Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 17:33
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe
-
Size
486KB
-
MD5
a9dd47c4661e360b324376eafccf04f8
-
SHA1
71e04130d2a88b77d06fc6a9e555fd5b7220aac9
-
SHA256
4ab65078cebb84f797bffe9f20be7efeb7619bdb3fc581d7a4e228742f113aea
-
SHA512
d70919219c8f25a0eac2f40fcba09a9ebdb03f16a121330193de10636993594955741b18bd70505adbc75ce24fef6fa1ab70015e40e891be9d9818a3807ee98c
-
SSDEEP
12288:/U5rCOTeiDYgUk4GcpFuLE/kCw0O2CpMXpi8NZ:/UQOJDhT4GcHuLE/U0BYoi8N
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2764 4E8D.tmp 1540 4F0A.tmp 1816 5E4C.tmp 2492 4FC6.tmp 1108 5023.tmp 5112 50A0.tmp 2004 6021.tmp 5068 515C.tmp 2480 51C9.tmp 3996 6189.tmp 380 5285.tmp 4268 52E3.tmp 4584 5340.tmp 3612 53AE.tmp 4692 53FC.tmp 4792 544A.tmp 632 5498.tmp 2384 54E6.tmp 948 5554.tmp 3984 55B1.tmp 3992 560F.tmp 1528 565D.tmp 4012 56EA.tmp 4968 5738.tmp 572 57A5.tmp 2636 57F3.tmp 2696 5851.tmp 4980 58AF.tmp 3876 58FD.tmp 3260 594B.tmp 8 5999.tmp 2484 5A16.tmp 4212 5A64.tmp 4040 5AB3.tmp 4432 5B01.tmp 3544 5B5E.tmp 4016 5BAD.tmp 2964 5C39.tmp 4380 5C97.tmp 4824 5CF5.tmp 3392 6EB8.tmp 3940 5DB0.tmp 4540 5DFE.tmp 1816 5E4C.tmp 2836 5E9B.tmp 2228 5EE9.tmp 1108 5023.tmp 2732 5F85.tmp 4632 5FD3.tmp 2004 6021.tmp 1632 606F.tmp 2092 60BD.tmp 1196 612B.tmp 3996 6189.tmp 3628 61D7.tmp 184 6225.tmp 3704 6273.tmp 5036 62C1.tmp 2340 631F.tmp 3640 63AB.tmp 3964 6419.tmp 3976 6496.tmp 3000 6503.tmp 1960 6551.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1472 wrote to memory of 2764 1472 2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe 87 PID 1472 wrote to memory of 2764 1472 2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe 87 PID 1472 wrote to memory of 2764 1472 2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe 87 PID 2764 wrote to memory of 1540 2764 4E8D.tmp 89 PID 2764 wrote to memory of 1540 2764 4E8D.tmp 89 PID 2764 wrote to memory of 1540 2764 4E8D.tmp 89 PID 1540 wrote to memory of 1816 1540 4F0A.tmp 120 PID 1540 wrote to memory of 1816 1540 4F0A.tmp 120 PID 1540 wrote to memory of 1816 1540 4F0A.tmp 120 PID 1816 wrote to memory of 2492 1816 5E4C.tmp 92 PID 1816 wrote to memory of 2492 1816 5E4C.tmp 92 PID 1816 wrote to memory of 2492 1816 5E4C.tmp 92 PID 2492 wrote to memory of 1108 2492 4FC6.tmp 149 PID 2492 wrote to memory of 1108 2492 4FC6.tmp 149 PID 2492 wrote to memory of 1108 2492 4FC6.tmp 149 PID 1108 wrote to memory of 5112 1108 5023.tmp 93 PID 1108 wrote to memory of 5112 1108 5023.tmp 93 PID 1108 wrote to memory of 5112 1108 5023.tmp 93 PID 5112 wrote to memory of 2004 5112 50A0.tmp 128 PID 5112 wrote to memory of 2004 5112 50A0.tmp 128 PID 5112 wrote to memory of 2004 5112 50A0.tmp 128 PID 2004 wrote to memory of 5068 2004 6021.tmp 95 PID 2004 wrote to memory of 5068 2004 6021.tmp 95 PID 2004 wrote to memory of 5068 2004 6021.tmp 95 PID 5068 wrote to memory of 2480 5068 515C.tmp 148 PID 5068 wrote to memory of 2480 5068 515C.tmp 148 PID 5068 wrote to memory of 2480 5068 515C.tmp 148 PID 2480 wrote to memory of 3996 2480 51C9.tmp 134 PID 2480 wrote to memory of 3996 2480 51C9.tmp 134 PID 2480 wrote to memory of 3996 2480 51C9.tmp 134 PID 3996 wrote to memory of 380 3996 6189.tmp 147 PID 3996 wrote to memory of 380 3996 6189.tmp 147 PID 3996 wrote to memory of 380 3996 6189.tmp 147 PID 380 wrote to memory of 4268 380 5285.tmp 97 PID 380 wrote to memory of 4268 380 5285.tmp 97 PID 380 wrote to memory of 4268 380 5285.tmp 97 PID 4268 wrote to memory of 4584 4268 52E3.tmp 146 PID 4268 wrote to memory of 4584 4268 52E3.tmp 146 PID 4268 wrote to memory of 4584 4268 52E3.tmp 146 PID 4584 wrote to memory of 3612 4584 5340.tmp 145 PID 4584 wrote to memory of 3612 4584 5340.tmp 145 PID 4584 wrote to memory of 3612 4584 5340.tmp 145 PID 3612 wrote to memory of 4692 3612 53AE.tmp 144 PID 3612 wrote to memory of 4692 3612 53AE.tmp 144 PID 3612 wrote to memory of 4692 3612 