Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05/03/2024, 11:06 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe
Resource
win10v2004-20240226-en
General
-
Target
2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe
-
Size
520KB
-
MD5
f77c15ccdcf9b061b947fb8eef908ed5
-
SHA1
7e9a9609efa599e8047f48fe83556484e125fcfa
-
SHA256
906d47de367ff3c11db91b4f30f2a8463a742d61fee4dabcdd35405d1f87e989
-
SHA512
19a1fad9285b824f7b2b344c44257a3d77cefc8fb2db08501d64800a51cfb3d82f74bd032182214c40b95c0e4fd9eab1402b0c31f24722c9e62b45540ed77954
-
SSDEEP
12288:gj8fuxR21t5i8f6HdZug4v7w420IK9jenkRsXNZ:gj8fuK1GYWAgghq6sXN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1708 1AA2.tmp 2212 1B2E.tmp 2224 1BEA.tmp 2612 1C76.tmp 1976 1D02.tmp 2640 1D9E.tmp 2592 1DFC.tmp 2704 1E98.tmp 2596 1F24.tmp 2608 1FB1.tmp 2484 203D.tmp 2480 20CA.tmp 2936 2156.tmp 1844 21F2.tmp 2820 226F.tmp 1588 230B.tmp 1500 2397.tmp 1308 2424.tmp 1964 24A0.tmp 2928 252D.tmp 2752 25C9.tmp 2948 2665.tmp 2932 26D2.tmp 1188 2710.tmp 2120 274F.tmp 2000 279D.tmp 2264 27EB.tmp 1948 2829.tmp 1820 2868.tmp 2092 28B6.tmp 540 28F4.tmp 576 2942.tmp 1380 2990.tmp 1740 29CE.tmp 1816 2A0D.tmp 788 2A4B.tmp 656 2A8A.tmp 2380 2AC8.tmp 3052 2B16.tmp 2272 2B54.tmp 1344 2B93.tmp 1532 2BE1.tmp 1340 2C2F.tmp 948 2C6D.tmp 1984 2CAC.tmp 772 2CFA.tmp 1916 2D48.tmp 1516 2D96.tmp 2044 2DE4.tmp 560 2E32.tmp 2908 2E9F.tmp 3036 2EDD.tmp 1756 2F2B.tmp 3032 2F6A.tmp 3004 2FB8.tmp 1584 3006.tmp 1828 3044.tmp 2356 3092.tmp 2392 30E0.tmp 1648 311E.tmp 2192 315D.tmp 1692 31AB.tmp 2144 31F9.tmp 2544 3247.tmp -
Loads dropped DLL 64 IoCs
pid Process 2300 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 1708 1AA2.tmp 2212 1B2E.tmp 2224 1BEA.tmp 2612 1C76.tmp 1976 1D02.tmp 2640 1D9E.tmp 2592 1DFC.tmp 2704 1E98.tmp 2596 1F24.tmp 2608 1FB1.tmp 2484 203D.tmp 2480 20CA.tmp 2936 2156.tmp 1844 21F2.tmp 2820 226F.tmp 1588 230B.tmp 1500 2397.tmp 1308 2424.tmp 1964 24A0.tmp 2928 252D.tmp 2752 25C9.tmp 2948 2665.tmp 2932 26D2.tmp 1188 2710.tmp 2120 274F.tmp 2000 279D.tmp 2264 27EB.tmp 1948 2829.tmp 1820 2868.tmp 2092 28B6.tmp 540 28F4.tmp 576 2942.tmp 1380 2990.tmp 1740 29CE.tmp 1816 2A0D.tmp 788 2A4B.tmp 656 2A8A.tmp 2380 2AC8.tmp 3052 2B16.tmp 2272 2B54.tmp 1344 2B93.tmp 1532 2BE1.tmp 1340 2C2F.tmp 948 2C6D.tmp 1984 2CAC.tmp 772 2CFA.tmp 1916 2D48.tmp 1516 2D96.tmp 2044 2DE4.tmp 560 2E32.tmp 2908 2E9F.tmp 3036 2EDD.tmp 1756 2F2B.tmp 3032 2F6A.tmp 3004 2FB8.tmp 1584 3006.tmp 1828 3044.tmp 2356 3092.tmp 2392 30E0.tmp 1648 311E.tmp 2192 315D.tmp 1692 31AB.tmp 2144 31F9.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2300 wrote to memory of 1708 2300 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 28 PID 2300 wrote to memory of 1708 2300 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 28 PID 2300 wrote to memory of 1708 2300 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 28 PID 2300 wrote to memory of 1708 2300 2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe 28 PID 1708 wrote to memory of 2212 1708 1AA2.tmp 29 PID 1708 wrote to memory of 2212 1708 1AA2.tmp 29 PID 1708 wrote to memory of 2212 1708 1AA2.tmp 29 PID 1708 wrote to memory of 2212 1708 1AA2.tmp 29 PID 2212 wrote to memory of 2224 2212 1B2E.tmp 30 PID 2212 wrote to memory of 2224 2212 1B2E.tmp 30 PID 2212 wrote to memory of 2224 2212 1B2E.tmp 30 PID 2212 wrote to memory of 2224 2212 1B2E.tmp 30 PID 2224 wrote to memory of 2612 2224 1BEA.tmp 31 PID 2224 wrote to memory of 2612 2224 1BEA.tmp 31 PID 2224 wrote to memory of 2612 2224 1BEA.tmp 31 PID 2224 wrote to memory of 2612 2224 1BEA.tmp 31 PID 2612 wrote to memory of 1976 2612 1C76.tmp 32 PID 2612 wrote to memory of 1976 2612 1C76.tmp 32 PID 2612 wrote to memory of 1976 2612 1C76.tmp 32 PID 2612 wrote to memory of 1976 2612 1C76.tmp 32 PID 1976 wrote to memory of 2640 1976 1D02.tmp 33 PID 1976 wrote to memory of 2640 1976 1D02.tmp 33 PID 1976 wrote to memory of 2640 1976 1D02.tmp 33 PID 1976 wrote to memory of 2640 1976 1D02.tmp 33 PID 2640 wrote to