Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24/01/2024, 13:28
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe
-
Size
488KB
-
MD5
9bdc5a621c93e241b5741b5d2b458f33
-
SHA1
637a77fd84c178d0de420f1bffdf1d4b8d0b0800
-
SHA256
47eda469993a35f8ff7dcc20de13e0cd8e6a7f2ab90cb8d03f6a7c981462f793
-
SHA512
8df82bd1f8219387923ce6d21f15f1e971ccd7980e1200486c54ef863fa99ea30832fa1e97859326ffce5da04f1f9d06f2533ea2d3f52bf97241249d29d90010
-
SSDEEP
12288:/U5rCOTeiD86XS3uk5UWM+37NCYWfURkTNZ:/UQOJDFj9+rN+SkTN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2384 14E8.tmp 2988 1545.tmp 3056 1593.tmp 2168 15D2.tmp 2556 163F.tmp 2684 167D.tmp 2892 16BC.tmp 2764 16FA.tmp 2540 1748.tmp 2496 1786.tmp 2448 17C5.tmp 2572 1803.tmp 2964 1861.tmp 2308 189F.tmp 2696 18DE.tmp 1140 192C.tmp 1132 197A.tmp 1876 19F6.tmp 2428 1A35.tmp 2832 1A73.tmp 952 1AC1.tmp 1436 1B00.tmp 1324 1B3E.tmp 2984 1B7C.tmp 2872 2AD8.tmp 2076 1BF9.tmp 2072 1C47.tmp 1992 2BC2.tmp 1100 1CC4.tmp 576 1CF3.tmp 484 1D31.tmp 588 1D70.tmp 580 2D38.tmp 540 1DEC.tmp 1936 1E2B.tmp 1924 1E5A.tmp 848 1E98.tmp 2256 1ED6.tmp 2920 1F15.tmp 280 1F53.tmp 1944 2F6A.tmp 1928 1FC0.tmp 1616 1FFF.tmp 1120 203D.tmp 2952 206C.tmp 1056 20AA.tmp 2924 20E9.tmp 2328 2118.tmp 1752 2156.tmp 1612 2194.tmp 2436 21D3.tmp 2928 2211.tmp 900 2250.tmp 964 228E.tmp 2644 22CC.tmp 2376 230B.tmp 2144 2349.tmp 2348 2388.tmp 1820 23B6.tmp 3016 23F5.tmp 2580 2424.tmp 2036 2462.tmp 2904 24A0.tmp 2756 24DF.tmp -
Loads dropped DLL 64 IoCs
pid Process 2352 2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe 2384 14E8.tmp 2988 1545.tmp 3056 1593.tmp 2168 15D2.tmp 2556 163F.tmp 2684 167D.tmp 2892 16BC.tmp 2764 16FA.tmp 2540 1748.tmp 2496 1786.tmp 2448 17C5.tmp 2572 1803.tmp 2964 1861.tmp 2308 189F.tmp 2696 18DE.tmp 1140 192C.tmp 1132 197A.tmp 1876 19F6.tmp 2428 1A35.tmp 2832 1A73.tmp 952 1AC1.tmp 1436 1B00.tmp 1324 1B3E.tmp 2984 1B7C.tmp 2872 2AD8.tmp 2076 1BF9.tmp 2072 1C47.tmp 1992 2BC2.tmp 1100 1CC4.tmp 576 1CF3.tmp 484 1D31.tmp 588 1D70.tmp 580 2D38.tmp 540 1DEC.tmp 1936 1E2B.tmp 1924 1E5A.tmp 848 1E98.tmp 2256 1ED6.tmp 2920 1F15.tmp 280 1F53.tmp 1944 2F6A.tmp 1928 1FC0.tmp 1616 1FFF.tmp 1120 203D.tmp 2952 206C.tmp 1056 20AA.tmp 2924 20E9.tmp 2328 2118.tmp 1752 2156.tmp 1612 2194.tmp 2436 21D3.tmp 2928 2211.tmp 900 2250.tmp 964 228E.tmp 2644 22CC.tmp 2376 230B.tmp 2144 2349.tmp 2348 2388.tmp 1820 23B6.tmp 3016 23F5.tmp 2580 2424.tmp 2036 2462.tmp 2904 24A0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2384 2352 2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe 28 PID 2352 wrote to memory of 2384 2352 2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe 28 PID 2352 wrote to memory of 2384 2352 2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe 28 PID 2352 wrote to memory of 2384 2352 2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe 28 PID 2384 wrote to memory of 2988 2384 14E8.tmp 29 PID 2384 wrote to memory of 2988 2384 14E8.tmp 29 PID 2384 wrote to memory of 2988 2384 14E8.tmp 29 PID 2384 wrote to memory of 2988 2384 14E8.tmp 29 PID 2988 wrote to memory of 3056 2988 1545.tmp 30 PID 2988 wrote to memory of 3056 2988 1545.tmp 30 PID 2988 wrote to memory of 3056 2988 1545.tmp 30 PID 2988 wrote to memory of 3056 2988 1545.tmp 30 PID 3056 wrote to memory of 2168 3056 1593.tmp 134 PID 3056 wrote to memory of 2168 3056 1593.tmp 134 PID 3056 wrote to memory of 2168 3056 1593.tmp 134 PID 3056 wrote to memory of 2168 3056 1593.tmp 134 PID 2168 wrote to memory of 2556 2168 15D2.tmp 133 PID 2168 wrote to memory of 2556 2168 15D2.tmp 133 PID 2168 wrote to memory of 2556 2168 15D2.tmp 133 PID 2168 wrote to memory of 2556 2168 15D2.tmp 133 PID 2556 wrote to memory of 2684 2556 163F.tmp 31 PID 2556 wrote to memory of 2684 2556 163F.tmp 31 PID 2556 wrote to memory of 2684 2556 163F.tmp 31 PID 2556 wrote to memory of 2684 2556 163F.tmp 31 PID 2684 wrote to memory of 2892 2684 167D.tmp 132 PID 2684 wrote to memory of 2892 2684 167D.tmp 132 PID 2684 wrote to memory of 2892 2684 167D.tmp 132 PID 2684 wrote to memory of 2892 2684 167D.tmp 132 PID 2892 wrote to memory of 2764 2892 16BC.tmp 131 PID 2892 wrote to memory of 2764 2892 16BC.tmp 131 PID 2892 wrote to memory of 2764 2892 16BC.tmp 131 PID 2892 wrote to memory of 2764 2892 16BC.tmp 131 PID 2764 wrote to memory of 2540 2764 