYOXT8N
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2468 C88D.tmp 2844 C8DB.tmp 2936 C957.tmp 2828 CAED.tmp 2708 CB99.tmp 2864 CC73.tmp 1700 CD0F.tmp 2028 CDF9.tmp 2752 CED3.tmp 2424 CFBD.tmp 2376 D079.tmp 576 D134.tmp 2684 D20E.tmp 2196 D2F8.tmp 3036 D578.tmp 748 D652.tmp 2988 D79A.tmp 1956 D884.tmp 1968 D9AC.tmp 2296 DAC5.tmp 2616 E5BD.tmp 1752 E8F8.tmp 2668 EEE1.tmp 1616 435.tmp 2224 58C.tmp 1672 5EA.tmp 768 638.tmp 2496 6B5.tmp 2964 7CE.tmp 2312 83B.tmp 2136 8B8.tmp 2316 925.tmp 1948 9B1.tmp 1624 A1E.tmp 1664 A8C.tmp 1800 AF9.tmp 1312 B66.tmp 744 BC4.tmp 2564 C40.tmp 1132 CAE.tmp 1348 D2A.tmp 628 F0E.tmp 2016 F8B.tmp 2268 1017.tmp 1068 1084.tmp 2112 1140.tmp 2536 11BC.tmp 2512 1239.tmp 872 12C6.tmp 2664 1342.tmp 1632 148A.tmp 1556 14F7.tmp 2888 1574.tmp 1668 1600.tmp 2468 167D.tmp 2908 16EA.tmp 3016 1758.tmp 3012 1851.tmp 2944 34F5.tmp 1500 392A.tmp 2368 3B1D.tmp 2632 3E77.tmp 2816 4099.tmp 2712 4106.tmp -
Loads dropped DLL 64 IoCs
pid Process 2540 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 2468 C88D.tmp 2844 C8DB.tmp 2936 C957.tmp 2828 CAED.tmp 2708 CB99.tmp 2864 CC73.tmp 1700 CD0F.tmp 2028 CDF9.tmp 2752 CED3.tmp 2424 CFBD.tmp 2376 D079.tmp 576 D134.tmp 2684 D20E.tmp 2196 D2F8.tmp 3036 D578.tmp 748 D652.tmp 2988 D79A.tmp 1956 D884.tmp 1968 D9AC.tmp 2296 DAC5.tmp 2616 E5BD.tmp 1752 E8F8.tmp 2668 EEE1.tmp 1616 435.tmp 2224 58C.tmp 1672 5EA.tmp 768 638.tmp 2496 6B5.tmp 2964 7CE.tmp 2312 83B.tmp 2136 8B8.tmp 2316 925.tmp 1948 9B1.tmp 1624 A1E.tmp 1664 A8C.tmp 1800 AF9.tmp 1312 B66.tmp 744 BC4.tmp 2564 C40.tmp 1132 CAE.tmp 1348 D2A.tmp 628 F0E.tmp 2016 F8B.tmp 2268 1017.tmp 1068 1084.tmp 2112 1140.tmp 2536 11BC.tmp 2512 1239.tmp 872 12C6.tmp 2664 1342.tmp 1632 148A.tmp 1556 14F7.tmp 2888 1574.tmp 1668 1600.tmp 2468 167D.tmp 2908 16EA.tmp 3016 1758.tmp 3012 1851.tmp 2944 34F5.tmp 1500 392A.tmp 2368 3B1D.tmp 2632 3E77.tmp 2816 4099.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2468 2540 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 28 PID 2540 wrote to memory of 2468 2540 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 28 PID 2540 wrote to memory of 2468 2540 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 28 PID 2540 wrote to memory of 2468 2540 31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe 28 PID 2468 wrote to memory of 2844 2468 C88D.tmp 29 PID 2468 wrote to memory of 2844 2468 C88D.tmp 29 PID 2468 wrote to memory of 2844 2468 C88D.tmp 29 PID 2468 wrote to memory of 2844 2468 C88D.tmp 29 PID 2844 wrote to memory of 2936 2844 C8DB.tmp 30 PID 2844 wrote to memory of 2936 2844 C8DB.tmp 30 PID 2844 wrote to memory of 2936 2844 C8DB.tmp 30 PID 2844 wrote to memory of 2936 2844 C8DB.tmp 30 PID 2936 wrote to memory of 2828 2936 C957.tmp 31 PID 2936 wrote to memory of 2828 2936 C957.tmp 31 PID 2936 wrote to memory of 2828 2936 C957.tmp 31 PID 2936 wrote to memory of 2828 2936 C957.tmp 31 PID 2828 wrote to memory of 2708 2828 CAED.tmp 32 PID 2828 wrote to memory of 2708 2828 CAED.tmp 32 PID 2828 wrote to memory of 2708 2828 CAED.tmp 32 PID 2828 wrote to memory of 2708 2828 CAED.tmp 32 PID 2708 wrote to memory of 2864 2708 CB99.tmp 33 PID 2708 wrote to memory of 2864 2708 CB99.tmp 33 PID 2708 wrote to memory of 2864 2708 CB99.tmp 33 PID 2708 wrote to memory of 2864 2708 CB99.tmp 33 PID 2864 wrote to memory of 1700 2864 CC73.tmp 34 PID 2864 wrote to memory of 1700 2864 CC73.tmp 34 PID 2864 wrote to memory of 1700 2864 CC73.tmp 34 PID 2864 wrote to memory of 1700 2864 CC73.tmp 34 PID 1700 wrote to memory of 2028 1700 CD0F.tmp 35 PID 1700 wrote to memory of 2028 1700 CD0F.tmp 35 PID 1700 wrote to memory of 2028 1700 CD0F.tmp 35 PID 1700 wrote to memory of 2028 1700 CD0F.tmp 35 PID 2028 wrote to memory of 2752 2028 CDF9.tmp 36 PID 2028 wrote to memory of 2752 2028 CDF9.tmp 36 PID 2028 wrote to memory of 2752 2028 CDF9.tmp 36 PID 2028 wrote to memory of 2752 2028 CDF9.tmp 36 PID 2752 wrote to memory of 2424 2752 CED3.tmp 37 PID 2752 wrote to memory of 2424 2752 CED3.tmp 37 PID 2752 wrote to memory of 2424 2752 CED3.tmp 37 PID 2752 wrote to memory of 2424 2752 CED3.tmp 37 PID 2424 wrote to memory of 2376 2424 CFBD.tmp 38 PID 2424 wrote to memory of 2376 2424 CFBD.tmp 38 PID 2424 wrote to memory of 2376 2424 CFBD.tmp 38 PID 2424 wrote to memory of 2376 2424 CFBD.tmp 38 PID 2376 wrote to memory of 576 2376 D079.tmp 39 PID 2376 wrote to memory of 576 2376 