Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/01/2024, 03:32
Static task
static1
Behavioral task
behavioral1
Sample
2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe
-
Size
486KB
-
MD5
7772da745c57bd182dde6d9359720cf3
-
SHA1
0cf2f6d570858330246971a8989e949b356a44e7
-
SHA256
ca6e8a949b65e9830ae31df2c386a0f12f58dedd7dd5ba53757bd345f8fe691d
-
SHA512
93c7cfee0489a41bfe3075d90e39e29a74a31aad90053ba57ad9083fde7abea5e43a598a0694f6c80f46c05ce7cd70e1b4159794a4e279d1bbbc078e21157341
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7fKhzwWgfzwxrxeS03/BbOFMG9+RgV43/g9DC:/U5rCOTeiDyUc7M/9OCgu/g9DUNZ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3064 428C.tmp 2072 4309.tmp 2780 43D4.tmp 2720 449E.tmp 2576 4579.tmp 2728 6104.tmp 3000 4692.tmp 2736 472E.tmp 2580 627A.tmp 2204 4866.tmp 3012 48D3.tmp 2012 496F.tmp 2812 4A2A.tmp 2128 4AB6.tmp 2304 4B33.tmp 328 4C1D.tmp 1756 4C7B.tmp 1128 4D17.tmp 1692 4D84.tmp 528 4E20.tmp 312 4EDB.tmp 1652 4F68.tmp 2636 4FE4.tmp 2308 5042.tmp 2544 50AF.tmp 1524 512C.tmp 2480 517A.tmp 1760 51E7.tmp 2056 5254.tmp 2952 52B2.tmp 2144 5310.tmp 1124 537D.tmp 2388 54F3.tmp 1892 55AE.tmp 836 560C.tmp 2160 5698.tmp 1340 56F6.tmp 1208 5754.tmp 976 57B1.tmp 1488 581E.tmp 1912 587C.tmp 1820 58E9.tmp 1628 5956.tmp 1656 59C4.tmp 3048 5A12.tmp 1788 5A7F.tmp 2360 5ADC.tmp 2124 5B4A.tmp 2412 5BA7.tmp 2264 5C14.tmp 1056 5C62.tmp 2000 5CD0.tmp 2088 5D2D.tmp 1220 5D9A.tmp 1620 5DF8.tmp 2136 5E46.tmp 2672 5EA4.tmp 2716 5F01.tmp 2692 5F4F.tmp 2828 5F9D.tmp 1184 5FEB.tmp 2604 6039.tmp 2472 6097.tmp 2728 6104.tmp -
Loads dropped DLL 64 IoCs
pid Process 1220 2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe 3064 428C.tmp 2072 4309.tmp 2780 43D4.tmp 2720 449E.tmp 2576 4579.tmp 2728 6104.tmp 3000 4692.tmp 2736 472E.tmp 2580 627A.tmp 2204 4866.tmp 3012 48D3.tmp 2012 496F.tmp 2812 4A2A.tmp 2128 4AB6.tmp 2304 4B33.tmp 328 4C1D.tmp 1756 4C7B.tmp 1128 4D17.tmp 1692 4D84.tmp 528 4E20.tmp 312 4EDB.tmp 1652 4F68.tmp 2636 4FE4.tmp 2308 5042.tmp 2544 50AF.tmp 1524 512C.tmp 2480 517A.tmp 1760 51E7.tmp 2056 5254.tmp 2952 52B2.tmp 2144 5310.tmp 1124 537D.tmp 2388 54F3.tmp 1892 55AE.tmp 836 560C.tmp 2160 5698.tmp 1340 56F6.tmp 1208 5754.tmp 976 57B1.tmp 1488 581E.tmp 1912 587C.tmp 1820 58E9.tmp 1628 5956.tmp 1656 59C4.tmp 3048 5A12.tmp 1788 5A7F.tmp 2360 5ADC.tmp 2124 5B4A.tmp 2412 5BA7.tmp 2264 5C14.tmp 1056 5C62.tmp 2000 5CD0.tmp 2088 5D2D.tmp 1220 5D9A.tmp 1620 5DF8.tmp 2136 5E46.tmp 2672 5EA4.tmp 2716 5F01.tmp 2692 5F4F.tmp 2828 5F9D.tmp 1184 5FEB.tmp 2604 6039.tmp 2472 6097.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 3064 1220 2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe 28 PID 1220 wrote to memory of 3064 1220 2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe 28 PID 1220 wrote to memory of 3064 1220 2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe 28 PID 1220 wrote to memory of 3064 1220 2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe 28 PID 3064 wrote to memory of 2072 3064 428C.tmp 29 PID 3064 wrote to memory of 2072 3064 428C.tmp 29 PID 3064 wrote to memory of 2072 3064 428C.tmp 29 PID 3064 wrote to memory of 2072 3064 428C.tmp 29 PID 2072 wrote to memory of 2780 2072 4309.tmp 30 PID 2072 wrote to memory of 2780 2072 4309.tmp 30 PID 2072 wrote to memory of 2780 2072 4309.tmp 30 PID 2072 wrote to memory of 2780 2072 4309.tmp 30 PID 2780 wrote to memory of 2720 2780 43D4.tmp 31 PID 2780 wrote to memory of 2720 2780 43D4.tmp 31 PID 2780 wrote to memory of 2720 2780 43D4.tmp 31 PID 2780 wrote to memory of 2720 2780 43D4.tmp 31 PID 2720 wrote to memory of 2576 2720 449E.tmp 32 PID 2720 wrote to memory of 2576 2720 449E.tmp 32 PID 2720 wrote to memory of 2576 2720 449E.tmp 32 PID 2720 wrote to memory of 2576 2720 449E.tmp 32 PID 2576 wrote to memory of 2728 2576 4579.tmp 91 PID 2576 wrote to memory of 2728 2576 4579.tmp 91 PID 2576 wrote to memory of 2728 2576 4579.tmp 91 PID 2576 wrote to memory of 2728 2576 4579.tmp 91 PID 2728 wrote to memory of 3000 2728 6104.tmp 34 PID 2728 wrote to memory of 3000 2728 6104.tmp 34 PID 2728 wrote to memory of 3000 2728 6104.tmp 34 PID 2728 wrote to memory of 3000 2728 6104.tmp 34 PID 3000 wrote to memory of 2736 3000 4692.tmp 36 PID 3000 wrote to memory of 2736 3000 4692.tmp 36 PID 3000 wrote to