memory of 2592 2640 1D9E.tmp 34 PID 2640 wrote to memory of 2592 2640 1D9E.tmp 34 PID 2640 wrote to memory of 2592 2640 1D9E.tmp 34 PID 2640 wrote to memory of 2592 2640 1D9E.tmp 34 PID 2592 wrote to memory of 2704 2592 1DFC.tmp 35 PID 2592 wrote to memory of 2704 2592 1DFC.tmp 35 PID 2592 wrote to memory of 2704 2592 1DFC.tmp 35 PID 2592 wrote to memory of 2704 2592 1DFC.tmp 35 PID 2704 wrote to memory of 2596 2704 1E98.tmp 36 PID 2704 wrote to memory of 2596 2704 1E98.tmp 36 PID 2704 wrote to memory of 2596 2704 1E98.tmp 36 PID 2704 wrote to memory of 2596 2704 1E98.tmp 36 PID 2596 wrote to memory of 2608 2596 1F24.tmp 37 PID 2596 wrote to memory of 2608 2596 1F24.tmp 37 PID 2596 wrote to memory of 2608 2596 1F24.tmp 37 PID 2596 wrote to memory of 2608 2596 1F24.tmp 37 PID 2608 wrote to memory of 2484 2608 1FB1.tmp 38 PID 2608 wrote to memory of 2484 2608 1FB1.tmp 38 PID 2608 wrote to memory of 2484 2608 1FB1.tmp 38 PID 2608 wrote to memory of 2484 2608 1FB1.tmp 38 PID 2484 wrote to memory of 2480 2484 203D.tmp 39 PID 2484 wrote to memory of 2480 2484 203D.tmp 39 PID 2484 wrote to memory of 2480 2484 203D.tmp 39 PID 2484 wrote to memory of 2480 2484 203D.tmp 39 PID 2480 wrote to memory of 2936 2480 20CA.tmp 40 PID 2480 wrote to memory of 2936 2480 20CA.tmp 40 PID 2480 wrote to memory of 2936 2480 20CA.tmp 40 PID 2480 wrote to memory of 2936 2480 20CA.tmp 40 PID 2936 wrote to memory of 1844 2936 2156.tmp 41 PID 2936 wrote to memory of 1844 2936 2156.tmp 41 PID 2936 wrote to memory of 1844 2936 2156.tmp 41 PID 2936 wrote to memory of 1844 2936 2156.tmp 41 PID 1844 wrote to memory of 2820 1844 21F2.tmp 42 PID 1844 wrote to memory of 2820 1844 21F2.tmp 42 PID 1844 wrote to memory of 2820 1844 21F2.tmp 42 PID 1844 wrote to memory of 2820 1844 21F2.tmp 42 PID 2820 wrote to memory of 1588 2820 226F.tmp 43 PID 2820 wrote to memory of 1588 2820 226F.tmp 43 PID 2820 wrote to memory of 1588 2820 226F.tmp 43 PID 2820 wrote to memory of 1588 2820 226F.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-05_f77c15ccdcf9b061b947fb8eef908ed5_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"C:\Users\Admin\AppData\Local\Temp\1AA2.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\1C76.tmp"C:\Users\Admin\AppData\Local\Temp\1C76.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\1D02.tmp"C:\Users\Admin\AppData\Local\Temp\1D02.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\1D9E.tmp"C:\Users\Admin\AppData\Local\Temp\1D9E.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\1E98.tmp"C:\Users\Admin\AppData\Local\Temp\1E98.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\1F24.tmp"C:\Users\Admin\AppData\Local\Temp\1F24.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\203D.tmp"C:\Users\Admin\AppData\Local\Temp\203D.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\20CA.tmp"C:\Users\Admin\AppData\Local\Temp\20CA.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\2156.tmp"C:\Users\Admin\AppData\Local\Temp\2156.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\21F2.tmp"C:\Users\Admin\AppData\Local\Temp\21F2.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\226F.tmp"C:\Users\Admin\AppData\Local\Temp\226F.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\230B.tmp"C:\Users\Admin\AppData\Local\Temp\230B.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\2397.tmp"C:\Users\Admin\AppData\Local\Temp\2397.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\2424.tmp"C:\Users\Admin\AppData\Local\Temp\2424.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\252D.tmp"C:\Users\Admin\AppData\Local\Temp\252D.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\279D.tmp"C:\Users\Admin\AppData\Local\Temp\279D.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\2829.tmp"C:\Users\Admin\AppData\Local\Temp\2829.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\2868.tmp"C:\Users\Admin\AppData\Local\Temp\2868.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Users\Admin\AppData\Local\Temp\2942.tmp"C:\Users\Admin\AppData\Local\Temp\2942.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:576 -