16FA.tmp 130 PID 2764 wrote to memory of 2540 2764 16FA.tmp 130 PID 2764 wrote to memory of 2540 2764 16FA.tmp 130 PID 2764 wrote to memory of 2540 2764 16FA.tmp 130 PID 2540 wrote to memory of 2496 2540 1748.tmp 129 PID 2540 wrote to memory of 2496 2540 1748.tmp 129 PID 2540 wrote to memory of 2496 2540 1748.tmp 129 PID 2540 wrote to memory of 2496 2540 1748.tmp 129 PID 2496 wrote to memory of 2448 2496 1786.tmp 128 PID 2496 wrote to memory of 2448 2496 1786.tmp 128 PID 2496 wrote to memory of 2448 2496 1786.tmp 128 PID 2496 wrote to memory of 2448 2496 1786.tmp 128 PID 2448 wrote to memory of 2572 2448 17C5.tmp 127 PID 2448 wrote to memory of 2572 2448 17C5.tmp 127 PID 2448 wrote to memory of 2572 2448 17C5.tmp 127 PID 2448 wrote to memory of 2572 2448 17C5.tmp 127 PID 2572 wrote to memory of 2964 2572 1803.tmp 126 PID 2572 wrote to memory of 2964 2572 1803.tmp 126 PID 2572 wrote to memory of 2964 2572 1803.tmp 126 PID 2572 wrote to memory of 2964 2572 1803.tmp 126 PID 2964 wrote to memory of 2308 2964 1861.tmp 125 PID 2964 wrote to memory of 2308 2964 1861.tmp 125 PID 2964 wrote to memory of 2308 2964 1861.tmp 125 PID 2964 wrote to memory of 2308 2964 1861.tmp 125 PID 2308 wrote to memory of 2696 2308 189F.tmp 124 PID 2308 wrote to memory of 2696 2308 189F.tmp 124 PID 2308 wrote to memory of 2696 2308 189F.tmp 124 PID 2308 wrote to memory of 2696 2308 189F.tmp 124 PID 2696 wrote to memory of 1140 2696 18DE.tmp 123 PID 2696 wrote to memory of 1140 2696 18DE.tmp 123 PID 2696 wrote to memory of 1140 2696 18DE.tmp 123 PID 2696 wrote to memory of 1140 2696 18DE.tmp 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-24_9bdc5a621c93e241b5741b5d2b458f33_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\14E8.tmp"C:\Users\Admin\AppData\Local\Temp\14E8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\1545.tmp"C:\Users\Admin\AppData\Local\Temp\1545.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\15D2.tmp"C:\Users\Admin\AppData\Local\Temp\15D2.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2168
-
-
C:\Users\Admin\AppData\Local\Temp\9991.tmp"C:\Users\Admin\AppData\Local\Temp\9991.tmp"5⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\99CF.tmp"C:\Users\Admin\AppData\Local\Temp\99CF.tmp"6⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\9A0E.tmp"C:\Users\Admin\AppData\Local\Temp\9A0E.tmp"7⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"C:\Users\Admin\AppData\Local\Temp\9A4C.tmp"8⤵PID:2488
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\167D.tmp"C:\Users\Admin\AppData\Local\Temp\167D.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\16BC.tmp"C:\Users\Admin\AppData\Local\Temp\16BC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\1B7C.tmp"C:\Users\Admin\AppData\Local\Temp\1B7C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\1BBB.tmp"C:\Users\Admin\AppData\Local\Temp\1BBB.tmp"2⤵PID:2872
-
-
C:\Users\Admin\AppData\Local\Temp\1C86.tmp"C:\Users\Admin\AppData\Local\Temp\1C86.tmp"1⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576 -
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Users\Admin\AppData\Local\Temp\1D70.tmp"C:\Users\Admin\AppData\Local\Temp\1D70.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:588
-
-
-
C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"C:\Users\Admin\AppData\Local\Temp\1DAE.tmp"1⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\1E5A.tmp"C:\Users\Admin\AppData\Local\Temp\1E5A.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\1E98.tmp"C:\Users\Admin\AppData\Local\Temp\1E98.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848
-
-
C:\Users\Admin\AppData\Local\Temp\1F15.tmp"C:\Users\Admin\AppData\Local\Temp\1F15.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\1F53.tmp"C:\Users\Admin\AppData\Local\Temp\1F53.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:280
-
-
C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\203D.tmp"C:\Users\Admin\AppData\Local\Temp\203D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1120
-
-
C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"C:\Users\Admin\AppData\Local\Temp\1FC0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928
-
C:\Users\Admin\AppData\Local\Temp\2118.tmp"C:\Users\Admin\AppData\Local\Temp\2118.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\2211.tmp"C:\Users\Admin\AppData\Local\Temp\2211.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2928