memory of 2736 3000 4692.tmp 36 PID 3000 wrote to memory of 2736 3000 4692.tmp 36 PID 2736 wrote to memory of 2580 2736 472E.tmp 95 PID 2736 wrote to memory of 2580 2736 472E.tmp 95 PID 2736 wrote to memory of 2580 2736 472E.tmp 95 PID 2736 wrote to memory of 2580 2736 472E.tmp 95 PID 2580 wrote to memory of 2204 2580 627A.tmp 39 PID 2580 wrote to memory of 2204 2580 627A.tmp 39 PID 2580 wrote to memory of 2204 2580 627A.tmp 39 PID 2580 wrote to memory of 2204 2580 627A.tmp 39 PID 2204 wrote to memory of 3012 2204 4866.tmp 37 PID 2204 wrote to memory of 3012 2204 4866.tmp 37 PID 2204 wrote to memory of 3012 2204 4866.tmp 37 PID 2204 wrote to memory of 3012 2204 4866.tmp 37 PID 3012 wrote to memory of 2012 3012 48D3.tmp 38 PID 3012 wrote to memory of 2012 3012 48D3.tmp 38 PID 3012 wrote to memory of 2012 3012 48D3.tmp 38 PID 3012 wrote to memory of 2012 3012 48D3.tmp 38 PID 2012 wrote to memory of 2812 2012 496F.tmp 42 PID 2012 wrote to memory of 2812 2012 496F.tmp 42 PID 2012 wrote to memory of 2812 2012 496F.tmp 42 PID 2012 wrote to memory of 2812 2012 496F.tmp 42 PID 2812 wrote to memory of 2128 2812 4A2A.tmp 41 PID 2812 wrote to memory of 2128 2812 4A2A.tmp 41 PID 2812 wrote to memory of 2128 2812 4A2A.tmp 41 PID 2812 wrote to memory of 2128 2812 4A2A.tmp 41 PID 2128 wrote to memory of 2304 2128 4AB6.tmp 40 PID 2128 wrote to memory of 2304 2128 4AB6.tmp 40 PID 2128 wrote to memory of 2304 2128 4AB6.tmp 40 PID 2128 wrote to memory of 2304 2128 4AB6.tmp 40 PID 2304 wrote to memory of 328 2304 4B33.tmp 54 PID 2304 wrote to memory of 328 2304 4B33.tmp 54 PID 2304 wrote to memory of 328 2304 4B33.tmp 54 PID 2304 wrote to memory of 328 2304 4B33.tmp 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-01-28_7772da745c57bd182dde6d9359720cf3_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\428C.tmp"C:\Users\Admin\AppData\Local\Temp\428C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\4309.tmp"C:\Users\Admin\AppData\Local\Temp\4309.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\43D4.tmp"C:\Users\Admin\AppData\Local\Temp\43D4.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\449E.tmp"C:\Users\Admin\AppData\Local\Temp\449E.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\4579.tmp"C:\Users\Admin\AppData\Local\Temp\4579.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\45E6.tmp"C:\Users\Admin\AppData\Local\Temp\45E6.tmp"7⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\4692.tmp"C:\Users\Admin\AppData\Local\Temp\4692.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\472E.tmp"C:\Users\Admin\AppData\Local\Temp\472E.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2736
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\47AA.tmp"C:\Users\Admin\AppData\Local\Temp\47AA.tmp"1⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\4866.tmp"C:\Users\Admin\AppData\Local\Temp\4866.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2204
-
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\496F.tmp"C:\Users\Admin\AppData\Local\Temp\496F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"C:\Users\Admin\AppData\Local\Temp\4A2A.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\4B33.tmp"C:\Users\Admin\AppData\Local\Temp\4B33.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"C:\Users\Admin\AppData\Local\Temp\4C1D.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:328
-
-
C:\Users\Admin\AppData\Local\Temp\4AB6.tmp"C:\Users\Admin\AppData\Local\Temp\4AB6.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2128
-
C:\Users\Admin\AppData\Local\Temp\4E20.tmp"C:\Users\Admin\AppData\Local\Temp\4E20.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:528 -
C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"C:\Users\Admin\AppData\Local\Temp\4EDB.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:312 -
C:\Users\Admin\AppData\Local\Temp\4F68.tmp"C:\Users\Admin\AppData\Local\Temp\4F68.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652
-
-
-
