Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
11-03-2024 00:48
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe
Resource
win7-20240221-en
windows7-x64
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe
Resource
win10v2004-20240226-en
windows10-2004-x64
2 signatures
150 seconds
General
-
Target
2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe
-
Size
486KB
-
MD5
485fc1d18f9b4927d9077bced661e1be
-
SHA1
b6454be7061cd53ae9224a5484a53bb7720073f0
-
SHA256
ea148e84c3736086772e991fe5caa568577bef37a946fa45aab45e11d03e62fd
-
SHA512
f035588260e6e61e243b59c49619e03c76d06d7ece29b826ee53aa68b32af947163b3b1140d0110ebe4afae57469375debe18b7733ed0e13310dca155439ffbb
-
SSDEEP
6144:Forf3lPvovsgZnqG2C7mOTeiLfD72pYvdGJ15viiqHWwATmAfi42wcWJvfhBSG7x:UU5rCOTeiD811yvATmscWvfsVwPNZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2200 D0B.tmp 2336 D78.tmp 2764 DE6.tmp 2288 E24.tmp 2636 E72.tmp 2632 EC0.tmp 2728 F0E.tmp 2624 F5C.tmp 2852 FD9.tmp 2492 1027.tmp 2480 1065.tmp 2992 10C3.tmp 1680 1101.tmp 2848 114F.tmp 3024 119D.tmp 3020 11EB.tmp 2024 122A.tmp 2672 1268.tmp 1524 12A6.tmp 2788 12E5.tmp 2724 1342.tmp 2808 13B0.tmp 1428 13EE.tmp 1520 142C.tmp 1792 146B.tmp 1116 14A9.tmp 2068 14F7.tmp 2192 1536.tmp 2916 1574.tmp 2844 15B2.tmp 2320 15E1.tmp 336 1620.tmp 1128 165E.tmp 2620 169C.tmp 1848 16DB.tmp 900 1719.tmp 1584 1758.tmp 452 1796.tmp 2404 17D4.tmp 1152 1813.tmp 1776 1851.tmp 1772 1890.tmp 1392 18CE.tmp 1956 18FD.tmp 1816 193B.tmp 908 197A.tmp 1876 19B8.tmp 768 19E7.tmp 1036 1A35.tmp 2280 1A73.tmp 2924 1AB2.tmp 884 1AF0.tmp 1628 1B2E.tmp 2392 1B6D.tmp 1592 1BAB.tmp 1960 1BEA.tmp 3064 1C28.tmp 2200 1C66.tmp 1632 1CA5.tmp 2040 1CE3.tmp 2652 1D22.tmp 2648 1D60.tmp 2904 1D9E.tmp 2544 1DCD.tmp -
Loads dropped DLL 64 IoCs
pid Process 2152 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 2200 D0B.tmp 2336 D78.tmp 2764 DE6.tmp 2288 E24.tmp 2636 E72.tmp 2632 EC0.tmp 2728 F0E.tmp 2624 F5C.tmp 2852 FD9.tmp 2492 1027.tmp 2480 1065.tmp 2992 10C3.tmp 1680 1101.tmp 2848 114F.tmp 3024 119D.tmp 3020 11EB.tmp 2024 122A.tmp 2672 1268.tmp 1524 12A6.tmp 2788 12E5.tmp 2724 1342.tmp 2808 13B0.tmp 1428 13EE.tmp 1520 142C.tmp 1792 146B.tmp 1116 14A9.tmp 2068 14F7.tmp 2192 1536.tmp 2916 1574.tmp 2844 15B2.tmp 2320 15E1.tmp 336 1620.tmp 1128 165E.tmp 2620 169C.tmp 1848 16DB.tmp 900 1719.tmp 1584 1758.tmp 452 1796.tmp 2404 17D4.tmp 1152 1813.tmp 1776 1851.tmp 1772 1890.tmp 1392 18CE.tmp 1956 18FD.tmp 1816 193B.tmp 908 197A.tmp 1876 19B8.tmp 768 19E7.tmp 1036 1A35.tmp 2280 1A73.tmp 2924 1AB2.tmp 884 1AF0.tmp 1628 1B2E.tmp 2392 1B6D.tmp 1592 1BAB.tmp 1960 1BEA.tmp 3064 1C28.tmp 2200 1C66.tmp 1632 1CA5.tmp 2040 1CE3.tmp 2652 1D22.tmp 2648 1D60.tmp 2904 1D9E.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2152 wrote to memory of 2200 2152 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 28 PID 2152 wrote to memory of 2200 2152 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 28 PID 2152 wrote to memory of 2200 2152 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 28 PID 2152 wrote to memory of 2200 2152 2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe 28 PID 2200 wrote to memory of 2336 2200 D0B.tmp 29 PID 2200 wrote to memory of 2336 2200 D0B.tmp 29 PID 2200 wrote to memory of 2336 2200 D0B.tmp 29 PID 2200 wrote to memory of 2336 2200 D0B.tmp 29 PID 2336 wrote to memory of 2764 2336 D78.tmp 30 PID 2336 wrote to memory of 2764 2336 D78.tmp 30 PID 2336 wrote to memory of 2764 2336 D78.tmp 30 PID 2336 wrote to memory of 2764 2336 D78.tmp 30 PID 2764 wrote to memory of 2288 2764 DE6.tmp 31 PID 2764 wrote to memory of 2288 2764 DE6.tmp 31 PID 2764 wrote to memory of 2288 2764 