Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04/02/2024, 12:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe
Resource
win7-20231215-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe
-
Size
486KB
-
MD5
2a7c6b0c261eea6ccb9b47e0ee8666bd
-
SHA1
503a4d474e482d26e8a4be4e45986d6b2491e054
-
SHA256
b69d200a69d00d5d25a6d04a7315bade7f8cd57d2ee466649efbbfad868c62ac
-
SHA512
4eb1e2980abb754fd41cec0399f791b1855f79b810542df02fb6c5e4f82cfb3775ddacc26ce86cb58a5397c006860852cc532586546eac1d434dff83f6ba6bd6
-
SSDEEP
12288:/U5rCOTeiDQOiRSKab5/Z7wECPcFC1jusNZ:/UQOJD0SZ3u/rN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1592 1813.tmp 1648 1870.tmp 2764 18AF.tmp 2720 190C.tmp 2572 194B.tmp 2600 1999.tmp 2728 19E7.tmp 2516 1A25.tmp 2628 1A73.tmp 3052 1AB2.tmp 2456 1AF0.tmp 1596 1B3E.tmp 1940 1B7C.tmp 2800 1BBB.tmp 1268 1BF9.tmp 1620 1C47.tmp 1924 1C86.tmp 1260 1D02.tmp 1752 1D50.tmp 2460 1D8F.tmp 1060 1DCD.tmp 2212 1E0C.tmp 3024 1E3A.tmp 2208 1E79.tmp 2256 1EB7.tmp 1860 2E32.tmp 2408 1F34.tmp 540 1F72.tmp 268 2F0C.tmp 2784 1FEF.tmp 1324 202E.tmp 1804 207C.tmp 1764 20BA.tmp 2536 20F8.tmp 3068 2127.tmp 1600 2166.tmp 2272 2194.tmp 2324 21D3.tmp 1272 2211.tmp 1484 2250.tmp 960 228E.tmp 1816 22CC.tmp 1952 230B.tmp 1960 2349.tmp 2400 2388.tmp 1652 23C6.tmp 3028 23F5.tmp 3040 2433.tmp 2840 2472.tmp 2968 24B0.tmp 628 24DF.tmp 2916 251D.tmp 1888 255C.tmp 2072 259A.tmp 2060 25D8.tmp 3060 2617.tmp 2672 2655.tmp 2812 2694.tmp 2712 26D2.tmp 2772 2710.tmp 2932 274F.tmp 2740 278D.tmp 2756 27CC.tmp 2600 1999.tmp -
Loads dropped DLL 64 IoCs
pid Process 1448 2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe 1592 1813.tmp 1648 1870.tmp 2764 18AF.tmp 2720 190C.tmp 2572 194B.tmp 2600 1999.tmp 2728 19E7.tmp 2516 1A25.tmp 2628 1A73.tmp 3052 1AB2.tmp 2456 1AF0.tmp 1596 1B3E.tmp 1940 1B7C.tmp 2800 1BBB.tmp 1268 1BF9.tmp 1620 1C47.tmp 1924 1C86.tmp 1260 1D02.tmp 1752 1D50.tmp 2460 1D8F.tmp 1060 1DCD.tmp 2212 1E0C.tmp 3024 1E3A.tmp 2208 1E79.tmp 2256 1EB7.tmp 1860 2E32.tmp 2408 1F34.tmp 540 1F72.tmp 268 2F0C.tmp 2784 1FEF.tmp 1324 202E.tmp 1804 207C.tmp 1764 20BA.tmp 2536 20F8.tmp 3068 2127.tmp 1600 2166.tmp 2272 2194.tmp 2324 21D3.tmp 1272 2211.tmp 1484 32C4.tmp 960 228E.tmp 1816 22CC.tmp 1952 230B.tmp 1960 2349.tmp 2400 2388.tmp 1652 23C6.tmp 3028 23F5.tmp 3040 2433.tmp 2840 2472.tmp 2968 24B0.tmp 628 24DF.tmp 2916 251D.tmp 1888 255C.tmp 2072 259A.tmp 2060 25D8.tmp 3060 2617.tmp 2672 2655.tmp 2812 2694.tmp 2712 26D2.tmp 2772 2710.tmp 2932 274F.tmp 2740 278D.tmp 2756 27CC.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1592 1448 2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe 28 PID 1448 wrote to memory of 1592 1448 2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe 28 PID 1448 wrote to memory of 1592 1448 2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe 28 PID 1448 wrote to memory of 1592 1448 2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe 28 PID 1592 wrote to memory of 1648 1592 1813.tmp 30 PID 1592 wrote to memory of 1648 1592 1813.tmp 30 PID 1592 wrote to memory of 1648 1592 1813.tmp 30 PID 1592 wrote to memory of 1648 1592 1813.tmp 30 PID 1648 wrote to memory of 2764 1648 1870.tmp 29 PID 1648 wrote to memory of 2764 1648 1870.tmp 29 PID 1648 wrote to memory of 2764 1648 1870.tmp 29 PID 1648 wrote to memory of 2764 1648 1870.tmp 29 PID 2764 wrote to memory of 2720 2764 18AF.tmp 128 PID 2764 wrote to memory of 2720 2764 18AF.tmp 128 PID 2764 wrote to memory of 2720 2764 18AF.tmp 128 PID 2764 wrote to memory of 2720 2764 18AF.tmp 128 PID 2720 wrote to memory of 2572 2720 190C.tmp 127 PID 2720 wrote to memory of 2572 2720 190C.tmp 127 PID 2720 wrote to memory of 2572 2720 190C.tmp 127 PID 2720 wrote to memory of 2572 2720 190C.tmp 127 PID 2572 wrote to memory of 2600 2572 194B.tmp 126 