D079.tmp 39 PID 2376 wrote to memory of 576 2376 D079.tmp 39 PID 2376 wrote to memory of 576 2376 D079.tmp 39 PID 576 wrote to memory of 2684 576 D134.tmp 40 PID 576 wrote to memory of 2684 576 D134.tmp 40 PID 576 wrote to memory of 2684 576 D134.tmp 40 PID 576 wrote to memory of 2684 576 D134.tmp 40 PID 2684 wrote to memory of 2196 2684 D20E.tmp 43 PID 2684 wrote to memory of 2196 2684 D20E.tmp 43 PID 2684 wrote to memory of 2196 2684 D20E.tmp 43 PID 2684 wrote to memory of 2196 2684 D20E.tmp 43 PID 2196 wrote to memory of 3036 2196 D2F8.tmp 44 PID 2196 wrote to memory of 3036 2196 D2F8.tmp 44 PID 2196 wrote to memory of 3036 2196 D2F8.tmp 44 PID 2196 wrote to memory of 3036 2196 D2F8.tmp 44 PID 3036 wrote to memory of 748 3036 D578.tmp 45 PID 3036 wrote to memory of 748 3036 D578.tmp 45 PID 3036 wrote to memory of 748 3036 D578.tmp 45 PID 3036 wrote to memory of 748 3036 D578.tmp 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe"C:\Users\Admin\AppData\Local\Temp\31347044b7d1f529a58222eb9b17e9d1_mafia_JC.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\C88D.tmp"C:\Users\Admin\AppData\Local\Temp\C88D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\C8DB.tmp"C:\Users\Admin\AppData\Local\Temp\C8DB.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\C957.tmp"C:\Users\Admin\AppData\Local\Temp\C957.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\CAED.tmp"C:\Users\Admin\AppData\Local\Temp\CAED.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\CB99.tmp"C:\Users\Admin\AppData\Local\Temp\CB99.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\CC73.tmp"C:\Users\Admin\AppData\Local\Temp\CC73.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\CD0F.tmp"C:\Users\Admin\AppData\Local\Temp\CD0F.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\CDF9.tmp"C:\Users\Admin\AppData\Local\Temp\CDF9.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\CED3.tmp"C:\Users\Admin\AppData\Local\Temp\CED3.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\CFBD.tmp"C:\Users\Admin\AppData\Local\Temp\CFBD.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\D079.tmp"C:\Users\Admin\AppData\Local\Temp\D079.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\D134.tmp"C:\Users\Admin\AppData\Local\Temp\D134.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\D20E.tmp"C:\Users\Admin\AppData\Local\Temp\D20E.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\D2F8.tmp"C:\Users\Admin\AppData\Local\Temp\D2F8.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\D578.tmp"C:\Users\Admin\AppData\Local\Temp\D578.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\D652.tmp"C:\Users\Admin\AppData\Local\Temp\D652.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:748 -
C:\Users\Admin\AppData\Local\Temp\D79A.tmp"C:\Users\Admin\AppData\Local\Temp\D79A.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\D884.tmp"C:\Users\Admin\AppData\Local\Temp\D884.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\D9AC.tmp"C:\Users\Admin\AppData\Local\Temp\D9AC.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\DAC5.tmp"C:\Users\Admin\AppData\Local\Temp\DAC5.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\E5BD.tmp"C:\Users\Admin\AppData\Local\Temp\E5BD.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"C:\Users\Admin\AppData\Local\Temp\E8F8.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\EEE1.tmp"C:\Users\Admin\AppData\Local\Temp\EEE1.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\435.tmp"C:\Users\Admin\AppData\Local\Temp\435.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\58C.tmp"C:\Users\Admin\AppData\Local\Temp\58C.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\5EA.tmp"C:\Users\Admin\AppData\Local\Temp\5EA.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\638.tmp"C:\Users\Admin\AppData\Local\Temp\638.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768 -