-
-
C:\Users\Admin\AppData\Local\Temp\981B.tmp"C:\Users\Admin\AppData\Local\Temp\981B.tmp"2⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:964 -
C:\Users\Admin\AppData\Local\Temp\22CC.tmp"C:\Users\Admin\AppData\Local\Temp\22CC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\9859.tmp"C:\Users\Admin\AppData\Local\Temp\9859.tmp"3⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\9897.tmp"C:\Users\Admin\AppData\Local\Temp\9897.tmp"4⤵PID:1648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2349.tmp"C:\Users\Admin\AppData\Local\Temp\2349.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\88FE.tmp"C:\Users\Admin\AppData\Local\Temp\88FE.tmp"2⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\893C.tmp"C:\Users\Admin\AppData\Local\Temp\893C.tmp"3⤵PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\23B6.tmp"C:\Users\Admin\AppData\Local\Temp\23B6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\23F5.tmp"C:\Users\Admin\AppData\Local\Temp\23F5.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3016
-
-
C:\Users\Admin\AppData\Local\Temp\2424.tmp"C:\Users\Admin\AppData\Local\Temp\2424.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\2462.tmp"C:\Users\Admin\AppData\Local\Temp\2462.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036
-
-
C:\Users\Admin\AppData\Local\Temp\89B9.tmp"C:\Users\Admin\AppData\Local\Temp\89B9.tmp"2⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\89F7.tmp"C:\Users\Admin\AppData\Local\Temp\89F7.tmp"3⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\8A36.tmp"C:\Users\Admin\AppData\Local\Temp\8A36.tmp"4⤵PID:2664
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"2⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\251D.tmp"C:\Users\Admin\AppData\Local\Temp\251D.tmp"3⤵PID:3044
-
-
-
C:\Users\Admin\AppData\Local\Temp\255C.tmp"C:\Users\Admin\AppData\Local\Temp\255C.tmp"1⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\259A.tmp"C:\Users\Admin\AppData\Local\Temp\259A.tmp"2⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\9B46.tmp"C:\Users\Admin\AppData\Local\Temp\9B46.tmp"3⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\9B84.tmp"C:\Users\Admin\AppData\Local\Temp\9B84.tmp"4⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"C:\Users\Admin\AppData\Local\Temp\9BC3.tmp"5⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\9C01.tmp"C:\Users\Admin\AppData\Local\Temp\9C01.tmp"6⤵PID:2688
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"1⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\26E2.tmp"C:\Users\Admin\AppData\Local\Temp\26E2.tmp"2⤵PID:2516
-
-
C:\Users\Admin\AppData\Local\Temp\2720.tmp"C:\Users\Admin\AppData\Local\Temp\2720.tmp"1⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\275E.tmp"C:\Users\Admin\AppData\Local\Temp\275E.tmp"2⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\279D.tmp"C:\Users\Admin\AppData\Local\Temp\279D.tmp"3⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\27FA.tmp"C:\Users\Admin\AppData\Local\Temp\27FA.tmp"4⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp"5⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"1⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"2⤵PID:1628
-
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"1⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"2⤵PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\1AC1.tmp"C:\Users\Admin\AppData\Local\Temp\1AC1.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:952
-
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"1⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"2⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\2AD8.tmp"C:\Users\Admin\AppData\Local\Temp\2AD8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\2B16.tmp"C:\Users\Admin\AppData\Local\Temp\2B16.tmp"2⤵PID:2132
-
-
C:\Users\Admin\AppData\Local\Temp\1BF9.tmp"C:\Users\Admin\AppData\Local\Temp\1BF9.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2076
-
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"2⤵PID:2052
-
-
C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1100
-
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"1⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"1⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"2⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"3⤵PID:2788