PID 2572 wrote to memory of 2600 2572 194B.tmp 126 PID 2572 wrote to memory of 2600 2572 194B.tmp 126 PID 2572 wrote to memory of 2600 2572 194B.tmp 126 PID 2600 wrote to memory of 2728 2600 1999.tmp 125 PID 2600 wrote to memory of 2728 2600 1999.tmp 125 PID 2600 wrote to memory of 2728 2600 1999.tmp 125 PID 2600 wrote to memory of 2728 2600 1999.tmp 125 PID 2728 wrote to memory of 2516 2728 19E7.tmp 124 PID 2728 wrote to memory of 2516 2728 19E7.tmp 124 PID 2728 wrote to memory of 2516 2728 19E7.tmp 124 PID 2728 wrote to memory of 2516 2728 19E7.tmp 124 PID 2516 wrote to memory of 2628 2516 1A25.tmp 123 PID 2516 wrote to memory of 2628 2516 1A25.tmp 123 PID 2516 wrote to memory of 2628 2516 1A25.tmp 123 PID 2516 wrote to memory of 2628 2516 1A25.tmp 123 PID 2628 wrote to memory of 3052 2628 1A73.tmp 122 PID 2628 wrote to memory of 3052 2628 1A73.tmp 122 PID 2628 wrote to memory of 3052 2628 1A73.tmp 122 PID 2628 wrote to memory of 3052 2628 1A73.tmp 122 PID 3052 wrote to memory of 2456 3052 1AB2.tmp 121 PID 3052 wrote to memory of 2456 3052 1AB2.tmp 121 PID 3052 wrote to memory of 2456 3052 1AB2.tmp 121 PID 3052 wrote to memory of 2456 3052 1AB2.tmp 121 PID 2456 wrote to memory of 1596 2456 1AF0.tmp 120 PID 2456 wrote to memory of 1596 2456 1AF0.tmp 120 PID 2456 wrote to memory of 1596 2456 1AF0.tmp 120 PID 2456 wrote to memory of 1596 2456 1AF0.tmp 120 PID 1596 wrote to memory of 1940 1596 1B3E.tmp 119 PID 1596 wrote to memory of 1940 1596 1B3E.tmp 119 PID 1596 wrote to memory of 1940 1596 1B3E.tmp 119 PID 1596 wrote to memory of 1940 1596 1B3E.tmp 119 PID 1940 wrote to memory of 2800 1940 1B7C.tmp 118 PID 1940 wrote to memory of 2800 1940 1B7C.tmp 118 PID 1940 wrote to memory of 2800 1940 1B7C.tmp 118 PID 1940 wrote to memory of 2800 1940 1B7C.tmp 118 PID 2800 wrote to memory of 1268 2800 1BBB.tmp 117 PID 2800 wrote to memory of 1268 2800 1BBB.tmp 117 PID 2800 wrote to memory of 1268 2800 1BBB.tmp 117 PID 2800 wrote to memory of 1268 2800 1BBB.tmp 117 PID 1268 wrote to memory of 1620 1268 1BF9.tmp 116 PID 1268 wrote to memory of 1620 1268 1BF9.tmp 116 PID 1268 wrote to memory of 1620 1268 1BF9.tmp 116 PID 1268 wrote to memory of 1620 1268 1BF9.tmp 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-04_2a7c6b0c261eea6ccb9b47e0ee8666bd_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\1813.tmp"C:\Users\Admin\AppData\Local\Temp\1813.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\1870.tmp"C:\Users\Admin\AppData\Local\Temp\1870.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1648
-
-
-
C:\Users\Admin\AppData\Local\Temp\18AF.tmp"C:\Users\Admin\AppData\Local\Temp\18AF.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\190C.tmp"C:\Users\Admin\AppData\Local\Temp\190C.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"C:\Users\Admin\AppData\Local\Temp\1EB7.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"C:\Users\Admin\AppData\Local\Temp\1EF6.tmp"2⤵PID:1860
-
-
C:\Users\Admin\AppData\Local\Temp\1F72.tmp"C:\Users\Admin\AppData\Local\Temp\1F72.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:540 -
C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"C:\Users\Admin\AppData\Local\Temp\1FB1.tmp"2⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"C:\Users\Admin\AppData\Local\Temp\1FEF.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\202E.tmp"C:\Users\Admin\AppData\Local\Temp\202E.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\207C.tmp"C:\Users\Admin\AppData\Local\Temp\207C.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"3⤵PID:576
-
-
-
C:\Users\Admin\AppData\Local\Temp\1F34.tmp"C:\Users\Admin\AppData\Local\Temp\1F34.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2408
-
