Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/02/2024, 09:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe
Resource
win7-20231129-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe
Resource
win10v2004-20231222-en
2 signatures
150 seconds
General
-
Target
2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe
-
Size
486KB
-
MD5
7b1adaca27f92167a356f3a6f1e69e9b
-
SHA1
7c1930aaaf743faae30ea46956fe14c432d39cd7
-
SHA256
29cc57867d23eb63613ae2929465c839bf3418913236a1d13cc95bc806cf0501
-
SHA512
ddab6ea7d5a33afa5e81b54b78e433cf66edfb3ace351981b9d90a8afe547cf39b4a102726a519107787c58821a3fcd0a6469f40a8bc1ce895069f5213638ca7
-
SSDEEP
6144:Sorf3lPvovsgZnqG2C7mOTeiLfD7i8yyOnCvXWP3x56Jq7azGmdx6mRWhV/TsH3j:/U5rCOTeiDM3noAaz1dx9RoF4NZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1220 8D7.tmp 2276 944.tmp 2404 9B1.tmp 1748 A0F.tmp 2660 A6C.tmp 2720 ACA.tmp 2696 B37.tmp 2620 BA4.tmp 2484 C02.tmp 2504 C6F.tmp 2480 CCD.tmp 2772 D2A.tmp 2136 D88.tmp 1836 DF5.tmp 2548 E53.tmp 1988 EB0.tmp 1344 F0E.tmp 2348 F6C.tmp 1488 FC9.tmp 2796 1027.tmp 1664 1084.tmp 1680 10E2.tmp 2064 1130.tmp 2264 116E.tmp 2180 11AD.tmp 2068 11EB.tmp 2260 122A.tmp 2240 1268.tmp 1200 12A6.tmp 484 12E5.tmp 888 1323.tmp 2444 1362.tmp 1028 13A0.tmp 1568 13DE.tmp 656 141D.tmp 1128 145B.tmp 448 149A.tmp 2432 14D8.tmp 2644 1516.tmp 2424 1555.tmp 1544 1593.tmp 980 15E1.tmp 1924 1620.tmp 1640 165E.tmp 1860 169C.tmp 1652 16DB.tmp 2908 1729.tmp 3036 1767.tmp 1728 17A6.tmp 1336 17E4.tmp 1636 1822.tmp 2852 1861.tmp 892 189F.tmp 1724 18DE.tmp 1608 191C.tmp 2280 195A.tmp 1084 1999.tmp 1220 19D7.tmp 2768 1A16.tmp 1668 1A54.tmp 3032 1A92.tmp 2672 1AD1.tmp 2676 1B0F.tmp 2660 1B4E.tmp -
Loads dropped DLL 64 IoCs
pid Process 2108 2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe 1220 8D7.tmp 2276 944.tmp 2404 9B1.tmp 1748 A0F.tmp 2660 A6C.tmp 2720 ACA.tmp 2696 B37.tmp 2620 BA4.tmp 2484 C02.tmp 2504 C6F.tmp 2480 CCD.tmp 2772 D2A.tmp 2136 D88.tmp 1836 DF5.tmp 2548 E53.tmp 1988 EB0.tmp 1344 F0E.tmp 2348 F6C.tmp 1488 FC9.tmp 2796 1027.tmp 1664 1084.tmp 1680 10E2.tmp 2064 1130.tmp 2264 116E.tmp 2180 11AD.tmp 2068 11EB.tmp 2260 122A.tmp 2240 1268.tmp 1200 12A6.tmp 484 12E5.tmp 888 1323.tmp 2444 1362.tmp 1028 13A0.tmp 1568 13DE.tmp 656 141D.tmp 1128 145B.tmp 448 149A.tmp 2432 14D8.tmp 2644 1516.tmp 2424 1555.tmp 1544 1593.tmp 980 15E1.tmp 1924 1620.tmp 1640 165E.tmp 1860 169C.tmp 1652 16DB.tmp 2908 1729.tmp 3036 1767.tmp 1728 17A6.tmp 1336 17E4.tmp 1636 1822.tmp 2852 1861.tmp 892 189F.tmp 1724 18DE.tmp 1608 191C.tmp 2280 195A.tmp 1084 1999.tmp 1220 19D7.tmp 2768 1A16.tmp 1668 1A54.tmp 3032 1A92.tmp 2672 1AD1.tmp 2676 1B0F.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2108 wrote to memory of 1220 2108 2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe 28 PID 2108 wrote to memory of 1220 2108 2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe 28 PID 2108 wrote to memory of 1220 2108 2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe 28 PID 2108 wrote to memory of 1220 2108 2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe 28 PID 1220 wrote to memory of 2276 1220 8D7.tmp 29 PID 1220 wrote to memory of 2276 1220 8D7.tmp 29 PID 1220 wrote to memory of 2276 1220 8D7.tmp 29 PID 1220 wrote to memory of 2276 1220 8D7.tmp 29 PID 2276 wrote to memory of 2404 2276 944.tmp 30 PID 2276 wrote to memory of 2404 2276 944.tmp 30 PID 2276 wrote to memory of 2404 2276 944.tmp 30 PID 2276 wrote to memory of 2404 2276 944.tmp 30 PID 2404 wrote to memory of 1748 2404 9B1.tmp 31 PID 2404 wrote to memory of 1748 2404 9B1.tmp 31 PID 2404 wrote to memory of 1748 2404 9B1.tmp 31 PID 2404 wrote to memory of 1748 2404 9B1.tmp 31 PID 1748 