C:\Users\Admin\AppData\Local\Temp\2990.tmp"C:\Users\Admin\AppData\Local\Temp\2990.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\29CE.tmp"C:\Users\Admin\AppData\Local\Temp\29CE.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:788 -
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\2B16.tmp"C:\Users\Admin\AppData\Local\Temp\2B16.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\2B54.tmp"C:\Users\Admin\AppData\Local\Temp\2B54.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\2B93.tmp"C:\Users\Admin\AppData\Local\Temp\2B93.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"C:\Users\Admin\AppData\Local\Temp\2BE1.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"C:\Users\Admin\AppData\Local\Temp\2C2F.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"C:\Users\Admin\AppData\Local\Temp\2C6D.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:948 -
C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"C:\Users\Admin\AppData\Local\Temp\2CAC.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:772 -
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\2D96.tmp"C:\Users\Admin\AppData\Local\Temp\2D96.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\2DE4.tmp"C:\Users\Admin\AppData\Local\Temp\2DE4.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\3006.tmp"C:\Users\Admin\AppData\Local\Temp\3006.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\3044.tmp"C:\Users\Admin\AppData\Local\Temp\3044.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\3092.tmp"C:\Users\Admin\AppData\Local\Temp\3092.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\30E0.tmp"C:\Users\Admin\AppData\Local\Temp\30E0.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\311E.tmp"C:\Users\Admin\AppData\Local\Temp\311E.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\315D.tmp"C:\Users\Admin\AppData\Local\Temp\315D.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\31AB.tmp"C:\Users\Admin\AppData\Local\Temp\31AB.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\31F9.tmp"C:\Users\Admin\AppData\Local\Temp\31F9.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"65⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"66⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"67⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\3312.tmp"C:\Users\Admin\AppData\Local\Temp\3312.tmp"68⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\3360.tmp"C:\Users\Admin\AppData\Local\Temp\3360.tmp"69⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\33AE.tmp"C:\Users\Admin\AppData\Local\Temp\33AE.tmp"70⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\33EC.tmp"C:\Users\Admin\AppData\Local\Temp\33EC.tmp"71⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\342A.tmp"C:\Users\Admin\AppData\Local\Temp\342A.tmp"72⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"73⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\34B7.tmp"C:\Users\Admin\AppData\Local\Temp\34B7.tmp"74⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\34F5.tmp"C:\Users\Admin\AppData\Local\Temp\34F5.tmp"75⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\3534.tmp"C:\Users\Admin\AppData\Local\Temp\3534.tmp"76⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\3572.tmp"C:\Users\Admin\AppData\Local\Temp\3572.tmp"77⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\35B0.tmp"C:\Users\Admin\AppData\Local\Temp\35B0.tmp"78⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\35EF.tmp"C:\Users\Admin\AppData\Local\Temp\35EF.tmp"79⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\363D.tmp"C:\Users\Admin\AppData\Local\Temp\363D.tmp"80⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\367B.tmp"C:\Users\Admin\AppData\Local\Temp\367B.tmp"81⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"82⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\3717.tmp"C:\Users\Admin\AppData\Local\Temp\3717.tmp