C:\Users\Admin\AppData\Local\Temp\20BA.tmp"C:\Users\Admin\AppData\Local\Temp\20BA.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\20F8.tmp"C:\Users\Admin\AppData\Local\Temp\20F8.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2536
-
-
C:\Users\Admin\AppData\Local\Temp\2194.tmp"C:\Users\Admin\AppData\Local\Temp\2194.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\21D3.tmp"C:\Users\Admin\AppData\Local\Temp\21D3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\2250.tmp"C:\Users\Admin\AppData\Local\Temp\2250.tmp"1⤵
- Executes dropped EXE
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:960 -
C:\Users\Admin\AppData\Local\Temp\22CC.tmp"C:\Users\Admin\AppData\Local\Temp\22CC.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816
-
-
-
C:\Users\Admin\AppData\Local\Temp\2349.tmp"C:\Users\Admin\AppData\Local\Temp\2349.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\2388.tmp"C:\Users\Admin\AppData\Local\Temp\2388.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\23C6.tmp"C:\Users\Admin\AppData\Local\Temp\23C6.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652
-
-
-
C:\Users\Admin\AppData\Local\Temp\230B.tmp"C:\Users\Admin\AppData\Local\Temp\230B.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952
-
C:\Users\Admin\AppData\Local\Temp\23F5.tmp"C:\Users\Admin\AppData\Local\Temp\23F5.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\2433.tmp"C:\Users\Admin\AppData\Local\Temp\2433.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\2472.tmp"C:\Users\Admin\AppData\Local\Temp\2472.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\24B0.tmp"C:\Users\Admin\AppData\Local\Temp\24B0.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\255C.tmp"C:\Users\Admin\AppData\Local\Temp\255C.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\259A.tmp"C:\Users\Admin\AppData\Local\Temp\259A.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\25D8.tmp"C:\Users\Admin\AppData\Local\Temp\25D8.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\2617.tmp"C:\Users\Admin\AppData\Local\Temp\2617.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\2694.tmp"C:\Users\Admin\AppData\Local\Temp\2694.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\26D2.tmp"C:\Users\Admin\AppData\Local\Temp\26D2.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712
-
-
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\274F.tmp"C:\Users\Admin\AppData\Local\Temp\274F.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\278D.tmp"C:\Users\Admin\AppData\Local\Temp\278D.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\280A.tmp"C:\Users\Admin\AppData\Local\Temp\280A.tmp"1⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\2848.tmp"C:\Users\Admin\AppData\Local\Temp\2848.tmp"2⤵PID:2728
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"3⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"4⤵PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\1A25.tmp"C:\Users\Admin\AppData\Local\Temp\1A25.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728
-
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"1⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"2⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"3⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\1B3E.tmp"C:\Users\Admin\AppData\Local\Temp\1B3E.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"C:\Users\Admin\AppData\Local\Temp\2A2C.tmp"1⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"C:\Users\Admin\AppData\Local\Temp\2A6A.tmp"2⤵PID:2608
-
-
C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"C:\Users\Admin\AppData\Local\Temp\2AA9.tmp"1⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"C:\Users\Admin\AppData\Local\Temp\2AE7.tmp"2⤵PID:2664
-
-
C:\Users\Admin\AppData\Local\Temp\1BF9.tmp"C:\Users\Admin\AppData\Local\Temp\1BF9.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1268
