Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
27/04/2024, 17:47 UTC
Static task
static1
Behavioral task
behavioral1
Sample
2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe
Resource
win10v2004-20240426-en
General
-
Target
2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe
-
Size
530KB
-
MD5
077f4e12c0c261773153be3b75c87a0e
-
SHA1
ec60e2f5e7c198d4431e51951a56a76d8b652830
-
SHA256
c06987673af26abc9c4ef59dad944f7ba9f64ac7a130c179cdfd29de8b6cca3e
-
SHA512
225b4cd7aca226a4c0e124b91a939d36d6bcc650fefd0ecb0c15451b55697f14ee9ac26c2e8578c6ad35efd0dec225eb72f1bc06dfca0b731d02f525f6e06d6a
-
SSDEEP
12288:AU5rCOTeio9dfVCd617w2T+z2f+sagNZulFVg0M1:AUQOJo91Vf17F+lMNclFV/M1
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2376 11FB.tmp 2332 1258.tmp 2540 12D5.tmp 2588 1333.tmp 2688 13B0.tmp 2572 140D.tmp 2696 146B.tmp 2640 14D8.tmp 2612 1536.tmp 2444 1593.tmp 2508 1600.tmp 2512 165E.tmp 1848 16CB.tmp 2776 1738.tmp 2784 1796.tmp 3064 17F4.tmp 2100 1861.tmp 764 18BE.tmp 1996 190C.tmp 1572 196A.tmp 2748 19D7.tmp 1816 1A35.tmp 1340 1A92.tmp 1332 1AD1.tmp 1704 1B0F.tmp 2280 1B4E.tmp 1980 1B9C.tmp 2428 1BDA.tmp 2216 1C18.tmp 2072 1C66.tmp 540 1CA5.tmp 656 1CF3.tmp 712 1D31.tmp 1480 1D7F.tmp 1900 1DBE.tmp 1808 1DFC.tmp 1684 1E3A.tmp 412 1E79.tmp 1288 1EB7.tmp 2004 1EF6.tmp 1776 1F34.tmp 1820 1F72.tmp 1368 1FB1.tmp 1660 1FFF.tmp 2988 203D.tmp 1308 207C.tmp 2016 20BA.tmp 1872 20F8.tmp 1864 2137.tmp 1676 2185.tmp 1672 21C3.tmp 832 2202.tmp 884 2240.tmp 1712 227E.tmp 2040 22BD.tmp 1616 22FB.tmp 2832 2349.tmp 2372 2388.tmp 2168 23D6.tmp 2192 2414.tmp 2552 2452.tmp 2540 24A0.tmp 2592 24DF.tmp 2692 252D.tmp -
Loads dropped DLL 64 IoCs
pid Process 1732 2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe 2376 11FB.tmp 2332 1258.tmp 2540 12D5.tmp 2588 1333.tmp 2688 13B0.tmp 2572 140D.tmp 2696 146B.tmp 2640 14D8.tmp 2612 1536.tmp 2444 1593.tmp 2508 1600.tmp 2512 165E.tmp 1848 16CB.tmp 2776 1738.tmp 2784 1796.tmp 3064 17F4.tmp 2100 1861.tmp 764 18BE.tmp 1996 190C.tmp 1572 196A.tmp 2748 19D7.tmp 1816 1A35.tmp 1340 1A92.tmp 1332 1AD1.tmp 1704 1B0F.tmp 2280 1B4E.tmp 1980 1B9C.tmp 2428 1BDA.tmp 2216 1C18.tmp 2072 1C66.tmp 540 1CA5.tmp 656 1CF3.tmp 712 1D31.tmp 1480 1D7F.tmp 1900 1DBE.tmp 1808 1DFC.tmp 1684 1E3A.tmp 412 1E79.tmp 1288 1EB7.tmp 2004 1EF6.tmp 1776 1F34.tmp 1820 1F72.tmp 1368 1FB1.tmp 1660 1FFF.tmp 2988 203D.tmp 1308 207C.tmp 2016 20BA.tmp 1872 20F8.tmp 1864 2137.tmp 1676 2185.tmp 1672 21C3.tmp 832 2202.tmp 884 2240.tmp 1712 227E.tmp 2040 22BD.tmp 1616 22FB.tmp 2832 2349.tmp 2372 2388.tmp 2168 23D6.tmp 2192 2414.tmp 2552 2452.tmp 2540 24A0.tmp 2592 24DF.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1732 wrote to memory of 2376 1732 2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe 28 PID 1732 wrote to memory of 2376 1732 2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe 28 PID 1732 wrote to memory of 2376 1732 2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe 28 PID 1732 wrote to memory of 2376 1732 2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe 28 PID 2376 wrote to memory of 2332 2376 11FB.tmp 29 PID 2376 wrote to memory of 2332 2376 11FB.tmp 29 PID 2376 wrote to memory of 2332 2376 11FB.tmp 29 PID 2376 wrote to memory of 2332 2376 11FB.tmp 29 PID 2332 wrote to memory of 2540 2332 1258.tmp 30 PID 2332 wrote to memory of 2540 2332 1258.tmp 30 PID 2332 wrote to memory of 2540 2332 1258.tmp 30 PID 2332 wrote to memory of 2540 2332 1258.tmp 30 PID 2540 wrote to memory of 2588 2540 12D5.tmp 31 PID 2540 wrote to memory of 2588 2540 12D5.tmp 31 PID 2540 wrote to memory of 2588 2540 12D5.tmp 31 PID 2540 wrote to memory of 2588 2540 12D5.tmp 31 PID 2588 wrote to memory of 2688 2588 1333.tmp 32 PID 2588 wrote to memory of 2688 2588 1333.tmp 32 PID 2588 wrote to memory of 2688 2588 1333.tmp 32 PID 2588 wrote to memory of 2688 2588 1333.tmp 32 PID 2688 wrote to memory of 2572 2688 13B0.tmp 33 