53AE.tmp 144 PID 4692 wrote to memory of 4792 4692 53FC.tmp 143 PID 4692 wrote to memory of 4792 4692 53FC.tmp 143 PID 4692 wrote to memory of 4792 4692 53FC.tmp 143 PID 4792 wrote to memory of 632 4792 544A.tmp 142 PID 4792 wrote to memory of 632 4792 544A.tmp 142 PID 4792 wrote to memory of 632 4792 544A.tmp 142 PID 632 wrote to memory of 2384 632 5498.tmp 141 PID 632 wrote to memory of 2384 632 5498.tmp 141 PID 632 wrote to memory of 2384 632 5498.tmp 141 PID 2384 wrote to memory of 948 2384 54E6.tmp 140 PID 2384 wrote to memory of 948 2384 54E6.tmp 140 PID 2384 wrote to memory of 948 2384 54E6.tmp 140 PID 948 wrote to memory of 3984 948 5554.tmp 139 PID 948 wrote to memory of 3984 948 5554.tmp 139 PID 948 wrote to memory of 3984 948 5554.tmp 139 PID 3984 wrote to memory of 3992 3984 55B1.tmp 138 PID 3984 wrote to memory of 3992 3984 55B1.tmp 138 PID 3984 wrote to memory of 3992 3984 55B1.tmp 138 PID 3992 wrote to memory of 1528 3992 560F.tmp 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-27_a9dd47c4661e360b324376eafccf04f8_mafia.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"C:\Users\Admin\AppData\Local\Temp\4E8D.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"C:\Users\Admin\AppData\Local\Temp\4F0A.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"4⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\4FC6.tmp"C:\Users\Admin\AppData\Local\Temp\4FC6.tmp"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\5023.tmp"C:\Users\Admin\AppData\Local\Temp\5023.tmp"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\50A0.tmp"C:\Users\Admin\AppData\Local\Temp\50A0.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\50FE.tmp"C:\Users\Admin\AppData\Local\Temp\50FE.tmp"2⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\515C.tmp"C:\Users\Admin\AppData\Local\Temp\515C.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\51C9.tmp"C:\Users\Admin\AppData\Local\Temp\51C9.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5227.tmp"C:\Users\Admin\AppData\Local\Temp\5227.tmp"1⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\52E3.tmp"C:\Users\Admin\AppData\Local\Temp\52E3.tmp"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\5340.tmp"C:\Users\Admin\AppData\Local\Temp\5340.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584
-
-
C:\Users\Admin\AppData\Local\Temp\565D.tmp"C:\Users\Admin\AppData\Local\Temp\565D.tmp"1⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\56EA.tmp"C:\Users\Admin\AppData\Local\Temp\56EA.tmp"2⤵
- Executes dropped EXE
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\5738.tmp"C:\Users\Admin\AppData\Local\Temp\5738.tmp"3⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\57A5.tmp"C:\Users\Admin\AppData\Local\Temp\57A5.tmp"4⤵
- Executes dropped EXE
PID:572
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\58FD.tmp"C:\Users\Admin\AppData\Local\Temp\58FD.tmp"1⤵
- Executes dropped EXE
PID:3876 -
C:\Users\Admin\AppData\Local\Temp\594B.tmp"C:\Users\Admin\AppData\Local\Temp\594B.tmp"2⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\5999.tmp"C:\Users\Admin\AppData\Local\Temp\5999.tmp"3⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\5A16.tmp"C:\Users\Admin\AppData\Local\Temp\5A16.tmp"4⤵
- Executes dropped EXE
PID:2484
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\58AF.tmp"C:\Users\Admin\AppData\Local\Temp\58AF.tmp"1⤵
- Executes dropped EXE
PID:4980
-
C:\Users\Admin\AppData\Local\Temp\5A64.tmp"C:\Users\Admin\AppData\Local\Temp\5A64.tmp"1⤵
- Executes dropped EXE
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"C:\Users\Admin\AppData\Local\Temp\5AB3.tmp"2⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\5B01.tmp"C:\Users\Admin\AppData\Local\Temp\5B01.tmp"3⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"C:\Users\Admin\AppData\Local\Temp\5B5E.tmp"4⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"C:\Users\Admin\AppData\Local\Temp\5BAD.tmp"5⤵