DE6.tmp 31 PID 2764 wrote to memory of 2288 2764 DE6.tmp 31 PID 2288 wrote to memory of 2636 2288 E24.tmp 32 PID 2288 wrote to memory of 2636 2288 E24.tmp 32 PID 2288 wrote to memory of 2636 2288 E24.tmp 32 PID 2288 wrote to memory of 2636 2288 E24.tmp 32 PID 2636 wrote to memory of 2632 2636 E72.tmp 92 PID 2636 wrote to memory of 2632 2636 E72.tmp 92 PID 2636 wrote to memory of 2632 2636 E72.tmp 92 PID 2636 wrote to memory of 2632 2636 E72.tmp 92 PID 2632 wrote to memory of 2728 2632 EC0.tmp 34 PID 2632 wrote to memory of 2728 2632 EC0.tmp 34 PID 2632 wrote to memory of 2728 2632 EC0.tmp 34 PID 2632 wrote to memory of 2728 2632 EC0.tmp 34 PID 2728 wrote to memory of 2624 2728 F0E.tmp 35 PID 2728 wrote to memory of 2624 2728 F0E.tmp 35 PID 2728 wrote to memory of 2624 2728 F0E.tmp 35 PID 2728 wrote to memory of 2624 2728 F0E.tmp 35 PID 2624 wrote to memory of 2852 2624 F5C.tmp 36 PID 2624 wrote to memory of 2852 2624 F5C.tmp 36 PID 2624 wrote to memory of 2852 2624 F5C.tmp 36 PID 2624 wrote to memory of 2852 2624 F5C.tmp 36 PID 2852 wrote to memory of 2492 2852 FD9.tmp 37 PID 2852 wrote to memory of 2492 2852 FD9.tmp 37 PID 2852 wrote to memory of 2492 2852 FD9.tmp 37 PID 2852 wrote to memory of 2492 2852 FD9.tmp 37 PID 2492 wrote to memory of 2480 2492 1027.tmp 38 PID 2492 wrote to memory of 2480 2492 1027.tmp 38 PID 2492 wrote to memory of 2480 2492 1027.tmp 38 PID 2492 wrote to memory of 2480 2492 1027.tmp 38 PID 2480 wrote to memory of 2992 2480 1065.tmp 39 PID 2480 wrote to memory of 2992 2480 1065.tmp 39 PID 2480 wrote to memory of 2992 2480 1065.tmp 39 PID 2480 wrote to memory of 2992 2480 1065.tmp 39 PID 2992 wrote to memory of 1680 2992 10C3.tmp 102 PID 2992 wrote to memory of 1680 2992 10C3.tmp 102 PID 2992 wrote to memory of 1680 2992 10C3.tmp 102 PID 2992 wrote to memory of 1680 2992 10C3.tmp 102 PID 1680 wrote to memory of 2848 1680 1101.tmp 41 PID 1680 wrote to memory of 2848 1680 1101.tmp 41 PID 1680 wrote to memory of 2848 1680 1101.tmp 41 PID 1680 wrote to memory of 2848 1680 1101.tmp 41 PID 2848 wrote to memory of 3024 2848 114F.tmp 42 PID 2848 wrote to memory of 3024 2848 114F.tmp 42 PID 2848 wrote to memory of 3024 2848 114F.tmp 42 PID 2848 wrote to memory of 3024 2848 114F.tmp 42 PID 3024 wrote to memory of 3020 3024 119D.tmp 43 PID 3024 wrote to memory of 3020 3024 119D.tmp 43 PID 3024 wrote to memory of 3020 3024 119D.tmp 43 PID 3024 wrote to memory of 3020 3024 119D.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-03-11_485fc1d18f9b4927d9077bced661e1be_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\D0B.tmp"C:\Users\Admin\AppData\Local\Temp\D0B.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\D78.tmp"C:\Users\Admin\AppData\Local\Temp\D78.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\DE6.tmp"C:\Users\Admin\AppData\Local\Temp\DE6.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\E24.tmp"C:\Users\Admin\AppData\Local\Temp\E24.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\E72.tmp"C:\Users\Admin\AppData\Local\Temp\E72.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\EC0.tmp"C:\Users\Admin\AppData\Local\Temp\EC0.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\F0E.tmp"C:\Users\Admin\AppData\Local\Temp\F0E.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\F5C.tmp"C:\Users\Admin\AppData\Local\Temp\F5C.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\FD9.tmp"C:\Users\Admin\AppData\Local\Temp\FD9.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\1027.tmp"C:\Users\Admin\AppData\Local\Temp\1027.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\1065.tmp"C:\Users\Admin\AppData\Local\Temp\1065.