PID 2688 wrote to memory of 2572 2688 13B0.tmp 33 PID 2688 wrote to memory of 2572 2688 13B0.tmp 33 PID 2688 wrote to memory of 2572 2688 13B0.tmp 33 PID 2572 wrote to memory of 2696 2572 140D.tmp 34 PID 2572 wrote to memory of 2696 2572 140D.tmp 34 PID 2572 wrote to memory of 2696 2572 140D.tmp 34 PID 2572 wrote to memory of 2696 2572 140D.tmp 34 PID 2696 wrote to memory of 2640 2696 146B.tmp 35 PID 2696 wrote to memory of 2640 2696 146B.tmp 35 PID 2696 wrote to memory of 2640 2696 146B.tmp 35 PID 2696 wrote to memory of 2640 2696 146B.tmp 35 PID 2640 wrote to memory of 2612 2640 14D8.tmp 36 PID 2640 wrote to memory of 2612 2640 14D8.tmp 36 PID 2640 wrote to memory of 2612 2640 14D8.tmp 36 PID 2640 wrote to memory of 2612 2640 14D8.tmp 36 PID 2612 wrote to memory of 2444 2612 1536.tmp 37 PID 2612 wrote to memory of 2444 2612 1536.tmp 37 PID 2612 wrote to memory of 2444 2612 1536.tmp 37 PID 2612 wrote to memory of 2444 2612 1536.tmp 37 PID 2444 wrote to memory of 2508 2444 1593.tmp 38 PID 2444 wrote to memory of 2508 2444 1593.tmp 38 PID 2444 wrote to memory of 2508 2444 1593.tmp 38 PID 2444 wrote to memory of 2508 2444 1593.tmp 38 PID 2508 wrote to memory of 2512 2508 1600.tmp 39 PID 2508 wrote to memory of 2512 2508 1600.tmp 39 PID 2508 wrote to memory of 2512 2508 1600.tmp 39 PID 2508 wrote to memory of 2512 2508 1600.tmp 39 PID 2512 wrote to memory of 1848 2512 165E.tmp 40 PID 2512 wrote to memory of 1848 2512 165E.tmp 40 PID 2512 wrote to memory of 1848 2512 165E.tmp 40 PID 2512 wrote to memory of 1848 2512 165E.tmp 40 PID 1848 wrote to memory of 2776 1848 16CB.tmp 41 PID 1848 wrote to memory of 2776 1848 16CB.tmp 41 PID 1848 wrote to memory of 2776 1848 16CB.tmp 41 PID 1848 wrote to memory of 2776 1848 16CB.tmp 41 PID 2776 wrote to memory of 2784 2776 1738.tmp 42 PID 2776 wrote to memory of 2784 2776 1738.tmp 42 PID 2776 wrote to memory of 2784 2776 1738.tmp 42 PID 2776 wrote to memory of 2784 2776 1738.tmp 42 PID 2784 wrote to memory of 3064 2784 1796.tmp 43 PID 2784 wrote to memory of 3064 2784 1796.tmp 43 PID 2784 wrote to memory of 3064 2784 1796.tmp 43 PID 2784 wrote to memory of 3064 2784 1796.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-04-27_077f4e12c0c261773153be3b75c87a0e_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\11FB.tmp"C:\Users\Admin\AppData\Local\Temp\11FB.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\1258.tmp"C:\Users\Admin\AppData\Local\Temp\1258.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\12D5.tmp"C:\Users\Admin\AppData\Local\Temp\12D5.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\1333.tmp"C:\Users\Admin\AppData\Local\Temp\1333.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\13B0.tmp"C:\Users\Admin\AppData\Local\Temp\13B0.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\140D.tmp"C:\Users\Admin\AppData\Local\Temp\140D.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\146B.tmp"C:\Users\Admin\AppData\Local\Temp\146B.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\1536.tmp"C:\Users\Admin\AppData\Local\Temp\1536.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\1600.tmp"C:\Users\Admin\AppData\Local\Temp\1600.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\16CB.tmp"C:\Users\Admin\AppData\Local\Temp\16CB.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\1738.tmp"C:\Users\Admin\AppData\Local\Temp\1738.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\1796.tmp"C:\Users\Admin\AppData\Local\Temp\1796.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\17F4.tmp"C:\Users\Admin\AppData\Local\Temp\17F4.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\1861.tmp"C:\Users\Admin\AppData\Local\Temp\1861.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\18BE.tmp"C:\Users\Admin\AppData\Local\Temp\18BE.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:764 -