"83⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\3765.tmp"C:\Users\Admin\AppData\Local\Temp\3765.tmp"84⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\37A4.tmp"C:\Users\Admin\AppData\Local\Temp\37A4.tmp"85⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\37F2.tmp"C:\Users\Admin\AppData\Local\Temp\37F2.tmp"86⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\3830.tmp"C:\Users\Admin\AppData\Local\Temp\3830.tmp"87⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"88⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\38CC.tmp"C:\Users\Admin\AppData\Local\Temp\38CC.tmp"89⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\391A.tmp"C:\Users\Admin\AppData\Local\Temp\391A.tmp"90⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3958.tmp"C:\Users\Admin\AppData\Local\Temp\3958.tmp"91⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3997.tmp"C:\Users\Admin\AppData\Local\Temp\3997.tmp"92⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\39D5.tmp"C:\Users\Admin\AppData\Local\Temp\39D5.tmp"93⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\3A23.tmp"C:\Users\Admin\AppData\Local\Temp\3A23.tmp"94⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\3A62.tmp"C:\Users\Admin\AppData\Local\Temp\3A62.tmp"95⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\3AA0.tmp"C:\Users\Admin\AppData\Local\Temp\3AA0.tmp"96⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"C:\Users\Admin\AppData\Local\Temp\3ADE.tmp"97⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"98⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\3B6B.tmp"C:\Users\Admin\AppData\Local\Temp\3B6B.tmp"99⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"100⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"C:\Users\Admin\AppData\Local\Temp\3BF7.tmp"101⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3C45.tmp"C:\Users\Admin\AppData\Local\Temp\3C45.tmp"102⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\3C84.tmp"C:\Users\Admin\AppData\Local\Temp\3C84.tmp"103⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3CD2.tmp"C:\Users\Admin\AppData\Local\Temp\3CD2.tmp"104⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\3D20.tmp"C:\Users\Admin\AppData\Local\Temp\3D20.tmp"105⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\3D5E.tmp"C:\Users\Admin\AppData\Local\Temp\3D5E.tmp"106⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"C:\Users\Admin\AppData\Local\Temp\3D9C.tmp"107⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"C:\Users\Admin\AppData\Local\Temp\3DDB.tmp"108⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\3E19.tmp"C:\Users\Admin\AppData\Local\Temp\3E19.tmp"109⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3E67.tmp"C:\Users\Admin\AppData\Local\Temp\3E67.tmp"110⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"111⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"C:\Users\Admin\AppData\Local\Temp\3EF4.tmp"112⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"113⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\3F80.tmp"C:\Users\Admin\AppData\Local\Temp\3F80.tmp"114⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"115⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\400C.tmp"C:\Users\Admin\AppData\Local\Temp\400C.tmp"116⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\405A.tmp"C:\Users\Admin\AppData\Local\Temp\405A.tmp"117⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\40B8.tmp"C:\Users\Admin\AppData\Local\Temp\40B8.tmp"118⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\40F6.tmp"C:\Users\Admin\AppData\Local\Temp\40F6.tmp"119⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\4135.tmp"C:\Users\Admin\AppData\Local\Temp\4135.tmp"120⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\4183.tmp"C:\Users\Admin\AppData\Local\Temp\4183.tmp"121⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\41D1.tmp"C:\Users\Admin\AppData\Local\Temp\41D1.tmp"122⤵PID:3036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-