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\10C3.tmp"C:\Users\Admin\AppData\Local\Temp\10C3.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\1101.tmp"C:\Users\Admin\AppData\Local\Temp\1101.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\114F.tmp"C:\Users\Admin\AppData\Local\Temp\114F.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\119D.tmp"C:\Users\Admin\AppData\Local\Temp\119D.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\11EB.tmp"C:\Users\Admin\AppData\Local\Temp\11EB.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\122A.tmp"C:\Users\Admin\AppData\Local\Temp\122A.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\1268.tmp"C:\Users\Admin\AppData\Local\Temp\1268.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\12A6.tmp"C:\Users\Admin\AppData\Local\Temp\12A6.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\12E5.tmp"C:\Users\Admin\AppData\Local\Temp\12E5.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\1342.tmp"C:\Users\Admin\AppData\Local\Temp\1342.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\13B0.tmp"C:\Users\Admin\AppData\Local\Temp\13B0.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\13EE.tmp"C:\Users\Admin\AppData\Local\Temp\13EE.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\142C.tmp"C:\Users\Admin\AppData\Local\Temp\142C.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\146B.tmp"C:\Users\Admin\AppData\Local\Temp\146B.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\14A9.tmp"C:\Users\Admin\AppData\Local\Temp\14A9.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\14F7.tmp"C:\Users\Admin\AppData\Local\Temp\14F7.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\1536.tmp"C:\Users\Admin\AppData\Local\Temp\1536.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\1574.tmp"C:\Users\Admin\AppData\Local\Temp\1574.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\15B2.tmp"C:\Users\Admin\AppData\Local\Temp\15B2.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\15E1.tmp"C:\Users\Admin\AppData\Local\Temp\15E1.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\1620.tmp"C:\Users\Admin\AppData\Local\Temp\1620.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:336 -
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\169C.tmp"C:\Users\Admin\AppData\Local\Temp\169C.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\16DB.tmp"C:\Users\Admin\AppData\Local\Temp\16DB.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\1719.tmp"C:\Users\Admin\AppData\Local\Temp\1719.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Users\Admin\AppData\Local\Temp\1758.tmp"C:\Users\Admin\AppData\Local\Temp\1758.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\1796.tmp"C:\Users\Admin\AppData\Local\Temp\1796.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:452 -
C:\Users\Admin\AppData\Local\Temp\17D4.tmp"C:\Users\Admin\AppData\Local\Temp\17D4.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\1813.tmp"C:\Users\Admin\AppData\Local\Temp\1813.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\1851.tmp"C:\Users\Admin\AppData\Local\Temp\1851.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\1890.tmp"C:\Users\Admin\AppData\Local\Temp\1890.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\18CE.tmp"C:\Users\Admin\AppData\Local\Temp\18CE.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\18FD.tmp"C:\Users\Admin\AppData\Local\Temp\18FD.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\193B.tmp"C:\Users\Admin\AppData\Local\Temp\193B.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\197A.tmp"C:\Users\Admin\AppData\Local\Temp\197A.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:908 -