wrote to memory of 2660 1748 A0F.tmp 32 PID 1748 wrote to memory of 2660 1748 A0F.tmp 32 PID 1748 wrote to memory of 2660 1748 A0F.tmp 32 PID 1748 wrote to memory of 2660 1748 A0F.tmp 32 PID 2660 wrote to memory of 2720 2660 A6C.tmp 33 PID 2660 wrote to memory of 2720 2660 A6C.tmp 33 PID 2660 wrote to memory of 2720 2660 A6C.tmp 33 PID 2660 wrote to memory of 2720 2660 A6C.tmp 33 PID 2720 wrote to memory of 2696 2720 ACA.tmp 34 PID 2720 wrote to memory of 2696 2720 ACA.tmp 34 PID 2720 wrote to memory of 2696 2720 ACA.tmp 34 PID 2720 wrote to memory of 2696 2720 ACA.tmp 34 PID 2696 wrote to memory of 2620 2696 B37.tmp 35 PID 2696 wrote to memory of 2620 2696 B37.tmp 35 PID 2696 wrote to memory of 2620 2696 B37.tmp 35 PID 2696 wrote to memory of 2620 2696 B37.tmp 35 PID 2620 wrote to memory of 2484 2620 BA4.tmp 36 PID 2620 wrote to memory of 2484 2620 BA4.tmp 36 PID 2620 wrote to memory of 2484 2620 BA4.tmp 36 PID 2620 wrote to memory of 2484 2620 BA4.tmp 36 PID 2484 wrote to memory of 2504 2484 C02.tmp 37 PID 2484 wrote to memory of 2504 2484 C02.tmp 37 PID 2484 wrote to memory of 2504 2484 C02.tmp 37 PID 2484 wrote to memory of 2504 2484 C02.tmp 37 PID 2504 wrote to memory of 2480 2504 C6F.tmp 38 PID 2504 wrote to memory of 2480 2504 C6F.tmp 38 PID 2504 wrote to memory of 2480 2504 C6F.tmp 38 PID 2504 wrote to memory of 2480 2504 C6F.tmp 38 PID 2480 wrote to memory of 2772 2480 CCD.tmp 39 PID 2480 wrote to memory of 2772 2480 CCD.tmp 39 PID 2480 wrote to memory of 2772 2480 CCD.tmp 39 PID 2480 wrote to memory of 2772 2480 CCD.tmp 39 PID 2772 wrote to memory of 2136 2772 D2A.tmp 40 PID 2772 wrote to memory of 2136 2772 D2A.tmp 40 PID 2772 wrote to memory of 2136 2772 D2A.tmp 40 PID 2772 wrote to memory of 2136 2772 D2A.tmp 40 PID 2136 wrote to memory of 1836 2136 D88.tmp 41 PID 2136 wrote to memory of 1836 2136 D88.tmp 41 PID 2136 wrote to memory of 1836 2136 D88.tmp 41 PID 2136 wrote to memory of 1836 2136 D88.tmp 41 PID 1836 wrote to memory of 2548 1836 DF5.tmp 42 PID 1836 wrote to memory of 2548 1836 DF5.tmp 42 PID 1836 wrote to memory of 2548 1836 DF5.tmp 42 PID 1836 wrote to memory of 2548 1836 DF5.tmp 42 PID 2548 wrote to memory of 1988 2548 E53.tmp 43 PID 2548 wrote to memory of 1988 2548 E53.tmp 43 PID 2548 wrote to memory of 1988 2548 E53.tmp 43 PID 2548 wrote to memory of 1988 2548 E53.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-02-14_7b1adaca27f92167a356f3a6f1e69e9b_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\8D7.tmp"C:\Users\Admin\AppData\Local\Temp\8D7.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\944.tmp"C:\Users\Admin\AppData\Local\Temp\944.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\9B1.tmp"C:\Users\Admin\AppData\Local\Temp\9B1.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\A0F.tmp"C:\Users\Admin\AppData\Local\Temp\A0F.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\A6C.tmp"C:\Users\Admin\AppData\Local\Temp\A6C.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\ACA.tmp"C:\Users\Admin\AppData\Local\Temp\ACA.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\B37.tmp"C:\Users\Admin\AppData\Local\Temp\B37.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\BA4.tmp"C:\Users\Admin\AppData\Local\Temp\BA4.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\C02.tmp"C:\Users\Admin\AppData\Local\Temp\C02.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\C6F.tmp"C:\Users\Admin\AppData\Local\Temp\C6F.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\CCD.tmp"C:\Users\Admin\AppData\Local\Temp\CCD.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\D2A.tmp"C:\Users\Admin\AppData\Local\Temp\D2A.