Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/01/2024, 22:43
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe
Resource
win10v2004-20231222-en
General
-
Target
2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe
-
Size
488KB
-
MD5
02d5e86724988fd7e70380cc5e487ed5
-
SHA1
36760530949abfbe3b7d4006e6c50f377636461d
-
SHA256
e8c9fe00bfe8ffdde2697dad4f54d2b1526b8f2edec6e96c5136bfe1a3509f16
-
SHA512
4ec7a6e711f76e5d6afd76715ba069df5d12143ef68835c3d50eb94305b826ce95f041a28d336473ccbe6bc514a11207f6451a148b9b3155ace2f43095148635
-
SSDEEP
12288:/U5rCOTeiDLaYwr6kngNlzqky2UHx9FIlPG8NZ:/UQOJDOYt6gbb+Hv98N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3024 1DEC.tmp 2092 1E4A.tmp 1664 1EB7.tmp 2444 1F05.tmp 2700 1F53.tmp 2816 1F92.tmp 2860 1FD0.tmp 2392 202E.tmp 2772 206C.tmp 2764 20AA.tmp 2588 20E9.tmp 2664 2127.tmp 2324 2166.tmp 1660 21C3.tmp 2648 2221.tmp 1676 225F.tmp 1604 229E.tmp 2044 22EC.tmp 2192 232A.tmp 2208 2368.tmp 2160 23A7.tmp 1344 23E5.tmp 1332 2424.tmp 1256 2462.tmp 2460 3469.tmp 2412 3498.tmp 1968 251D.tmp 2296 254C.tmp 1288 258A.tmp 2076 25D8.tmp 684 360E.tmp 1080 364C.tmp 1108 2694.tmp 560 26D2.tmp 2680 2710.tmp 2548 274F.tmp 708 278D.tmp 2276 27CC.tmp 2944 280A.tmp 1008 2848.tmp 1284 2887.tmp 288 28C5.tmp 1608 392A.tmp 768 2942.tmp 2060 2980.tmp 1628 29BF.tmp 2356 29EE.tmp 1980 2A2C.tmp 836 2A6A.tmp 3048 2AA9.tmp 2508 2AE7.tmp 1504 2B26.tmp 2564 2B64.tmp 1688 2BA2.tmp 1592 2BE1.tmp 1700 2C1F.tmp 2964 2C5E.tmp 3024 2C9C.tmp 1708 2CDA.tmp 1720 2D19.tmp 3056 2D57.tmp 2780 2D96.tmp 2732 2DC4.tmp 1048 2E03.tmp -
Loads dropped DLL 64 IoCs
pid Process 2964 2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe 3024 1DEC.tmp 2092 1E4A.tmp 1664 1EB7.tmp 2444 1F05.tmp 2700 1F53.tmp 2816 1F92.tmp 2860 1FD0.tmp 2392 202E.tmp 2772 206C.tmp 2764 20AA.tmp 2588 20E9.tmp 2664 2127.tmp 2324 2166.tmp 1660 21C3.tmp 2648 2221.tmp 1676 225F.tmp 1604 229E.tmp 2044 22EC.tmp 2192 232A.tmp 2208 2368.tmp 2160 23A7.tmp 1344 23E5.tmp 1332 2424.tmp 1256 2462.tmp 2460 3469.tmp 2412 3498.tmp 1968 251D.tmp 2296 254C.tmp 1288 258A.tmp 2076 25D8.tmp 684 360E.tmp 1080 364C.tmp 1108 2694.tmp 560 26D2.tmp 2680 2710.tmp 2548 274F.tmp 708 278D.tmp 2276 27CC.tmp 2944 280A.tmp 1008 2848.tmp 1284 2887.tmp 288 28C5.tmp 1608 392A.tmp 768 2942.tmp 2060 2980.tmp 1628 29BF.tmp 2356 29EE.tmp 1980 2A2C.tmp 836 2A6A.tmp 3048 2AA9.tmp 2508 2AE7.tmp 1504 2B26.tmp 2564 2B64.tmp 1688 2BA2.tmp 1592 2BE1.tmp 1700 2C1F.tmp 2964 2C5E.tmp 3024 2C9C.tmp 1708 2CDA.tmp 1720 2D19.tmp 3056 2D57.tmp 2780 2D96.tmp 2732 2DC4.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2964 wrote to memory of 3024 2964 2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe 28 PID 2964 wrote to memory of 3024 2964 2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe 28 PID 2964 wrote to memory of 3024 2964 2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe 28 PID 2964 wrote to memory of 3024 2964 2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe 28 PID 3024 wrote to memory of 2092 3024 2C9C.tmp 29 PID 3024 wrote to memory of 2092 3024 2C9C.tmp 29 PID 3024 wrote to memory of 2092 3024 2C9C.tmp 29 PID 3024 wrote to memory of 2092 3024 2C9C.tmp 29 PID 2092 wrote to memory of 1664 2092 1E4A.tmp 30 PID 2092 wrote to memory of 1664 2092 1E4A.tmp 30 PID 2092 wrote to memory of 1664 2092 1E4A.tmp 30 PID 2092 wrote to memory of 1664 2092 1E4A.tmp 30 PID 1664 wrote to memory of 2444 1664 1EB7.tmp 112 PID 1664 wrote to memory of 2444 1664 1EB7.tmp 112 PID 1664 wrote to memory of 2444 1664 1EB7.tmp 112 PID 1664 wrote to memory of 2444 1664 1EB7.tmp 112 PID 2444 wrote to memory of 2700 2444 1F05.tmp 111 PID 2444 wrote to memory of 2700 2444 1F05.tmp 111 PID 2444 wrote to memory of 2700 2444 1F05.tmp 111 PID 2444 wrote to memory of 2700 2444 1F05.tmp 111 PID 2700 wrote to memory of 2816 2700 1F53.tmp 110 PID 2700 wrote to memory of 2816 2700 1F53.tmp 110 PID 2700 wrote to memory of 2816 2700 1F53.tmp 110 PID 2700 wrote to memory of 2816 2700 1F53.tmp 110 PID 2816 wrote to memory of 2860 2816 1F92.tmp 109 PID 2816 wrote to memory of 2860 2816 1F92.tmp 109 PID 2816 wrote to memory of 2860 2816 1F92.tmp 109 PID 2816 wrote to memory of 2860 2816 1F92.tmp 109 PID 2860 wrote to memory of 2392 2860 1FD0.tmp 