C:\Users\Admin\AppData\Local\Temp\190C.tmp"C:\Users\Admin\AppData\Local\Temp\190C.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\196A.tmp"C:\Users\Admin\AppData\Local\Temp\196A.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\19D7.tmp"C:\Users\Admin\AppData\Local\Temp\19D7.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\1A35.tmp"C:\Users\Admin\AppData\Local\Temp\1A35.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\1A92.tmp"C:\Users\Admin\AppData\Local\Temp\1A92.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"C:\Users\Admin\AppData\Local\Temp\1B9C.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"C:\Users\Admin\AppData\Local\Temp\1BDA.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\1C18.tmp"C:\Users\Admin\AppData\Local\Temp\1C18.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"C:\Users\Admin\AppData\Local\Temp\1CF3.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Users\Admin\AppData\Local\Temp\1D31.tmp"C:\Users\Admin\AppData\Local\Temp\1D31.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:712 -
C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"C:\Users\Admin\AppData\Local\Temp\1D7F.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\1DBE.tmp"C:\Users\Admin\AppData\Local\Temp\1DBE.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"C:\Users\Admin\AppData\Local\Temp\1DFC.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"C:\Users\Admin\AppData\Local\Temp\1E3A.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\1E79.tmp"C:\Users\Admin\AppData\Local\Temp\1E79.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:412 -
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\1F34.tmp"C:\Users\Admin\AppData\Local\Temp\1F34.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\203D.tmp"C:\Users\Admin\AppData\Local\Temp\203D.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\207C.tmp"C:\Users\Admin\AppData\Local\Temp\207C.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\20F8.tmp"C:\Users\Admin\AppData\Local\Temp\20F8.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\2137.tmp"C:\Users\Admin\AppData\Local\Temp\2137.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\2202.tmp"C:\Users\Admin\AppData\Local\Temp\2202.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:832 -
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\22BD.tmp"C:\Users\Admin\AppData\Local\Temp\22BD.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\2349.tmp"C:\Users\Admin\AppData\Local\Temp\2349.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\23D6.tmp"C:\Users\Admin\AppData\Local\Temp\23D6.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\2414.tmp"C:\Users\Admin\AppData\Local\Temp\2414.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\2452.tmp"C:\Users\Admin\AppData\Local\Temp\2452.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\252D.tmp"C:\Users\Admin\AppData\Local\Temp\252D.tmp"65⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"66⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\25AA.tmp"C:\Users\Admin\AppData\Local\Temp\25AA.tmp"67⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\25E8.tmp"C:\Users\Admin\AppData\Local\Temp\25E8.tmp"68⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\2626.tmp"C:\Users\Admin\AppData\Local\Temp\2626.tmp"69⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2665.tmp"C:\Users\Admin\AppData\Local\Temp\2665.tmp"70⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\26A3.tmp"C:\Users\Admin\AppData\Local\Temp\26A3.tmp"71⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\26F1.tmp"C:\Users\Admin\AppData\Local\Temp\26F1.tmp"72⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\2730.tmp"C:\Users\Admin\AppData\Local\Temp\2730.tmp"73⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\276E.tmp"C:\Users\Admin\AppData\Local\Temp\276E.tmp"74⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\27AC.tmp"C:\Users\Admin\AppData\Local\Temp\27AC.tmp"75⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"76⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2829.tmp"C:\Users\Admin\AppData\Local\Temp\2829.tmp"77⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\2877.tmp"C:\Users\Admin\AppData\Local\Temp\2877.tmp"78⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"79⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"80⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"81⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"82⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"83⤵PID:612