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\D88.tmp"C:\Users\Admin\AppData\Local\Temp\D88.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\DF5.tmp"C:\Users\Admin\AppData\Local\Temp\DF5.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\E53.tmp"C:\Users\Admin\AppData\Local\Temp\E53.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\EB0.tmp"C:\Users\Admin\AppData\Local\Temp\EB0.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\F6C.tmp"C:\Users\Admin\AppData\Local\Temp\F6C.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\FC9.tmp"C:\Users\Admin\AppData\Local\Temp\FC9.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\1027.tmp"C:\Users\Admin\AppData\Local\Temp\1027.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\1084.tmp"C:\Users\Admin\AppData\Local\Temp\1084.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\10E2.tmp"C:\Users\Admin\AppData\Local\Temp\10E2.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\1130.tmp"C:\Users\Admin\AppData\Local\Temp\1130.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\116E.tmp"C:\Users\Admin\AppData\Local\Temp\116E.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\11AD.tmp"C:\Users\Admin\AppData\Local\Temp\11AD.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\11EB.tmp"C:\Users\Admin\AppData\Local\Temp\11EB.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\122A.tmp"C:\Users\Admin\AppData\Local\Temp\122A.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1268.tmp"C:\Users\Admin\AppData\Local\Temp\1268.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\12A6.tmp"C:\Users\Admin\AppData\Local\Temp\12A6.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\12E5.tmp"C:\Users\Admin\AppData\Local\Temp\12E5.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484 -
C:\Users\Admin\AppData\Local\Temp\1323.tmp"C:\Users\Admin\AppData\Local\Temp\1323.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:888 -
C:\Users\Admin\AppData\Local\Temp\1362.tmp"C:\Users\Admin\AppData\Local\Temp\1362.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\13A0.tmp"C:\Users\Admin\AppData\Local\Temp\13A0.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\13DE.tmp"C:\Users\Admin\AppData\Local\Temp\13DE.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\141D.tmp"C:\Users\Admin\AppData\Local\Temp\141D.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:656 -
C:\Users\Admin\AppData\Local\Temp\145B.tmp"C:\Users\Admin\AppData\Local\Temp\145B.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\149A.tmp"C:\Users\Admin\AppData\Local\Temp\149A.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:448 -
C:\Users\Admin\AppData\Local\Temp\14D8.tmp"C:\Users\Admin\AppData\Local\Temp\14D8.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\1516.tmp"C:\Users\Admin\AppData\Local\Temp\1516.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\1555.tmp"C:\Users\Admin\AppData\Local\Temp\1555.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\1593.tmp"C:\Users\Admin\AppData\Local\Temp\1593.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\15E1.tmp"C:\Users\Admin\AppData\Local\Temp\15E1.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:980 -