-
-
C:\Users\Admin\AppData\Local\Temp\932B.tmp"C:\Users\Admin\AppData\Local\Temp\932B.tmp"3⤵PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\92AE.tmp"C:\Users\Admin\AppData\Local\Temp\92AE.tmp"2⤵PID:588
-
C:\Users\Admin\AppData\Local\Temp\92ED.tmp"C:\Users\Admin\AppData\Local\Temp\92ED.tmp"3⤵PID:2728
-
-
-
C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"1⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\9270.tmp"C:\Users\Admin\AppData\Local\Temp\9270.tmp"2⤵PID:1176
-
-
C:\Users\Admin\AppData\Local\Temp\2D38.tmp"C:\Users\Admin\AppData\Local\Temp\2D38.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:580 -
C:\Users\Admin\AppData\Local\Temp\2D76.tmp"C:\Users\Admin\AppData\Local\Temp\2D76.tmp"2⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"3⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"4⤵PID:716
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"C:\Users\Admin\AppData\Local\Temp\1DEC.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540
-
-
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"1⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\2E70.tmp"C:\Users\Admin\AppData\Local\Temp\2E70.tmp"2⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"3⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\2EED.tmp"C:\Users\Admin\AppData\Local\Temp\2EED.tmp"4⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"5⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"7⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"8⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\30FF.tmp"C:\Users\Admin\AppData\Local\Temp\30FF.tmp"9⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"10⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"11⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"12⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3276.tmp"C:\Users\Admin\AppData\Local\Temp\3276.tmp"13⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\32D3.tmp"C:\Users\Admin\AppData\Local\Temp\32D3.tmp"14⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3350.tmp"C:\Users\Admin\AppData\Local\Temp\3350.tmp"15⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"16⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\341B.tmp"C:\Users\Admin\AppData\Local\Temp\341B.tmp"17⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\3478.tmp"C:\Users\Admin\AppData\Local\Temp\3478.tmp"18⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"19⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\34F5.tmp"C:\Users\Admin\AppData\Local\Temp\34F5.tmp"20⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3543.tmp"C:\Users\Admin\AppData\Local\Temp\3543.tmp"21⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\3582.tmp"C:\Users\Admin\AppData\Local\Temp\3582.tmp"22⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\35C0.tmp"C:\Users\Admin\AppData\Local\Temp\35C0.tmp"23⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\35FE.tmp"C:\Users\Admin\AppData\Local\Temp\35FE.tmp"24⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"25⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"26⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"27⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"28⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"29⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"30⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"31⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\37F2.tmp"C:\Users\Admin\AppData\Local\Temp\37F2.tmp"32⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\3830.tmp"C:\Users\Admin\AppData\Local\Temp\3830.tmp"33⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\386E.tmp"C:\Users\Admin\AppData\Local\Temp\386E.tmp"34⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\38AD.tmp"C:\Users\Admin\AppData\Local\Temp\38AD.tmp"35⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\38FB.tmp"C:\Users\Admin\AppData\Local\Temp\38FB.tmp"36⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"37⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"38⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\39B6.tmp"C:\Users\Admin\AppData\Local\Temp\39B6.tmp"39⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