-
-
C:\Users\Admin\AppData\Local\Temp\2B54.tmp"C:\Users\Admin\AppData\Local\Temp\2B54.tmp"1⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2B93.tmp"C:\Users\Admin\AppData\Local\Temp\2B93.tmp"2⤵PID:2016
-
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"1⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"2⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"1⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"2⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"3⤵PID:2632
-
-
-
C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"1⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\2D76.tmp"C:\Users\Admin\AppData\Local\Temp\2D76.tmp"1⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"2⤵PID:2896
-
-
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\2E70.tmp"C:\Users\Admin\AppData\Local\Temp\2E70.tmp"2⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"C:\Users\Admin\AppData\Local\Temp\2E9F.tmp"3⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"C:\Users\Admin\AppData\Local\Temp\2EDD.tmp"4⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"C:\Users\Admin\AppData\Local\Temp\2F0C.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:268
-
-
C:\Users\Admin\AppData\Local\Temp\82C7.tmp"C:\Users\Admin\AppData\Local\Temp\82C7.tmp"5⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\82F5.tmp"C:\Users\Admin\AppData\Local\Temp\82F5.tmp"6⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\8334.tmp"C:\Users\Admin\AppData\Local\Temp\8334.tmp"7⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\8363.tmp"C:\Users\Admin\AppData\Local\Temp\8363.tmp"8⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\83A1.tmp"C:\Users\Admin\AppData\Local\Temp\83A1.tmp"9⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\83DF.tmp"C:\Users\Admin\AppData\Local\Temp\83DF.tmp"10⤵PID:964
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"1⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"1⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"2⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"3⤵PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"1⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3073.tmp"C:\Users\Admin\AppData\Local\Temp\3073.tmp"2⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\30B1.tmp"C:\Users\Admin\AppData\Local\Temp\30B1.tmp"3⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\30F0.tmp"C:\Users\Admin\AppData\Local\Temp\30F0.tmp"4⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\311E.tmp"C:\Users\Admin\AppData\Local\Temp\311E.tmp"5⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\319B.tmp"C:\Users\Admin\AppData\Local\Temp\319B.tmp"6⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\31E9.tmp"C:\Users\Admin\AppData\Local\Temp\31E9.tmp"7⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"8⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"9⤵
- Loads dropped DLL
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3321.tmp"C:\Users\Admin\AppData\Local\Temp\3321.tmp"10⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\33CD.tmp"C:\Users\Admin\AppData\Local\Temp\33CD.tmp"11⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3469.tmp"C:\Users\Admin\AppData\Local\Temp\3469.tmp"12⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\34C6.tmp"C:\Users\Admin\AppData\Local\Temp\34C6.tmp"13⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\3572.tmp"C:\Users\Admin\AppData\Local\Temp\3572.tmp"14⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\35FE.tmp"C:\Users\Admin\AppData\Local\Temp\35FE.tmp"15⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\364C.tmp"C:\Users\Admin\AppData\Local\Temp\364C.tmp"16⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\368B.tmp"C:\Users\Admin\AppData\Local\Temp\368B.tmp"17⤵PID:340