C:\Users\Admin\AppData\Local\Temp\1620.tmp"C:\Users\Admin\AppData\Local\Temp\1620.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\169C.tmp"C:\Users\Admin\AppData\Local\Temp\169C.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\16DB.tmp"C:\Users\Admin\AppData\Local\Temp\16DB.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\1729.tmp"C:\Users\Admin\AppData\Local\Temp\1729.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\1767.tmp"C:\Users\Admin\AppData\Local\Temp\1767.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\17A6.tmp"C:\Users\Admin\AppData\Local\Temp\17A6.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\17E4.tmp"C:\Users\Admin\AppData\Local\Temp\17E4.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\1822.tmp"C:\Users\Admin\AppData\Local\Temp\1822.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\1861.tmp"C:\Users\Admin\AppData\Local\Temp\1861.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\189F.tmp"C:\Users\Admin\AppData\Local\Temp\189F.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Users\Admin\AppData\Local\Temp\18DE.tmp"C:\Users\Admin\AppData\Local\Temp\18DE.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\191C.tmp"C:\Users\Admin\AppData\Local\Temp\191C.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\195A.tmp"C:\Users\Admin\AppData\Local\Temp\195A.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\1999.tmp"C:\Users\Admin\AppData\Local\Temp\1999.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\19D7.tmp"C:\Users\Admin\AppData\Local\Temp\19D7.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\1A16.tmp"C:\Users\Admin\AppData\Local\Temp\1A16.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\1A54.tmp"C:\Users\Admin\AppData\Local\Temp\1A54.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\1A92.tmp"C:\Users\Admin\AppData\Local\Temp\1A92.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"C:\Users\Admin\AppData\Local\Temp\1B0F.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"C:\Users\Admin\AppData\Local\Temp\1B4E.tmp"65⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\1B8C.tmp"C:\Users\Admin\AppData\Local\Temp\1B8C.tmp"66⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"C:\Users\Admin\AppData\Local\Temp\1BCA.tmp"67⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\1C09.tmp"C:\Users\Admin\AppData\Local\Temp\1C09.tmp"68⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\1C47.tmp"C:\Users\Admin\AppData\Local\Temp\1C47.tmp"69⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\1C86.tmp"C:\Users\Admin\AppData\Local\Temp\1C86.tmp"70⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"C:\Users\Admin\AppData\Local\Temp\1CC4.tmp"71⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\1D12.tmp"C:\Users\Admin\AppData\Local\Temp\1D12.tmp"72⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\1D50.tmp"C:\Users\Admin\AppData\Local\Temp\1D50.tmp"73⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"74⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\1DDD.tmp"C:\Users\Admin\AppData\Local\Temp\1DDD.tmp"75⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\1E1B.tmp"C:\Users\Admin\AppData\Local\Temp\1E1B.tmp"76⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\1E5A.tmp"C:\Users\Admin\AppData\Local\Temp\1E5A.tmp"77⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\1E98.tmp"C:\Users\Admin\AppData\Local\Temp\1E98.tmp"78⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"C:\Users\Admin\AppData\Local\Temp\1ED6.tmp"79⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\1F15.tmp"C:\Users\Admin\AppData\Local\Temp\1F15.tmp"80⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\1F53.tmp"C:\Users\Admin\AppData\Local\Temp\1F53.tmp"81⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\1F92.tmp"C:\Users\Admin\AppData\Local\Temp\1F92.tmp"82⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\1FD0.tmp"C:\Users\Admin\AppData\Local\Temp\1FD0.tmp"83⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\200E.tmp"C:\Users\Admin\AppData\Local\Temp\200E.tmp"84⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\204D.tmp"C:\Users\Admin\AppData\Local\Temp\204D.tmp"85⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