C:\Users\Admin\AppData\Local\Temp\4FE4.tmp"C:\Users\Admin\AppData\Local\Temp\4FE4.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\5042.tmp"C:\Users\Admin\AppData\Local\Temp\5042.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\50AF.tmp"C:\Users\Admin\AppData\Local\Temp\50AF.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\512C.tmp"C:\Users\Admin\AppData\Local\Temp\512C.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\517A.tmp"C:\Users\Admin\AppData\Local\Temp\517A.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\51E7.tmp"C:\Users\Admin\AppData\Local\Temp\51E7.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\5254.tmp"C:\Users\Admin\AppData\Local\Temp\5254.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\52B2.tmp"C:\Users\Admin\AppData\Local\Temp\52B2.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\5310.tmp"C:\Users\Admin\AppData\Local\Temp\5310.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\537D.tmp"C:\Users\Admin\AppData\Local\Temp\537D.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\54F3.tmp"C:\Users\Admin\AppData\Local\Temp\54F3.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\55AE.tmp"C:\Users\Admin\AppData\Local\Temp\55AE.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\560C.tmp"C:\Users\Admin\AppData\Local\Temp\560C.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Users\Admin\AppData\Local\Temp\5698.tmp"C:\Users\Admin\AppData\Local\Temp\5698.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\56F6.tmp"C:\Users\Admin\AppData\Local\Temp\56F6.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\5754.tmp"C:\Users\Admin\AppData\Local\Temp\5754.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\57B1.tmp"C:\Users\Admin\AppData\Local\Temp\57B1.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:976 -
C:\Users\Admin\AppData\Local\Temp\581E.tmp"C:\Users\Admin\AppData\Local\Temp\581E.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\587C.tmp"C:\Users\Admin\AppData\Local\Temp\587C.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\58E9.tmp"C:\Users\Admin\AppData\Local\Temp\58E9.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\5956.tmp"C:\Users\Admin\AppData\Local\Temp\5956.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\59C4.tmp"C:\Users\Admin\AppData\Local\Temp\59C4.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\5A12.tmp"C:\Users\Admin\AppData\Local\Temp\5A12.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"C:\Users\Admin\AppData\Local\Temp\5A7F.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\5ADC.tmp"C:\Users\Admin\AppData\Local\Temp\5ADC.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"C:\Users\Admin\AppData\Local\Temp\5B4A.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\5BA7.tmp"C:\Users\Admin\AppData\Local\Temp\5BA7.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\5C14.tmp"C:\Users\Admin\AppData\Local\Temp\5C14.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\5C62.tmp"C:\Users\Admin\AppData\Local\Temp\5C62.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\5CD0.tmp"C:\Users\Admin\AppData\Local\Temp\5CD0.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\5D2D.tmp"C:\Users\Admin\AppData\Local\Temp\5D2D.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\5D9A.tmp"C:\Users\Admin\AppData\Local\Temp\5D9A.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\5DF8.tmp"C:\Users\Admin\AppData\Local\Temp\5DF8.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\5E46.tmp"C:\Users\Admin\AppData\Local\Temp\5E46.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\5EA4.tmp"C:\Users\Admin\AppData\Local\Temp\5EA4.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\5F01.tmp"C:\Users\Admin\AppData\Local\Temp\5F01.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\5F4F.tmp"C:\Users\Admin\AppData\Local\Temp\5F4F.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\5F9D.tmp"C:\Users\Admin\AppData\Local\Temp\5F9D.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\5FEB.tmp"C:\Users\Admin\AppData\Local\Temp\5FEB.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\6039.tmp"C:\Users\Admin\AppData\Local\Temp\6039.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\6097.tmp"C:\Users\Admin\AppData\Local\Temp\6097.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\6104.tmp"C:\Users\Admin\AppData\Local\Temp\6104.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\6162.tmp"C:\Users\Admin\AppData\Local\Temp\6162.tmp"43⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\61BF.tmp"C:\Users\Admin\AppData\Local\Temp\61BF.tmp"44⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\621D.tmp"C:\Users\Admin\AppData\Local\Temp\621D.tmp"45⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\627A.tmp"C:\Users\Admin\AppData\Local\Temp\627A.