- Executes dropped EXE
PID:4016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5C39.tmp"C:\Users\Admin\AppData\Local\Temp\5C39.tmp"1⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\5C97.tmp"C:\Users\Admin\AppData\Local\Temp\5C97.tmp"2⤵
- Executes dropped EXE
PID:4380
-
-
C:\Users\Admin\AppData\Local\Temp\5CF5.tmp"C:\Users\Admin\AppData\Local\Temp\5CF5.tmp"1⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\5D62.tmp"C:\Users\Admin\AppData\Local\Temp\5D62.tmp"2⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\5DB0.tmp"C:\Users\Admin\AppData\Local\Temp\5DB0.tmp"3⤵
- Executes dropped EXE
PID:3940
-
-
-
C:\Users\Admin\AppData\Local\Temp\5DFE.tmp"C:\Users\Admin\AppData\Local\Temp\5DFE.tmp"1⤵
- Executes dropped EXE
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"C:\Users\Admin\AppData\Local\Temp\5E4C.tmp"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"C:\Users\Admin\AppData\Local\Temp\5E9B.tmp"3⤵
- Executes dropped EXE
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"C:\Users\Admin\AppData\Local\Temp\5EE9.tmp"4⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\5F37.tmp"C:\Users\Admin\AppData\Local\Temp\5F37.tmp"5⤵PID:1108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\5851.tmp"C:\Users\Admin\AppData\Local\Temp\5851.tmp"1⤵
- Executes dropped EXE
PID:2696
-
C:\Users\Admin\AppData\Local\Temp\5F85.tmp"C:\Users\Admin\AppData\Local\Temp\5F85.tmp"1⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"C:\Users\Admin\AppData\Local\Temp\5FD3.tmp"2⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\6021.tmp"C:\Users\Admin\AppData\Local\Temp\6021.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\606F.tmp"C:\Users\Admin\AppData\Local\Temp\606F.tmp"4⤵
- Executes dropped EXE
PID:1632
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\57F3.tmp"C:\Users\Admin\AppData\Local\Temp\57F3.tmp"1⤵
- Executes dropped EXE
PID:2636
-
C:\Users\Admin\AppData\Local\Temp\60BD.tmp"C:\Users\Admin\AppData\Local\Temp\60BD.tmp"1⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\612B.tmp"C:\Users\Admin\AppData\Local\Temp\612B.tmp"2⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\6189.tmp"C:\Users\Admin\AppData\Local\Temp\6189.tmp"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\61D7.tmp"C:\Users\Admin\AppData\Local\Temp\61D7.tmp"4⤵
- Executes dropped EXE
PID:3628
-
-
C:\Users\Admin\AppData\Local\Temp\5285.tmp"C:\Users\Admin\AppData\Local\Temp\5285.tmp"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\6225.tmp"C:\Users\Admin\AppData\Local\Temp\6225.tmp"1⤵
- Executes dropped EXE
PID:184 -
C:\Users\Admin\AppData\Local\Temp\6273.tmp"C:\Users\Admin\AppData\Local\Temp\6273.tmp"2⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\62C1.tmp"C:\Users\Admin\AppData\Local\Temp\62C1.tmp"3⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\631F.tmp"C:\Users\Admin\AppData\Local\Temp\631F.tmp"4⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\63AB.tmp"C:\Users\Admin\AppData\Local\Temp\63AB.tmp"5⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\6419.tmp"C:\Users\Admin\AppData\Local\Temp\6419.tmp"6⤵
- Executes dropped EXE
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\6496.tmp"C:\Users\Admin\AppData\Local\Temp\6496.tmp"7⤵
- Executes dropped EXE
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\6503.tmp"C:\Users\Admin\AppData\Local\Temp\6503.tmp"8⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\6551.tmp"C:\Users\Admin\AppData\Local\Temp\6551.tmp"9⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\65DE.tmp"C:\Users\Admin\AppData\Local\Temp\65DE.tmp"10⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\662C.tmp"C:\Users\Admin\AppData\Local\Temp\662C.tmp"11⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\667A.tmp"C:\Users\Admin\AppData\Local\Temp\667A.tmp"12⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\66C8.tmp"C:\Users\Admin\AppData\Local\Temp\66C8.tmp"13⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\6726.tmp"C:\Users\Admin\AppData\Local\Temp\6726.tmp"14⤵PID:3248