-
C:\Users\Admin\AppData\Local\Temp\36C9.tmp"C:\Users\Admin\AppData\Local\Temp\36C9.tmp"18⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3708.tmp"C:\Users\Admin\AppData\Local\Temp\3708.tmp"19⤵PID:292
-
C:\Users\Admin\AppData\Local\Temp\3746.tmp"C:\Users\Admin\AppData\Local\Temp\3746.tmp"20⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\3784.tmp"C:\Users\Admin\AppData\Local\Temp\3784.tmp"21⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\37C3.tmp"C:\Users\Admin\AppData\Local\Temp\37C3.tmp"22⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\3801.tmp"C:\Users\Admin\AppData\Local\Temp\3801.tmp"23⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3840.tmp"C:\Users\Admin\AppData\Local\Temp\3840.tmp"24⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\387E.tmp"C:\Users\Admin\AppData\Local\Temp\387E.tmp"25⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\38BC.tmp"C:\Users\Admin\AppData\Local\Temp\38BC.tmp"26⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\38FB.tmp"C:\Users\Admin\AppData\Local\Temp\38FB.tmp"27⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3939.tmp"C:\Users\Admin\AppData\Local\Temp\3939.tmp"28⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3978.tmp"C:\Users\Admin\AppData\Local\Temp\3978.tmp"29⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\39B6.tmp"C:\Users\Admin\AppData\Local\Temp\39B6.tmp"30⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\39F4.tmp"C:\Users\Admin\AppData\Local\Temp\39F4.tmp"31⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\3A33.tmp"C:\Users\Admin\AppData\Local\Temp\3A33.tmp"32⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\3A71.tmp"C:\Users\Admin\AppData\Local\Temp\3A71.tmp"33⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"C:\Users\Admin\AppData\Local\Temp\3AB0.tmp"34⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3AEE.tmp"C:\Users\Admin\AppData\Local\Temp\3AEE.tmp"35⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"C:\Users\Admin\AppData\Local\Temp\3B2C.tmp"36⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3B6B.tmp"C:\Users\Admin\AppData\Local\Temp\3B6B.tmp"37⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"C:\Users\Admin\AppData\Local\Temp\3BA9.tmp"38⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"C:\Users\Admin\AppData\Local\Temp\3BE8.tmp"39⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3C26.tmp"C:\Users\Admin\AppData\Local\Temp\3C26.tmp"40⤵PID:2552
-
C:\Users\Admin\AppData\Local\Temp\3C64.tmp"C:\Users\Admin\AppData\Local\Temp\3C64.tmp"41⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"C:\Users\Admin\AppData\Local\Temp\3CA3.tmp"42⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\3D00.tmp"C:\Users\Admin\AppData\Local\Temp\3D00.tmp"43⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"C:\Users\Admin\AppData\Local\Temp\3D3F.tmp"44⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"C:\Users\Admin\AppData\Local\Temp\3D7D.tmp"45⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"C:\Users\Admin\AppData\Local\Temp\3DBC.tmp"46⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"C:\Users\Admin\AppData\Local\Temp\3DFA.tmp"47⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\3E38.tmp"C:\Users\Admin\AppData\Local\Temp\3E38.tmp"48⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\3E67.tmp"C:\Users\Admin\AppData\Local\Temp\3E67.tmp"49⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"C:\Users\Admin\AppData\Local\Temp\3EA6.tmp"50⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\3F03.tmp"C:\Users\Admin\AppData\Local\Temp\3F03.tmp"51⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\3F42.tmp"C:\Users\Admin\AppData\Local\Temp\3F42.tmp"52⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\3F80.tmp"C:\Users\Admin\