C:\Users\Admin\AppData\Local\Temp\19B8.tmp"C:\Users\Admin\AppData\Local\Temp\19B8.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\19E7.tmp"C:\Users\Admin\AppData\Local\Temp\19E7.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:768 -
C:\Users\Admin\AppData\Local\Temp\1A35.tmp"C:\Users\Admin\AppData\Local\Temp\1A35.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\1A73.tmp"C:\Users\Admin\AppData\Local\Temp\1A73.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"C:\Users\Admin\AppData\Local\Temp\1AB2.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\1AF0.tmp"C:\Users\Admin\AppData\Local\Temp\1AF0.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"C:\Users\Admin\AppData\Local\Temp\1B2E.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\1B6D.tmp"C:\Users\Admin\AppData\Local\Temp\1B6D.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\1C28.tmp"C:\Users\Admin\AppData\Local\Temp\1C28.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"C:\Users\Admin\AppData\Local\Temp\1CA5.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"C:\Users\Admin\AppData\Local\Temp\1CE3.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\1D22.tmp"C:\Users\Admin\AppData\Local\Temp\1D22.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\1D60.tmp"C:\Users\Admin\AppData\Local\Temp\1D60.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\1D9E.tmp"C:\Users\Admin\AppData\Local\Temp\1D9E.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"C:\Users\Admin\AppData\Local\Temp\1DCD.tmp"65⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"C:\Users\Admin\AppData\Local\Temp\1E0C.tmp"66⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"C:\Users\Admin\AppData\Local\Temp\1E4A.tmp"67⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\1E88.tmp"C:\Users\Admin\AppData\Local\Temp\1E88.tmp"68⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\1EC7.tmp"C:\Users\Admin\AppData\Local\Temp\1EC7.tmp"69⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\1F05.tmp"C:\Users\Admin\AppData\Local\Temp\1F05.tmp"70⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\1F53.tmp"C:\Users\Admin\AppData\Local\Temp\1F53.tmp"71⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\1F92.tmp"C:\Users\Admin\AppData\Local\Temp\1F92.tmp"72⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"C:\Users\Admin\AppData\Local\Temp\1FFF.tmp"73⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\203D.tmp"C:\Users\Admin\AppData\Local\Temp\203D.tmp"74⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\207C.tmp"C:\Users\Admin\AppData\Local\Temp\207C.tmp"75⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\20CA.tmp"C:\Users\Admin\AppData\Local\Temp\20CA.tmp"76⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\2108.tmp"C:\Users\Admin\AppData\Local\Temp\2108.tmp"77⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\2146.tmp"C:\Users\Admin\AppData\Local\Temp\2146.tmp"78⤵PID:2972
-
C:\Users\Admin\AppData\Local\Temp\2185.tmp"C:\Users\Admin\AppData\Local\Temp\2185.tmp"79⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"80⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\2202.tmp"C:\Users\Admin\AppData\Local\Temp\2202.tmp"81⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"82⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\227E.tmp"C:\Users\Admin\AppData\Local\Temp\227E.tmp"83⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\22BD.tmp"C:\Users\Admin\AppData\Local\Temp\22BD.tmp"84⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\22EC.tmp"C:\Users\Admin\AppData\Local\Temp\22EC.tmp"85⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\232A.tmp"C:\Users\Admin\AppData\Local\Temp\232A.tmp"86⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\2368.tmp"C:\Users\Admin\AppData\Local\Temp\2368.tmp"87⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\23A7.tmp"C:\Users\Admin\AppData\Local\Temp\23A7.tmp"88⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"89⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\2424.tmp"C:\Users\Admin\AppData\Local\Temp\2424.tmp"90⤵PID:1228