108 PID 2860 wrote to memory of 2392 2860 1FD0.tmp 108 PID 2860 wrote to memory of 2392 2860 1FD0.tmp 108 PID 2860 wrote to memory of 2392 2860 1FD0.tmp 108 PID 2392 wrote to memory of 2772 2392 202E.tmp 107 PID 2392 wrote to memory of 2772 2392 202E.tmp 107 PID 2392 wrote to memory of 2772 2392 202E.tmp 107 PID 2392 wrote to memory of 2772 2392 202E.tmp 107 PID 2772 wrote to memory of 2764 2772 206C.tmp 106 PID 2772 wrote to memory of 2764 2772 206C.tmp 106 PID 2772 wrote to memory of 2764 2772 206C.tmp 106 PID 2772 wrote to memory of 2764 2772 206C.tmp 106 PID 2764 wrote to memory of 2588 2764 20AA.tmp 105 PID 2764 wrote to memory of 2588 2764 20AA.tmp 105 PID 2764 wrote to memory of 2588 2764 20AA.tmp 105 PID 2764 wrote to memory of 2588 2764 20AA.tmp 105 PID 2588 wrote to memory of 2664 2588 20E9.tmp 104 PID 2588 wrote to memory of 2664 2588 20E9.tmp 104 PID 2588 wrote to memory of 2664 2588 20E9.tmp 104 PID 2588 wrote to memory of 2664 2588 20E9.tmp 104 PID 2664 wrote to memory of 2324 2664 2127.tmp 103 PID 2664 wrote to memory of 2324 2664 2127.tmp 103 PID 2664 wrote to memory of 2324 2664 2127.tmp 103 PID 2664 wrote to memory of 2324 2664 2127.tmp 103 PID 2324 wrote to memory of 1660 2324 2166.tmp 101 PID 2324 wrote to memory of 1660 2324 2166.tmp 101 PID 2324 wrote to memory of 1660 2324 2166.tmp 101 PID 2324 wrote to memory of 1660 2324 2166.tmp 101 PID 1660 wrote to memory of 2648 1660 21C3.tmp 100 PID 1660 wrote to memory of 2648 1660 21C3.tmp 100 PID 1660 wrote to memory of 2648 1660 21C3.tmp 100 PID 1660 wrote to memory of 2648 1660 21C3.tmp 100 PID 2648 wrote to memory of 1676 2648 2221.tmp 98 PID 2648 wrote to memory of 1676 2648 2221.tmp 98 PID 2648 wrote to memory of 1676 2648 2221.tmp 98 PID 2648 wrote to memory of 1676 2648 2221.tmp 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-23_02d5e86724988fd7e70380cc5e487ed5_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\1F05.tmp"C:\Users\Admin\AppData\Local\Temp\1F05.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"C:\Users\Admin\AppData\Local\Temp\2C9C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"C:\Users\Admin\AppData\Local\Temp\2CDA.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708
-
-
-
C:\Users\Admin\AppData\Local\Temp\229E.tmp"C:\Users\Admin\AppData\Local\Temp\229E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\22EC.tmp"C:\Users\Admin\AppData\Local\Temp\22EC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044
-
-
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"1⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"2⤵PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\254C.tmp"C:\Users\Admin\AppData\Local\Temp\254C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288
-
-
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"1⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"2⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076
-
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:708
-
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2680
-
C:\Users\Admin\AppData\Local\Temp\27CC.tmp"C:\Users\Admin\AppData\Local\Temp\27CC.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\2848.tmp"C:\Users\Admin\AppData\Local\Temp\2848.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\28C5.tmp"C:\Users\Admin\AppData\Local\Temp\28C5.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:288 -
C:\Users\Admin\AppData\Local\Temp\2904.tmp"C:\Users\Admin\AppData\Local\Temp\2904.tmp"2⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\2942.tmp"C:\Users\Admin\AppData\Local\Temp\2942.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768
-
-
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2B26.tmp"C:\Users\Admin\AppData\Local\Temp\2B26.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\2B64.tmp"C:\Users\Admin\AppData\Local\Temp\2B64.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"C:\Users\Admin\AppData\Local\Temp\2C1F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\2D19.tmp"C:\Users\Admin\AppData\Local\Temp\2D19.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\2D57.tmp"C:\Users\Admin\AppData\Local\Temp\2D57.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\2E03.tmp"C:\Users\Admin\AppData\Local\Temp\2E03.tmp"1⤵