C:\Users\Admin\AppData\Local\Temp\6B5.tmp"C:\Users\Admin\AppData\Local\Temp\6B5.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\7CE.tmp"C:\Users\Admin\AppData\Local\Temp\7CE.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\83B.tmp"C:\Users\Admin\AppData\Local\Temp\83B.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\8B8.tmp"C:\Users\Admin\AppData\Local\Temp\8B8.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\925.tmp"C:\Users\Admin\AppData\Local\Temp\925.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\9B1.tmp"C:\Users\Admin\AppData\Local\Temp\9B1.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\A1E.tmp"C:\Users\Admin\AppData\Local\Temp\A1E.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\A8C.tmp"C:\Users\Admin\AppData\Local\Temp\A8C.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\AF9.tmp"C:\Users\Admin\AppData\Local\Temp\AF9.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\B66.tmp"C:\Users\Admin\AppData\Local\Temp\B66.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\BC4.tmp"C:\Users\Admin\AppData\Local\Temp\BC4.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:744 -
C:\Users\Admin\AppData\Local\Temp\C40.tmp"C:\Users\Admin\AppData\Local\Temp\C40.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\CAE.tmp"C:\Users\Admin\AppData\Local\Temp\CAE.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628 -
C:\Users\Admin\AppData\Local\Temp\F8B.tmp"C:\Users\Admin\AppData\Local\Temp\F8B.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\1017.tmp"C:\Users\Admin\AppData\Local\Temp\1017.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\1084.tmp"C:\Users\Admin\AppData\Local\Temp\1084.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\1140.tmp"C:\Users\Admin\AppData\Local\Temp\1140.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\11BC.tmp"C:\Users\Admin\AppData\Local\Temp\11BC.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\12C6.tmp"C:\Users\Admin\AppData\Local\Temp\12C6.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:872 -
C:\Users\Admin\AppData\Local\Temp\1342.tmp"C:\Users\Admin\AppData\Local\Temp\1342.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\148A.tmp"C:\Users\Admin\AppData\Local\Temp\148A.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\14F7.tmp"C:\Users\Admin\AppData\Local\Temp\14F7.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\1574.tmp"C:\Users\Admin\AppData\Local\Temp\1574.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\1600.tmp"C:\Users\Admin\AppData\Local\Temp\1600.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\167D.tmp"C:\Users\Admin\AppData\Local\Temp\167D.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\16EA.tmp"C:\Users\Admin\AppData\Local\Temp\16EA.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\1851.tmp"C:\Users\Admin\AppData\Local\Temp\1851.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\34F5.tmp"C:\Users\Admin\AppData\Local\Temp\34F5.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\392A.tmp"C:\Users\Admin\AppData\Local\Temp\392A.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"C:\Users\Admin\AppData\Local\Temp\3B1D.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3E77.tmp"C:\Users\Admin\AppData\Local\Temp\3E77.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\4099.tmp"C:\Users\Admin\AppData\Local\Temp\4099.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\4106.tmp"C:\Users\Admin\AppData\Local\Temp\4106.tmp"65⤵
- Executes dropped EXE
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\4173.tmp"C:\Users\Admin\AppData\Local\Temp\4173.tmp"66⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\41E0.tmp"C:\Users\Admin\AppData\Local\Temp\41E0.tmp"67⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\423E.tmp"C:\Users\Admin\AppData\Local\Temp\423E.tmp"68⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\42AB.tmp"C:\Users\Admin\AppData\Local\Temp\42AB.tmp"69⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\4318.tmp"C:\Users\Admin\AppData\Local\Temp\4318.tmp"70⤵PID:1184
-
C:\Users\Admin\AppData\Local\Temp\4386.tmp"C:\Users\Admin\AppData\Local\Temp\4386.tmp"71⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\43F3.tmp"C:\Users\Admin\AppData\Local\Temp\43F3.tmp"72⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\4450.tmp"C:\Users\Admin\AppData\Local\Temp\4450.tmp"73⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\44BE.tmp"C:\Users\Admin\AppData\Local\Temp\44BE.tmp"74⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\4598.tmp"C:\Users\Admin\AppData\Local\Temp\4598.tmp"75⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\45F6.tmp"C:\Users\Admin\AppData\Local\Temp\45F6.tmp"76⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\4682.tmp"C:\Users\Admin\AppData\Local\Temp\4682.tmp"77⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\46FF.tmp"C:\Users\Admin\AppData\Local\Temp\46FF.tmp"78⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\477C.tmp"C:\Users\Admin\AppData\Local\Temp\477C.tmp"79⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\47E9.tmp"C:\Users\Admin\AppData\Local\Temp\47E9.tmp"80⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\4837.tmp"C:\Users\Admin\AppData\Local\Temp\4837.tmp"81⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\48A4.tmp"C:\Users\Admin\AppData\Local\Temp\48A4.tmp"82⤵PID:460