-
C:\Users\Admin\AppData\Local\Temp\6774.tmp"C:\Users\Admin\AppData\Local\Temp\6774.tmp"15⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\67C2.tmp"C:\Users\Admin\AppData\Local\Temp\67C2.tmp"16⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\6810.tmp"C:\Users\Admin\AppData\Local\Temp\6810.tmp"17⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\685F.tmp"C:\Users\Admin\AppData\Local\Temp\685F.tmp"18⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\68AD.tmp"C:\Users\Admin\AppData\Local\Temp\68AD.tmp"19⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\68FB.tmp"C:\Users\Admin\AppData\Local\Temp\68FB.tmp"20⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\6949.tmp"C:\Users\Admin\AppData\Local\Temp\6949.tmp"21⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\6997.tmp"C:\Users\Admin\AppData\Local\Temp\6997.tmp"22⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\69E5.tmp"C:\Users\Admin\AppData\Local\Temp\69E5.tmp"23⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\6A24.tmp"C:\Users\Admin\AppData\Local\Temp\6A24.tmp"24⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\6A72.tmp"C:\Users\Admin\AppData\Local\Temp\6A72.tmp"25⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"C:\Users\Admin\AppData\Local\Temp\6AC0.tmp"26⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"C:\Users\Admin\AppData\Local\Temp\6B0E.tmp"27⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"C:\Users\Admin\AppData\Local\Temp\6B5C.tmp"28⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"C:\Users\Admin\AppData\Local\Temp\6BAA.tmp"29⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"C:\Users\Admin\AppData\Local\Temp\6BF8.tmp"30⤵PID:3456
-
C:\Users\Admin\AppData\Local\Temp\6C47.tmp"C:\Users\Admin\AppData\Local\Temp\6C47.tmp"31⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\6C95.tmp"C:\Users\Admin\AppData\Local\Temp\6C95.tmp"32⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"C:\Users\Admin\AppData\Local\Temp\6CE3.tmp"33⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\6D31.tmp"C:\Users\Admin\AppData\Local\Temp\6D31.tmp"34⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"C:\Users\Admin\AppData\Local\Temp\6D7F.tmp"35⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"C:\Users\Admin\AppData\Local\Temp\6DCD.tmp"36⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"C:\Users\Admin\AppData\Local\Temp\6E1B.tmp"37⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\6E69.tmp"C:\Users\Admin\AppData\Local\Temp\6E69.tmp"38⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"C:\Users\Admin\AppData\Local\Temp\6EB8.tmp"39⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\6F15.tmp"C:\Users\Admin\AppData\Local\Temp\6F15.tmp"40⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"C:\Users\Admin\AppData\Local\Temp\6FE0.tmp"41⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\705D.tmp"C:\Users\Admin\AppData\Local\Temp\705D.tmp"42⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\7109.tmp"C:\Users\Admin\AppData\Local\Temp\7109.tmp"43⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\7177.tmp"C:\Users\Admin\AppData\Local\Temp\7177.tmp"44⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\7213.tmp"C:\Users\Admin\AppData\Local\Temp\7213.tmp"45⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\7290.tmp"C:\Users\Admin\AppData\Local\Temp\7290.tmp"46⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\733C.tmp"C:\Users\Admin\AppData\Local\Temp\733C.tmp"47⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\73E8.tmp"C:\Users\Admin\AppData\Local\Temp\73E8.tmp"48⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\7436.tmp"C:\Users\Admin\AppData\Local\Temp\7436.tmp"49⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"50⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