- Executes dropped EXE
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\2E41.tmp"C:\Users\Admin\AppData\Local\Temp\2E41.tmp"2⤵PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\2EBE.tmp"C:\Users\Admin\AppData\Local\Temp\2EBE.tmp"1⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\2EFC.tmp"C:\Users\Admin\AppData\Local\Temp\2EFC.tmp"2⤵PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"1⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"2⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"3⤵PID:2484
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"1⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\2E80.tmp"C:\Users\Admin\AppData\Local\Temp\2E80.tmp"1⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"1⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"2⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"3⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"4⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\313E.tmp"C:\Users\Admin\AppData\Local\Temp\313E.tmp"5⤵PID:2640
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1660
-
-
-
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"1⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\31DA.tmp"C:\Users\Admin\AppData\Local\Temp\31DA.tmp"2⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3218.tmp"C:\Users\Admin\AppData\Local\Temp\3218.tmp"3⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3256.tmp"C:\Users\Admin\AppData\Local\Temp\3256.tmp"4⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3295.tmp"C:\Users\Admin\AppData\Local\Temp\3295.tmp"5⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2368.tmp"C:\Users\Admin\AppData\Local\Temp\2368.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\232A.tmp"C:\Users\Admin\AppData\Local\Temp\232A.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"6⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\3312.tmp"C:\Users\Admin\AppData\Local\Temp\3312.tmp"7⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"8⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"9⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\33BD.tmp"C:\Users\Admin\AppData\Local\Temp\33BD.tmp"10⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\33FC.tmp"C:\Users\Admin\AppData\Local\Temp\33FC.tmp"11⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"12⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3498.tmp"C:\Users\Admin\AppData\Local\Temp\3498.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\34D6.tmp"C:\Users\Admin\AppData\Local\Temp\34D6.tmp"15⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3514.tmp"C:\Users\Admin\AppData\Local\Temp\3514.tmp"16⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3553.tmp"C:\Users\Admin\AppData\Local\Temp\3553.tmp"17⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\3591.tmp"C:\Users\Admin\AppData\Local\Temp\3591.tmp"18⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\35D0.tmp"C:\Users\Admin\AppData\Local\Temp\35D0.tmp"19⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\360E.tmp"C:\Users\Admin\AppData\Local\Temp\360E.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:684 -
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"22⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"23⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"24⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"25⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"26⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"27⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"28⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"29⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\386E.tmp"C:\Users\Admin\AppData\Local\Temp\386E.tmp"30⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\38AD.tmp"C:\Users\Admin\AppData\Local\Temp\38AD.tmp"31⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\38EB.tmp"C:\Users\Admin\AppData\Local\Temp\38EB.tmp"32⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\392A.tmp"C:\Users\Admin\AppData\Local\Temp\392A.