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\62F7.tmp"C:\Users\Admin\AppData\Local\Temp\62F7.tmp"47⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\6393.tmp"C:\Users\Admin\AppData\Local\Temp\6393.tmp"48⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\648D.tmp"C:\Users\Admin\AppData\Local\Temp\648D.tmp"49⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\6642.tmp"C:\Users\Admin\AppData\Local\Temp\6642.tmp"50⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\66FD.tmp"C:\Users\Admin\AppData\Local\Temp\66FD.tmp"51⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\677A.tmp"C:\Users\Admin\AppData\Local\Temp\677A.tmp"52⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\6854.tmp"C:\Users\Admin\AppData\Local\Temp\6854.tmp"53⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\68C1.tmp"C:\Users\Admin\AppData\Local\Temp\68C1.tmp"54⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\694E.tmp"C:\Users\Admin\AppData\Local\Temp\694E.tmp"55⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\6AA5.tmp"C:\Users\Admin\AppData\Local\Temp\6AA5.tmp"56⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\6B9F.tmp"C:\Users\Admin\AppData\Local\Temp\6B9F.tmp"57⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\6C0C.tmp"C:\Users\Admin\AppData\Local\Temp\6C0C.tmp"58⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\6C69.tmp"C:\Users\Admin\AppData\Local\Temp\6C69.tmp"59⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\6CC7.tmp"C:\Users\Admin\AppData\Local\Temp\6CC7.tmp"60⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\6D34.tmp"C:\Users\Admin\AppData\Local\Temp\6D34.tmp"61⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\6DC1.tmp"C:\Users\Admin\AppData\Local\Temp\6DC1.tmp"62⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\6E3D.tmp"C:\Users\Admin\AppData\Local\Temp\6E3D.tmp"63⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\6EBA.tmp"C:\Users\Admin\AppData\Local\Temp\6EBA.tmp"64⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\6F27.tmp"C:\Users\Admin\AppData\Local\Temp\6F27.tmp"65⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\6FB4.tmp"C:\Users\Admin\AppData\Local\Temp\6FB4.tmp"66⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\7031.tmp"C:\Users\Admin\AppData\Local\Temp\7031.tmp"67⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\707F.tmp"C:\Users\Admin\AppData\Local\Temp\707F.tmp"68⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\70EC.tmp"C:\Users\Admin\AppData\Local\Temp\70EC.tmp"69⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\7149.tmp"C:\Users\Admin\AppData\Local\Temp\7149.tmp"70⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\71C6.tmp"C:\Users\Admin\AppData\Local\Temp\71C6.tmp"71⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\7224.tmp"C:\Users\Admin\AppData\Local\Temp\7224.tmp"72⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\72A1.tmp"C:\Users\Admin\AppData\Local\Temp\72A1.tmp"73⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\731D.tmp"C:\Users\Admin\AppData\Local\Temp\731D.tmp"74⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\738B.tmp"C:\Users\Admin\AppData\Local\Temp\738B.tmp"75⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\7407.tmp"C:\Users\Admin\AppData\Local\Temp\7407.tmp"76⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\7484.tmp"C:\Users\Admin\AppData\Local\Temp\7484.tmp"77⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\74E2.tmp"C:\Users\Admin\AppData\Local\Temp\74E2.tmp"78⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\753F.tmp"C:\Users\Admin\AppData\Local\Temp\753F.tmp"79⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\759D.tmp"C:\Users\Admin\AppData\Local\Temp\759D.tmp"80⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\760A.tmp"C:\Users\Admin\AppData\Local\Temp\760A.tmp"81⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\7668.tmp"C:\Users\Admin\AppData\Local\Temp\7668.tmp"82⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\76E5.tmp"C:\Users\Admin\AppData\Local\Temp\76E5.tmp"83⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\7752.tmp"C:\Users\Admin\AppData\Local\Temp\7752.tmp"84⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\77AF.tmp"C:\Users\Admin\AppData\Local\Temp\77AF.tmp"85⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\781D.tmp"C:\Users\Admin\AppData\Local\Temp\781D.tmp"86⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\787A.tmp"C:\Users\Admin\AppData\Local\Temp\787A.tmp"87⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\78E7.tmp"C:\Users\Admin\AppData\Local\Temp\78E7.tmp"88⤵PID:956