\74D2.tmp"C:\Users\Admin\AppData\Local\Temp\74D2.tmp"51⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\7530.tmp"C:\Users\Admin\AppData\Local\Temp\7530.tmp"52⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\757E.tmp"C:\Users\Admin\AppData\Local\Temp\757E.tmp"53⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\75CC.tmp"C:\Users\Admin\AppData\Local\Temp\75CC.tmp"54⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\761A.tmp"C:\Users\Admin\AppData\Local\Temp\761A.tmp"55⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\7678.tmp"C:\Users\Admin\AppData\Local\Temp\7678.tmp"56⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\76C6.tmp"C:\Users\Admin\AppData\Local\Temp\76C6.tmp"57⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\7724.tmp"C:\Users\Admin\AppData\Local\Temp\7724.tmp"58⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\7782.tmp"C:\Users\Admin\AppData\Local\Temp\7782.tmp"59⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\77D0.tmp"C:\Users\Admin\AppData\Local\Temp\77D0.tmp"60⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\782D.tmp"C:\Users\Admin\AppData\Local\Temp\782D.tmp"61⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\787C.tmp"C:\Users\Admin\AppData\Local\Temp\787C.tmp"62⤵PID:4596
-
C:\Users\Admin\AppData\Local\Temp\78D9.tmp"C:\Users\Admin\AppData\Local\Temp\78D9.tmp"63⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\7927.tmp"C:\Users\Admin\AppData\Local\Temp\7927.tmp"64⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\7985.tmp"C:\Users\Admin\AppData\Local\Temp\7985.tmp"65⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\79E3.tmp"C:\Users\Admin\AppData\Local\Temp\79E3.tmp"66⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\7A41.tmp"C:\Users\Admin\AppData\Local\Temp\7A41.tmp"67⤵PID:3324
-
C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"C:\Users\Admin\AppData\Local\Temp\7A8F.tmp"68⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"C:\Users\Admin\AppData\Local\Temp\7ADD.tmp"69⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"C:\Users\Admin\AppData\Local\Temp\7B2B.tmp"70⤵PID:3732
-
C:\Users\Admin\AppData\Local\Temp\7B89.tmp"C:\Users\Admin\AppData\Local\Temp\7B89.tmp"71⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"C:\Users\Admin\AppData\Local\Temp\7BE7.tmp"72⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\7C44.tmp"C:\Users\Admin\AppData\Local\Temp\7C44.tmp"73⤵PID:4212
-
C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"C:\Users\Admin\AppData\Local\Temp\7CA2.tmp"74⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"C:\Users\Admin\AppData\Local\Temp\7CF0.tmp"75⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"C:\Users\Admin\AppData\Local\Temp\7D3E.tmp"76⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"C:\Users\Admin\AppData\Local\Temp\7D8C.tmp"77⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"C:\Users\Admin\AppData\Local\Temp\7DDB.tmp"78⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\7E29.tmp"C:\Users\Admin\AppData\Local\Temp\7E29.tmp"79⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\7E86.tmp"C:\Users\Admin\AppData\Local\Temp\7E86.tmp"80⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"C:\Users\Admin\AppData\Local\Temp\7EE4.tmp"81⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\7F32.tmp"C:\Users\Admin\AppData\Local\Temp\7F32.tmp"82⤵PID:4464
-