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"34⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\39B6.tmp"C:\Users\Admin\AppData\Local\Temp\39B6.tmp"35⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\39F4.tmp"C:\Users\Admin\AppData\Local\Temp\39F4.tmp"36⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\3A42.tmp"C:\Users\Admin\AppData\Local\Temp\3A42.tmp"37⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3A81.tmp"C:\Users\Admin\AppData\Local\Temp\3A81.tmp"38⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"39⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"40⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"C:\Users\Admin\AppData\Local\Temp\3B5B.tmp"41⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"42⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"43⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\3C45.tmp"C:\Users\Admin\AppData\Local\Temp\3C45.tmp"44⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\3C93.tmp"C:\Users\Admin\AppData\Local\Temp\3C93.tmp"45⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"C:\Users\Admin\AppData\Local\Temp\3CE1.tmp"46⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3D20.tmp"C:\Users\Admin\AppData\Local\Temp\3D20.tmp"47⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"48⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"49⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3E19.tmp"C:\Users\Admin\AppData\Local\Temp\3E19.tmp"50⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\3E67.tmp"C:\Users\Admin\AppData\Local\Temp\3E67.tmp"51⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"52⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"53⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3F61.tmp"C:\Users\Admin\AppData\Local\Temp\3F61.tmp"54⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"55⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"56⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\401C.tmp"C:\Users\Admin\AppData\Local\Temp\401C.tmp"57⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\406A.tmp"C:\Users\Admin\AppData\Local\Temp\406A.tmp"58⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\40A8.tmp"C:\Users\Admin\AppData\Local\Temp\40A8.tmp"59⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\40E7.tmp"C:\Users\Admin\AppData\Local\Temp\40E7.tmp"60⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\4125.tmp"C:\Users\Admin\AppData\Local\Temp\4125.tmp"61⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\4164.tmp"C:\Users\Admin\AppData\Local\Temp\4164.tmp"62⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\41A2.tmp"C:\Users\Admin\AppData\Local\Temp\41A2.tmp"63⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\41E0.tmp"C:\Users\Admin\AppData\Local\Temp\41E0.tmp"64⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\421F.tmp"C:\Users\Admin\AppData\Local\Temp\421F.tmp"65⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\425D.tmp"C:\Users\Admin\AppData\Local\Temp\425D.tmp"66⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\429C.tmp"C:\Users\Admin\AppData\Local\Temp\429C.tmp"67⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\42DA.tmp"C:\Users\Admin\AppData\Local\Temp\42DA.tmp"68⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\4318.tmp"C:\Users\Admin\AppData\Local\Temp\4318.tmp"69⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\4357.tmp"C:\Users\Admin\AppData\Local\Temp\4357.tmp"70⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\4395.tmp"C:\Users\Admin\AppData\Local\Temp\4395.tmp"71⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\43D4.tmp"C:\Users\Admin\AppData\Local\Temp\43D4.tmp"72⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\4412.tmp"C:\Users\Admin\AppData\Local\Temp\4412.tmp"73⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\4450.tmp"C:\Users\Admin\AppData\Local\Temp\4450.tmp"74⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\448F.tmp"C:\Users\Admin\AppData\Local\Temp\448F.tmp"75⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\44EC.tmp"C:\Users\Admin\AppData\Local\Temp\44EC.tmp"76⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\452B.tmp"C:\Users\Admin\AppData\Local\Temp\452B.tmp"77⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\4569.tmp"C:\Users\Admin\AppData\Local\Temp\4569.tmp"78⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\45A8.tmp"C:\Users\Admin\AppData\Local\Temp\45A8.tmp"79⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\45D6.tmp"C:\Users\Admin\AppData\Local\Temp\45D6.tmp"80⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\4615.tmp"C:\Users\Admin\AppData\Local\Temp\4615.tmp"81⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\4653.tmp"C:\Users\Admin\AppData\Local\Temp\4653.tmp"82⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\4692.tmp"C:\Users\Admin\AppData\Local\Temp\4692.tmp"83⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\46D0.tmp"C:\Users\Admin\AppData\Local\Temp\46D0.tmp"84⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\470E.tmp"C:\Users\Admin\AppData\Local\Temp\470E.tmp"85⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\474D.tmp"C:\Users\Admin\AppData\Local\Temp\474D.tmp"86⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\478B.tmp"C:\Users\Admin\AppData\Local\Temp\478B.tmp"87⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\47CA.tmp"C:\Users\Admin\AppData\Local\Temp\47CA.tmp"88⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\4808.tmp"C:\Users\Admin\AppData\Local\Temp\4808.tmp"89⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\4846.tmp"C:\Users\Admin\AppData\Local\Temp\4846.tmp"90⤵PID:2240
-
C:\Users\Admin\AppData\Local\Temp\4885.tmp"C:\Users\Admin\AppData\Local\Temp\4885.tmp"91⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\48C3.tmp"C:\Users\Admin\AppData\Local\Temp\48C3.tmp"92⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\4902.tmp"C:\Users\Admin\AppData\Local\Temp\4902.tmp"93⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\4940.tmp"C:\Users\Admin\AppData\Local\Temp\4940.tmp"94⤵PID:708
-
C:\Users\Admin\AppData\Local\Temp\497E.tmp"C:\Users\Admin\AppData\Local\Temp\497E.tmp"95⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\49BD.tmp"C:\Users\Admin\AppData\Local\Temp\49BD.tmp"96⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\49FB.tmp"C:\Users\Admin\AppData\Local\Temp\49FB.tmp"97⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\4A3A.tmp"C:\Users\Admin\AppData\Local\Temp\4A3A.tmp"98⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\4A78.tmp"C:\Users\Admin\AppData\Local\Temp\4A78.tmp"99⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\4AB6.tmp"C:\Users\Admin\AppData\Local\Temp\4AB6.tmp"100⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\4AF5.tmp"C:\Users\Admin\AppData\Local\Temp\4AF5.tmp"101⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\4B33.tmp"C:\Users\Admin\AppData\Local\Temp\4B33.tmp"102⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\4B72.tmp"C:\Users\Admin\AppData\Local\Temp\4B72.tmp"103⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"104⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"105⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"106⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"107⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"108⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\4D07.tmp"C:\Users\Admin\AppData\Local\Temp\4D07.tmp"109⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\4D55.tmp"C:\Users\Admin\AppData\Local\Temp\4D55.tmp"110⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\4D94.tmp"C:\Users\Admin\AppData\Local\Temp\4D94.tmp"111⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"112⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\4E10.tmp"C:\Users\Admin\AppData\Local\Temp\4E10.tmp"113⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"114⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"115⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"C:\Users\Admin\AppData\Local\Temp\4ECC.tmp"116⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"117⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\4F48.tmp"C:\Users\Admin\AppData\Local\Temp\4F48.tmp"118⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\4F87.tmp"C:\Users\Admin\AppData\Local\Temp\4F87.tmp"119⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\4FC5.tmp"C:\Users\Admin\AppData\Local\Temp\4FC5.tmp"120⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"121⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\5042.tmp"C:\Users\Admin\AppData\Local\Temp\5042.tmp"122⤵PID:2744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-