AppData\Local\Temp\3F80.tmp"53⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"C:\Users\Admin\AppData\Local\Temp\3FBE.tmp"54⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\3FFD.tmp"C:\Users\Admin\AppData\Local\Temp\3FFD.tmp"55⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\403B.tmp"C:\Users\Admin\AppData\Local\Temp\403B.tmp"56⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\407A.tmp"C:\Users\Admin\AppData\Local\Temp\407A.tmp"57⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\40B8.tmp"C:\Users\Admin\AppData\Local\Temp\40B8.tmp"58⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\40F6.tmp"C:\Users\Admin\AppData\Local\Temp\40F6.tmp"59⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\4135.tmp"C:\Users\Admin\AppData\Local\Temp\4135.tmp"60⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\4173.tmp"C:\Users\Admin\AppData\Local\Temp\4173.tmp"61⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\41B2.tmp"C:\Users\Admin\AppData\Local\Temp\41B2.tmp"62⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\41F0.tmp"C:\Users\Admin\AppData\Local\Temp\41F0.tmp"63⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\422E.tmp"C:\Users\Admin\AppData\Local\Temp\422E.tmp"64⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\426D.tmp"C:\Users\Admin\AppData\Local\Temp\426D.tmp"65⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\42AB.tmp"C:\Users\Admin\AppData\Local\Temp\42AB.tmp"66⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\42EA.tmp"C:\Users\Admin\AppData\Local\Temp\42EA.tmp"67⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\4328.tmp"C:\Users\Admin\AppData\Local\Temp\4328.tmp"68⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\4366.tmp"C:\Users\Admin\AppData\Local\Temp\4366.tmp"69⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\43A5.tmp"C:\Users\Admin\AppData\Local\Temp\43A5.tmp"70⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\43E3.tmp"C:\Users\Admin\AppData\Local\Temp\43E3.tmp"71⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\4422.tmp"C:\Users\Admin\AppData\Local\Temp\4422.tmp"72⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\4460.tmp"C:\Users\Admin\AppData\Local\Temp\4460.tmp"73⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\449E.tmp"C:\Users\Admin\AppData\Local\Temp\449E.tmp"74⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\44DD.tmp"C:\Users\Admin\AppData\Local\Temp\44DD.tmp"75⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\451B.tmp"C:\Users\Admin\AppData\Local\Temp\451B.tmp"76⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\4569.tmp"C:\Users\Admin\AppData\Local\Temp\4569.tmp"77⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\45A8.tmp"C:\Users\Admin\AppData\Local\Temp\45A8.tmp"78⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\45E6.tmp"C:\Users\Admin\AppData\Local\Temp\45E6.tmp"79⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\4624.tmp"C:\Users\Admin\AppData\Local\Temp\4624.tmp"80⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\4663.tmp"C:\Users\Admin\AppData\Local\Temp\4663.tmp"81⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\46A1.tmp"C:\Users\Admin\AppData\Local\Temp\46A1.tmp"82⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\46E0.tmp"C:\Users\Admin\AppData\Local\Temp\46E0.tmp"83⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\471E.tmp"C:\Users\Admin\AppData\Local\Temp\471E.tmp"84⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\475C.tmp"C:\Users\Admin\AppData\Local\Temp\475C.tmp"85⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\479B.tmp"C:\Users\Admin\AppData\Local\Temp\479B.tmp"86⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\47D9.tmp"C:\Users\Admin\AppData\Local\Temp\47D9.tmp"87⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