-
C:\Users\Admin\AppData\Local\Temp\2462.tmp"C:\Users\Admin\AppData\Local\Temp\2462.tmp"91⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\24A0.tmp"C:\Users\Admin\AppData\Local\Temp\24A0.tmp"92⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\24DF.tmp"C:\Users\Admin\AppData\Local\Temp\24DF.tmp"93⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\251D.tmp"C:\Users\Admin\AppData\Local\Temp\251D.tmp"94⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\256B.tmp"C:\Users\Admin\AppData\Local\Temp\256B.tmp"95⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\25B9.tmp"C:\Users\Admin\AppData\Local\Temp\25B9.tmp"96⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\2655.tmp"C:\Users\Admin\AppData\Local\Temp\2655.tmp"97⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\26B3.tmp"C:\Users\Admin\AppData\Local\Temp\26B3.tmp"98⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\2710.tmp"C:\Users\Admin\AppData\Local\Temp\2710.tmp"99⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\276E.tmp"C:\Users\Admin\AppData\Local\Temp\276E.tmp"100⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\27DB.tmp"C:\Users\Admin\AppData\Local\Temp\27DB.tmp"101⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\2829.tmp"C:\Users\Admin\AppData\Local\Temp\2829.tmp"102⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\2887.tmp"C:\Users\Admin\AppData\Local\Temp\2887.tmp"103⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\28E4.tmp"C:\Users\Admin\AppData\Local\Temp\28E4.tmp"104⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\2932.tmp"C:\Users\Admin\AppData\Local\Temp\2932.tmp"105⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\2971.tmp"C:\Users\Admin\AppData\Local\Temp\2971.tmp"106⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\29AF.tmp"C:\Users\Admin\AppData\Local\Temp\29AF.tmp"107⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\2A1C.tmp"C:\Users\Admin\AppData\Local\Temp\2A1C.tmp"108⤵PID:1152
-
C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"C:\Users\Admin\AppData\Local\Temp\2A7A.tmp"109⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"C:\Users\Admin\AppData\Local\Temp\2AB8.tmp"110⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"C:\Users\Admin\AppData\Local\Temp\2AF7.tmp"111⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"112⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"113⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"114⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"115⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"116⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"C:\Users\Admin\AppData\Local\Temp\2C8C.tmp"117⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"C:\Users\Admin\AppData\Local\Temp\2CCB.tmp"118⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\2D09.tmp"C:\Users\Admin\AppData\Local\Temp\2D09.tmp"119⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\2D48.tmp"C:\Users\Admin\AppData\Local\Temp\2D48.tmp"120⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\2D86.tmp"C:\Users\Admin\AppData\Local\Temp\2D86.tmp"121⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"C:\Users\Admin\AppData\Local\Temp\2DC4.tmp"122⤵PID:1712
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-