-
C:\Users\Admin\AppData\Local\Temp\4902.tmp"C:\Users\Admin\AppData\Local\Temp\4902.tmp"83⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"84⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\49BD.tmp"C:\Users\Admin\AppData\Local\Temp\49BD.tmp"85⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\4A68.tmp"C:\Users\Admin\AppData\Local\Temp\4A68.tmp"86⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"87⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"88⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"89⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\4C4C.tmp"C:\Users\Admin\AppData\Local\Temp\4C4C.tmp"90⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\4C9A.tmp"C:\Users\Admin\AppData\Local\Temp\4C9A.tmp"91⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\4D07.tmp"C:\Users\Admin\AppData\Local\Temp\4D07.tmp"92⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\4D74.tmp"C:\Users\Admin\AppData\Local\Temp\4D74.tmp"93⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"C:\Users\Admin\AppData\Local\Temp\4DF1.tmp"94⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"95⤵PID:2144
-
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"96⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\4F29.tmp"C:\Users\Admin\AppData\Local\Temp\4F29.tmp"97⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"C:\Users\Admin\AppData\Local\Temp\4FA6.tmp"98⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\4FF4.tmp"C:\Users\Admin\AppData\Local\Temp\4FF4.tmp"99⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\5052.tmp"C:\Users\Admin\AppData\Local\Temp\5052.tmp"100⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\50AF.tmp"C:\Users\Admin\AppData\Local\Temp\50AF.tmp"101⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\511C.tmp"C:\Users\Admin\AppData\Local\Temp\511C.tmp"102⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp"103⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\536D.tmp"C:\Users\Admin\AppData\Local\Temp\536D.tmp"104⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\53DA.tmp"C:\Users\Admin\AppData\Local\Temp\53DA.tmp"105⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\6FE3.tmp"C:\Users\Admin\AppData\Local\Temp\6FE3.tmp"106⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\72EF.tmp"C:\Users\Admin\AppData\Local\Temp\72EF.tmp"107⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\737B.tmp"C:\Users\Admin\AppData\Local\Temp\737B.tmp"108⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"109⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"110⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\74A3.tmp"C:\Users\Admin\AppData\Local\Temp\74A3.tmp"111⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\7511.tmp"C:\Users\Admin\AppData\Local\Temp\7511.tmp"112⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\758D.tmp"C:\Users\Admin\AppData\Local\Temp\758D.tmp"113⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\75EB.tmp"C:\Users\Admin\AppData\Local\Temp\75EB.tmp"114⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\7677.tmp"C:\Users\Admin\AppData\Local\Temp\7677.tmp"115⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\76E5.tmp"C:\Users\Admin\AppData\Local\Temp\76E5.tmp"116⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\77AF.tmp"C:\Users\Admin\AppData\Local\Temp\77AF.tmp"117⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\781D.tmp"C:\Users\Admin\AppData\Local\Temp\781D.tmp"118⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\7899.tmp"C:\Users\Admin\AppData\Local\Temp\7899.tmp"119⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\7907.tmp"C:\Users\Admin\AppData\Local\Temp\7907.tmp"120⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\7964.tmp"C:\Users\Admin\AppData\Local\Temp\7964.tmp"121⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\79D1.tmp"C:\Users\Admin\AppData\Local\Temp\79D1.tmp"122⤵PID:2408
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-