\4818.tmp"C:\Users\Admin\AppData\Local\Temp\4818.tmp"88⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\4856.tmp"C:\Users\Admin\AppData\Local\Temp\4856.tmp"89⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\4894.tmp"C:\Users\Admin\AppData\Local\Temp\4894.tmp"90⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\48D3.tmp"C:\Users\Admin\AppData\Local\Temp\48D3.tmp"91⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\4911.tmp"C:\Users\Admin\AppData\Local\Temp\4911.tmp"92⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\4950.tmp"C:\Users\Admin\AppData\Local\Temp\4950.tmp"93⤵PID:2716
-
C:\Users\Admin\AppData\Local\Temp\498E.tmp"C:\Users\Admin\AppData\Local\Temp\498E.tmp"94⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\49CC.tmp"C:\Users\Admin\AppData\Local\Temp\49CC.tmp"95⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\4A0B.tmp"C:\Users\Admin\AppData\Local\Temp\4A0B.tmp"96⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\4A49.tmp"C:\Users\Admin\AppData\Local\Temp\4A49.tmp"97⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\4A88.tmp"C:\Users\Admin\AppData\Local\Temp\4A88.tmp"98⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"C:\Users\Admin\AppData\Local\Temp\4AC6.tmp"99⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\4B04.tmp"C:\Users\Admin\AppData\Local\Temp\4B04.tmp"100⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\4B43.tmp"C:\Users\Admin\AppData\Local\Temp\4B43.tmp"101⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\4B81.tmp"C:\Users\Admin\AppData\Local\Temp\4B81.tmp"102⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"C:\Users\Admin\AppData\Local\Temp\4BC0.tmp"103⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"C:\Users\Admin\AppData\Local\Temp\4BFE.tmp"104⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"C:\Users\Admin\AppData\Local\Temp\4C3C.tmp"105⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"C:\Users\Admin\AppData\Local\Temp\4C7B.tmp"106⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"C:\Users\Admin\AppData\Local\Temp\4CB9.tmp"107⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\4CF8.tmp"C:\Users\Admin\AppData\Local\Temp\4CF8.tmp"108⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\4D46.tmp"C:\Users\Admin\AppData\Local\Temp\4D46.tmp"109⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\4D84.tmp"C:\Users\Admin\AppData\Local\Temp\4D84.tmp"110⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\4DC2.tmp"C:\Users\Admin\AppData\Local\Temp\4DC2.tmp"111⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\4E01.tmp"C:\Users\Admin\AppData\Local\Temp\4E01.tmp"112⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"C:\Users\Admin\AppData\Local\Temp\4E3F.tmp"113⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"C:\Users\Admin\AppData\Local\Temp\4E7E.tmp"114⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"C:\Users\Admin\AppData\Local\Temp\4EBC.tmp"115⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\4EFA.tmp"C:\Users\Admin\AppData\Local\Temp\4EFA.tmp"116⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\4F39.tmp"C:\Users\Admin\AppData\Local\Temp\4F39.tmp"117⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\4F77.tmp"C:\Users\Admin\AppData\Local\Temp\4F77.tmp"118⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\4FC5.tmp"C:\Users\Admin\AppData\Local\Temp\4FC5.tmp"119⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\5004.tmp"C:\Users\Admin\AppData\Local\Temp\5004.tmp"120⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\5042.tmp"C:\Users\Admin\AppData\Local\Temp\5042.tmp"121⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\5080.tmp"C:\Users\Admin\AppData\Local\Temp\5080.tmp"122⤵PID:2908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-