\3A04.tmp"C:\Users\Admin\AppData\Local\Temp\3A04.tmp"40⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3A42.tmp"C:\Users\Admin\AppData\Local\Temp\3A42.tmp"41⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3A81.tmp"C:\Users\Admin\AppData\Local\Temp\3A81.tmp"42⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"C:\Users\Admin\AppData\Local\Temp\3ACF.tmp"43⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"C:\Users\Admin\AppData\Local\Temp\3B0D.tmp"44⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"C:\Users\Admin\AppData\Local\Temp\3B4C.tmp"45⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"C:\Users\Admin\AppData\Local\Temp\3B8A.tmp"46⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"C:\Users\Admin\AppData\Local\Temp\3BD8.tmp"47⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"48⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"49⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"50⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"C:\Users\Admin\AppData\Local\Temp\3CF1.tmp"51⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"C:\Users\Admin\AppData\Local\Temp\3D2F.tmp"52⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"C:\Users\Admin\AppData\Local\Temp\3D6E.tmp"53⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"54⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\3E0A.tmp"C:\Users\Admin\AppData\Local\Temp\3E0A.tmp"55⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3E48.tmp"C:\Users\Admin\AppData\Local\Temp\3E48.tmp"56⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\3E86.tmp"C:\Users\Admin\AppData\Local\Temp\3E86.tmp"57⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"C:\Users\Admin\AppData\Local\Temp\3EC5.tmp"58⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3F13.tmp"C:\Users\Admin\AppData\Local\Temp\3F13.tmp"59⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3F61.tmp"C:\Users\Admin\AppData\Local\Temp\3F61.tmp"60⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"C:\Users\Admin\AppData\Local\Temp\3F9F.tmp"61⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"C:\Users\Admin\AppData\Local\Temp\3FDE.tmp"62⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\401C.tmp"C:\Users\Admin\AppData\Local\Temp\401C.tmp"63⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\405A.tmp"C:\Users\Admin\AppData\Local\Temp\405A.tmp"64⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\4099.tmp"C:\Users\Admin\AppData\Local\Temp\4099.tmp"65⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\40D7.tmp"C:\Users\Admin\AppData\Local\Temp\40D7.tmp"66⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\4116.tmp"C:\Users\Admin\AppData\Local\Temp\4116.tmp"67⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\4154.tmp"C:\Users\Admin\AppData\Local\Temp\4154.tmp"68⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\4192.tmp"C:\Users\Admin\AppData\Local\Temp\4192.tmp"69⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\41D1.tmp"C:\Users\Admin\AppData\Local\Temp\41D1.tmp"70⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\421F.tmp"C:\Users\Admin\AppData\Local\Temp\421F.tmp"71⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\425D.tmp"C:\Users\Admin\AppData\Local\Temp\425D.tmp"72⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\429C.tmp"C:\Users\Admin\AppData\Local\Temp\429C.tmp"73⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\42DA.tmp"C:\Users\Admin\AppData\Local\Temp\42DA.tmp"74⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\4318.tmp"C:\Users\Admin\AppData\Local\Temp\4318.tmp"75⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\4366.tmp"C:\Users\Admin\AppData\Local\Temp\4366.tmp"76⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\43A5.tmp"C:\Users\Admin\AppData\Local\Temp\43A5.tmp"77⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\43E3.tmp"C:\Users\Admin\AppData\Local\Temp\43E3.tmp"78⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\4422.tmp"C:\Users\Admin\AppData\Local\Temp\4422.tmp"79⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\4470.tmp"C:\Users\Admin\AppData\Local\Temp\4470.tmp"80⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\44AE.tmp"C:\Users\Admin\AppData\Local\Temp\44AE.tmp"81⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