C:\Users\Admin\AppData\Local\Temp\7F90.tmp"C:\Users\Admin\AppData\Local\Temp\7F90.tmp"83⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"C:\Users\Admin\AppData\Local\Temp\7FEE.tmp"84⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\804C.tmp"C:\Users\Admin\AppData\Local\Temp\804C.tmp"85⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\809A.tmp"C:\Users\Admin\AppData\Local\Temp\809A.tmp"86⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\80E8.tmp"C:\Users\Admin\AppData\Local\Temp\80E8.tmp"87⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\8136.tmp"C:\Users\Admin\AppData\Local\Temp\8136.tmp"88⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\8184.tmp"C:\Users\Admin\AppData\Local\Temp\8184.tmp"89⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\81E2.tmp"C:\Users\Admin\AppData\Local\Temp\81E2.tmp"90⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\8240.tmp"C:\Users\Admin\AppData\Local\Temp\8240.tmp"91⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\828E.tmp"C:\Users\Admin\AppData\Local\Temp\828E.tmp"92⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\82EB.tmp"C:\Users\Admin\AppData\Local\Temp\82EB.tmp"93⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\833A.tmp"C:\Users\Admin\AppData\Local\Temp\833A.tmp"94⤵PID:4176
-
C:\Users\Admin\AppData\Local\Temp\8388.tmp"C:\Users\Admin\AppData\Local\Temp\8388.tmp"95⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\83D6.tmp"C:\Users\Admin\AppData\Local\Temp\83D6.tmp"96⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\8424.tmp"C:\Users\Admin\AppData\Local\Temp\8424.tmp"97⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\8482.tmp"C:\Users\Admin\AppData\Local\Temp\8482.tmp"98⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\84DF.tmp"C:\Users\Admin\AppData\Local\Temp\84DF.tmp"99⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\853D.tmp"C:\Users\Admin\AppData\Local\Temp\853D.tmp"100⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\858B.tmp"C:\Users\Admin\AppData\Local\Temp\858B.tmp"101⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\85D9.tmp"C:\Users\Admin\AppData\Local\Temp\85D9.tmp"102⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\8628.tmp"C:\Users\Admin\AppData\Local\Temp\8628.tmp"103⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\8685.tmp"C:\Users\Admin\AppData\Local\Temp\8685.tmp"104⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\86E3.tmp"C:\Users\Admin\AppData\Local\Temp\86E3.tmp"105⤵PID:3604
-
C:\Users\Admin\AppData\Local\Temp\8731.tmp"C:\Users\Admin\AppData\Local\Temp\8731.tmp"106⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\877F.tmp"C:\Users\Admin\AppData\Local\Temp\877F.tmp"107⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\87CD.tmp"C:\Users\Admin\AppData\Local\Temp\87CD.tmp"108⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\881C.tmp"C:\Users\Admin\AppData\Local\Temp\881C.tmp"109⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\886A.tmp"C:\Users\Admin\AppData\Local\Temp\886A.tmp"110⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\88B8.tmp"C:\Users\Admin\AppData\Local\Temp\88B8.tmp"111⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\8925.tmp"C:\Users\Admin\AppData\Local\Temp\8925.tmp"112⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\8983.tmp"C:\Users\Admin\AppData\Local\Temp\8983.tmp"113⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\89E1.tmp"C:\Users\Admin\AppData\Local\Temp\89E1.tmp"114⤵PID:4660
-
C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"C:\Users\Admin\AppData\Local\Temp\8A2F.tmp"115⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"C:\Users\Admin\AppData\Local\Temp\8A8D.tmp"116⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\8AEA.tmp"C:\Users\Admin\AppData\Local\Temp\8AEA.tmp"117⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\8B48.tmp"C:\Users\Admin\AppData\Local\Temp\8B48.tmp"118⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\8B96.tmp"C:\Users\Admin\AppData\Local\Temp\8B96.tmp"119⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"C:\Users\Admin\AppData\Local\Temp\8BE4.tmp"120⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\8C42.tmp"C:\Users\Admin\AppData\Local\Temp\8C42.tmp"121⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\8CA0.tmp"C:\Users\Admin\AppData\Local\Temp\8CA0.tmp"122⤵PID:4500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-