\208B.tmp"C:\Users\Admin\AppData\Local\Temp\208B.tmp"86⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\20CA.tmp"C:\Users\Admin\AppData\Local\Temp\20CA.tmp"87⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"88⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\2146.tmp"C:\Users\Admin\AppData\Local\Temp\2146.tmp"89⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"90⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"91⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\2202.tmp"C:\Users\Admin\AppData\Local\Temp\2202.tmp"92⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"93⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"94⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\22BD.tmp"C:\Users\Admin\AppData\Local\Temp\22BD.tmp"95⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\22FB.tmp"C:\Users\Admin\AppData\Local\Temp\22FB.tmp"96⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\233A.tmp"C:\Users\Admin\AppData\Local\Temp\233A.tmp"97⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\2378.tmp"C:\Users\Admin\AppData\Local\Temp\2378.tmp"98⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\23B6.tmp"C:\Users\Admin\AppData\Local\Temp\23B6.tmp"99⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\23F5.tmp"C:\Users\Admin\AppData\Local\Temp\23F5.tmp"100⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\2433.tmp"C:\Users\Admin\AppData\Local\Temp\2433.tmp"101⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\2472.tmp"C:\Users\Admin\AppData\Local\Temp\2472.tmp"102⤵PID:1040
-
C:\Users\Admin\AppData\Local\Temp\24B0.tmp"C:\Users\Admin\AppData\Local\Temp\24B0.tmp"103⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\24EE.tmp"C:\Users\Admin\AppData\Local\Temp\24EE.tmp"104⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\252D.tmp"C:\Users\Admin\AppData\Local\Temp\252D.tmp"105⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\257B.tmp"C:\Users\Admin\AppData\Local\Temp\257B.tmp"106⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\25B9.tmp"C:\Users\Admin\AppData\Local\Temp\25B9.tmp"107⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\25F8.tmp"C:\Users\Admin\AppData\Local\Temp\25F8.tmp"108⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\2636.tmp"C:\Users\Admin\AppData\Local\Temp\2636.tmp"109⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\2674.tmp"C:\Users\Admin\AppData\Local\Temp\2674.tmp"110⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\26B3.tmp"C:\Users\Admin\AppData\Local\Temp\26B3.tmp"111⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\26F1.tmp"C:\Users\Admin\AppData\Local\Temp\26F1.tmp"112⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2730.tmp"C:\Users\Admin\AppData\Local\Temp\2730.tmp"113⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\276E.tmp"C:\Users\Admin\AppData\Local\Temp\276E.tmp"114⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\27AC.tmp"C:\Users\Admin\AppData\Local\Temp\27AC.tmp"115⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\27EB.tmp"C:\Users\Admin\AppData\Local\Temp\27EB.tmp"116⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\2829.tmp"C:\Users\Admin\AppData\Local\Temp\2829.tmp"117⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\2868.tmp"C:\Users\Admin\AppData\Local\Temp\2868.tmp"118⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"119⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\28F4.tmp"C:\Users\Admin\AppData\Local\Temp\28F4.tmp"120⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"121⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"122⤵PID:1724
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-