-
C:\Users\Admin\AppData\Local\Temp\29EE.tmp"C:\Users\Admin\AppData\Local\Temp\29EE.tmp"84⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"85⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"86⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"87⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"88⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"89⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"90⤵PID:300
-
C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"C:\Users\Admin\AppData\Local\Temp\2BD1.tmp"91⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\2C10.tmp"C:\Users\Admin\AppData\Local\Temp\2C10.tmp"92⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"C:\Users\Admin\AppData\Local\Temp\2C4E.tmp"93⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"94⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"95⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"96⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"97⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"98⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"99⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\2E03.tmp"C:\Users\Admin\AppData\Local\Temp\2E03.tmp"100⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2E41.tmp"C:\Users\Admin\AppData\Local\Temp\2E41.tmp"101⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\2E80.tmp"C:\Users\Admin\AppData\Local\Temp\2E80.tmp"102⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"103⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\2EED.tmp"C:\Users\Admin\AppData\Local\Temp\2EED.tmp"104⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"C:\Users\Admin\AppData\Local\Temp\2F2B.tmp"105⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"C:\Users\Admin\AppData\Local\Temp\2F6A.tmp"106⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"C:\Users\Admin\AppData\Local\Temp\2FA8.tmp"107⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"C:\Users\Admin\AppData\Local\Temp\2FE6.tmp"108⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"109⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"110⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"111⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\30F0.tmp"C:\Users\Admin\AppData\Local\Temp\30F0.tmp"112⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\312E.tmp"C:\Users\Admin\AppData\Local\Temp\312E.tmp"113⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\316C.tmp"C:\Users\Admin\AppData\Local\Temp\316C.tmp"114⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\31AB.tmp"C:\Users\Admin\AppData\Local\Temp\31AB.tmp"115⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"116⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\3228.tmp"C:\Users\Admin\AppData\Local\Temp\3228.tmp"117⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3266.tmp"C:\Users\Admin\AppData\Local\Temp\3266.tmp"118⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\32B4.tmp"C:\Users\Admin\AppData\Local\Temp\32B4.tmp"119⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\32F2.tmp"C:\Users\Admin\AppData\Local\Temp\32F2.tmp"120⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"121⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\337F.tmp"C:\Users\Admin\AppData\Local\Temp\337F.tmp"122⤵PID:1788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-