-
C:\Users\Admin\AppData\Local\Temp\7955.tmp"C:\Users\Admin\AppData\Local\Temp\7955.tmp"89⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\79C2.tmp"C:\Users\Admin\AppData\Local\Temp\79C2.tmp"90⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\7A1F.tmp"C:\Users\Admin\AppData\Local\Temp\7A1F.tmp"91⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\7A8D.tmp"C:\Users\Admin\AppData\Local\Temp\7A8D.tmp"92⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\7AEA.tmp"C:\Users\Admin\AppData\Local\Temp\7AEA.tmp"93⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\7B57.tmp"C:\Users\Admin\AppData\Local\Temp\7B57.tmp"94⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\7BB5.tmp"C:\Users\Admin\AppData\Local\Temp\7BB5.tmp"95⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\7C22.tmp"C:\Users\Admin\AppData\Local\Temp\7C22.tmp"96⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\7C8F.tmp"C:\Users\Admin\AppData\Local\Temp\7C8F.tmp"97⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\7CFD.tmp"C:\Users\Admin\AppData\Local\Temp\7CFD.tmp"98⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\7D6A.tmp"C:\Users\Admin\AppData\Local\Temp\7D6A.tmp"99⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\7DD7.tmp"C:\Users\Admin\AppData\Local\Temp\7DD7.tmp"100⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\7E35.tmp"C:\Users\Admin\AppData\Local\Temp\7E35.tmp"101⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\7E83.tmp"C:\Users\Admin\AppData\Local\Temp\7E83.tmp"102⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\7EF0.tmp"C:\Users\Admin\AppData\Local\Temp\7EF0.tmp"103⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"C:\Users\Admin\AppData\Local\Temp\7FAB.tmp"104⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\8009.tmp"C:\Users\Admin\AppData\Local\Temp\8009.tmp"105⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\8085.tmp"C:\Users\Admin\AppData\Local\Temp\8085.tmp"106⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\80D3.tmp"C:\Users\Admin\AppData\Local\Temp\80D3.tmp"107⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\8112.tmp"C:\Users\Admin\AppData\Local\Temp\8112.tmp"108⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\816F.tmp"C:\Users\Admin\AppData\Local\Temp\816F.tmp"109⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\81CD.tmp"C:\Users\Admin\AppData\Local\Temp\81CD.tmp"110⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\821B.tmp"C:\Users\Admin\AppData\Local\Temp\821B.tmp"111⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\8269.tmp"C:\Users\Admin\AppData\Local\Temp\8269.tmp"112⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\82C7.tmp"C:\Users\Admin\AppData\Local\Temp\82C7.tmp"113⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\8353.tmp"C:\Users\Admin\AppData\Local\Temp\8353.tmp"114⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\840E.tmp"C:\Users\Admin\AppData\Local\Temp\840E.tmp"115⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\845C.tmp"C:\Users\Admin\AppData\Local\Temp\845C.tmp"116⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\84C9.tmp"C:\Users\Admin\AppData\Local\Temp\84C9.tmp"117⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\8527.tmp"C:\Users\Admin\AppData\Local\Temp\8527.tmp"118⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\8575.tmp"C:\Users\Admin\AppData\Local\Temp\8575.tmp"119⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\85E2.tmp"C:\Users\Admin\AppData\Local\Temp\85E2.tmp"120⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\8630.tmp"C:\Users\Admin\AppData\Local\Temp\8630.tmp"121⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\868E.tmp"C:\Users\Admin\AppData\Local\Temp\868E.tmp"122⤵PID:1780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-