\44EC.tmp"C:\Users\Admin\AppData\Local\Temp\44EC.tmp"82⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\452B.tmp"C:\Users\Admin\AppData\Local\Temp\452B.tmp"83⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\4579.tmp"C:\Users\Admin\AppData\Local\Temp\4579.tmp"84⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\45B7.tmp"C:\Users\Admin\AppData\Local\Temp\45B7.tmp"85⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\45F6.tmp"C:\Users\Admin\AppData\Local\Temp\45F6.tmp"86⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\4634.tmp"C:\Users\Admin\AppData\Local\Temp\4634.tmp"87⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\4672.tmp"C:\Users\Admin\AppData\Local\Temp\4672.tmp"88⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\46B1.tmp"C:\Users\Admin\AppData\Local\Temp\46B1.tmp"89⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\46EF.tmp"C:\Users\Admin\AppData\Local\Temp\46EF.tmp"90⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\472E.tmp"C:\Users\Admin\AppData\Local\Temp\472E.tmp"91⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\476C.tmp"C:\Users\Admin\AppData\Local\Temp\476C.tmp"92⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\47AA.tmp"C:\Users\Admin\AppData\Local\Temp\47AA.tmp"93⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\47E9.tmp"C:\Users\Admin\AppData\Local\Temp\47E9.tmp"94⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\4827.tmp"C:\Users\Admin\AppData\Local\Temp\4827.tmp"95⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\4875.tmp"C:\Users\Admin\AppData\Local\Temp\4875.tmp"96⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\48B4.tmp"C:\Users\Admin\AppData\Local\Temp\48B4.tmp"97⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\48F2.tmp"C:\Users\Admin\AppData\Local\Temp\48F2.tmp"98⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\4930.tmp"C:\Users\Admin\AppData\Local\Temp\4930.tmp"99⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"100⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\49AD.tmp"C:\Users\Admin\AppData\Local\Temp\49AD.tmp"101⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\49EC.tmp"C:\Users\Admin\AppData\Local\Temp\49EC.tmp"102⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"103⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\4A68.tmp"C:\Users\Admin\AppData\Local\Temp\4A68.tmp"104⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"C:\Users\Admin\AppData\Local\Temp\4AA7.tmp"105⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\4AE5.tmp"C:\Users\Admin\AppData\Local\Temp\4AE5.tmp"106⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\4B24.tmp"C:\Users\Admin\AppData\Local\Temp\4B24.tmp"107⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\4B62.tmp"C:\Users\Admin\AppData\Local\Temp\4B62.tmp"108⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"C:\Users\Admin\AppData\Local\Temp\4BA0.tmp"109⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"C:\Users\Admin\AppData\Local\Temp\4BDF.tmp"110⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"111⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\4C5C.tmp"C:\Users\Admin\AppData\Local\Temp\4C5C.tmp"112⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\4C9A.tmp"C:\Users\Admin\AppData\Local\Temp\4C9A.tmp"113⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"C:\Users\Admin\AppData\Local\Temp\4CD8.tmp"114⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\4D17.tmp"C:\Users\Admin\AppData\Local\Temp\4D17.tmp"115⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\4D55.tmp"C:\Users\Admin\AppData\Local\Temp\4D55.tmp"116⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\4D94.tmp"C:\Users\Admin\AppData\Local\Temp\4D94.tmp"117⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"C:\Users\Admin\AppData\Local\Temp\4DD2.tmp"118⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\4E10.tmp"C:\Users\Admin\AppData\Local\Temp\4E10.tmp"119⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"C:\Users\Admin\AppData\Local\Temp\4E4F.tmp"120⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"C:\Users\Admin\AppData\Local\Temp\4E9D.tmp"121⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\4EEB.tmp"C:\Users\Admin\AppData\Local\Temp\4EEB.tmp"122⤵PID:2520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-