Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
01/07/2024, 17:08
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe
Resource
win7-20240220-en
3 signatures
150 seconds
Behavioral task
behavioral2
Sample
2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe
Resource
win10v2004-20240508-en
2 signatures
150 seconds
General
-
Target
2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe
-
Size
520KB
-
MD5
a78d9e33454d3c6784db4015b9973a10
-
SHA1
6e3d5dbc5596e29917201e3b62a4f35ddb60db6d
-
SHA256
ca10221ec96101db70051e45a4188ef6c507d91f2883ad8737fe6fffa9eeeaea
-
SHA512
ca2f4d518cd33dc8041f3dc223949500e9c0473864ace08d46c7d6663fc150f750c8cd16ee2c66be4cbe0425ba55a17497f89de4f34498ff520a14e3fea90921
-
SSDEEP
12288:gj8fuxR21t5i8fmMPL9SnnUgHNKnzqBcNNZ:gj8fuK1GYmTvNKzQcNN
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1320 10C3.tmp 2928 1111.tmp 2520 116E.tmp 2692 11CC.tmp 2840 1239.tmp 2612 12B6.tmp 2804 1323.tmp 2588 1381.tmp 2420 13EE.tmp 2488 144C.tmp 2132 14A9.tmp 1948 1507.tmp 2404 1574.tmp 2516 15E1.tmp 2312 165E.tmp 1756 16CB.tmp 1944 1729.tmp 2208 1786.tmp 1652 1803.tmp 356 1870.tmp 1632 18DE.tmp 1688 194B.tmp 1904 19B8.tmp 2456 1A06.tmp 2512 1A44.tmp 2252 1A92.tmp 2260 1AD1.tmp 2052 1B1F.tmp 2400 1B5D.tmp 772 1BAB.tmp 1420 1BEA.tmp 928 1C28.tmp 1788 1C66.tmp 1752 1CB4.tmp 1140 1D02.tmp 2236 1D41.tmp 688 1D8F.tmp 1100 1DDD.tmp 1900 1E2B.tmp 1252 1E79.tmp 1216 1EC7.tmp 1300 1F05.tmp 3064 1F53.tmp 1880 1F92.tmp 3032 1FE0.tmp 1712 201E.tmp 792 206C.tmp 2356 20AA.tmp 1624 20F8.tmp 2196 2137.tmp 2956 2175.tmp 344 21C3.tmp 848 2202.tmp 1460 2240.tmp 1656 228E.tmp 1184 22CC.tmp 2172 230B.tmp 1320 2349.tmp 2524 23A7.tmp 2120 23E5.tmp 2520 2433.tmp 2568 2472.tmp 2244 24B0.tmp 2532 24FE.tmp -
Loads dropped DLL 64 IoCs
pid Process 2496 2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe 1320 10C3.tmp 2928 1111.tmp 2520 116E.tmp 2692 11CC.tmp 2840 1239.tmp 2612 12B6.tmp 2804 1323.tmp 2588 1381.tmp 2420 13EE.tmp 2488 144C.tmp 2132 14A9.tmp 1948 1507.tmp 2404 1574.tmp 2516 15E1.tmp 2312 165E.tmp 1756 16CB.tmp 1944 1729.tmp 2208 1786.tmp 1652 1803.tmp 356 1870.tmp 1632 18DE.tmp 1688 194B.tmp 1904 19B8.tmp 2456 1A06.tmp 2512 1A44.tmp 2252 1A92.tmp 2260 1AD1.tmp 2052 1B1F.tmp 2400 1B5D.tmp 772 1BAB.tmp 1420 1BEA.tmp 928 1C28.tmp 1788 1C66.tmp 1752 1CB4.tmp 1140 1D02.tmp 2236 1D41.tmp 688 1D8F.tmp 1100 1DDD.tmp 1900 1E2B.tmp 1252 1E79.tmp 1216 1EC7.tmp 1300 1F05.tmp 3064 1F53.tmp 1880 1F92.tmp 3032 1FE0.tmp 1712 201E.tmp 792 206C.tmp 2356 20AA.tmp 1624 20F8.tmp 2196 2137.tmp 2956 2175.tmp 344 21C3.tmp 848 2202.tmp 1460 2240.tmp 1656 228E.tmp 1184 22CC.tmp 2172 230B.tmp 1320 2349.tmp 2524 23A7.tmp 2120 23E5.tmp 2520 2433.tmp 2568 2472.tmp 2244 24B0.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2496 wrote to memory of 1320 2496 2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe 28 PID 2496 wrote to memory of 1320 2496 2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe 28 PID 2496 wrote to memory of 1320 2496 2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe 28 PID 2496 wrote to memory of 1320 2496 2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe 28 PID 1320 wrote to memory of 2928 1320 10C3.tmp 29 PID 1320 wrote to memory of 2928 1320 10C3.tmp 29 PID 1320 wrote to memory of 2928 1320 10C3.tmp 29 PID 1320 wrote to memory of 2928 1320 10C3.tmp 29 PID 2928 wrote to memory of 2520 2928 1111.tmp 30 PID 2928 wrote to memory of 2520 2928 1111.tmp 30 PID 2928 wrote to memory of 2520 2928 1111.tmp 30 PID 2928 wrote to memory of 2520 2928 1111.tmp 30 PID 2520 wrote to memory of 2692 2520 116E.tmp 31 PID 2520 wrote to memory of 2692 2520 116E.tmp 31 PID 2520 wrote to memory of 2692 2520 116E.tmp 31 PID 2520 wrote to memory of 2692 2520 116E.tmp 31 PID 2692 wrote to memory of 2840 2692 11CC.tmp 32 PID 2692 wrote to memory of 2840 2692 11CC.tmp 32 PID 2692 wrote to memory of 2840 2692 11CC.tmp 32 PID 2692 wrote to memory of 2840 2692 11CC.tmp 32 PID 2840 wrote to memory of 2612 2840 1239.tmp 33 PID 2840 wrote to memory of 2612 2840 1239.tmp 33 PID 2840 wrote to memory of 2612 2840 1239.tmp 33 PID 2840 wrote to memory of 2612 2840 1239.tmp 33 PID 2612 wrote to memory of 2804 2612 12B6.tmp 34 PID 2612 wrote to memory of 2804 2612 12B6.tmp 34 PID 2612 wrote to memory of 2804 2612 12B6.tmp 34 PID 2612 wrote to memory of 2804 2612 12B6.tmp 34 PID 2804 wrote to memory of 2588 2804 1323.tmp 35 PID 2804 wrote to memory of 2588 2804 1323.tmp 35 PID 2804 wrote to memory of 2588 2804 1323.tmp 35 PID 2804 wrote to memory of 2588 2804 1323.tmp 35 PID 2588 wrote to memory of 2420 2588 1381.tmp 36 PID 2588 wrote to memory of 2420 2588 1381.tmp 36 PID 2588 wrote to memory of 2420 2588 1381.tmp 36 PID 2588 wrote to memory of 2420 2588 1381.tmp 36 PID 2420 wrote to memory of 2488 2420 13EE.tmp 37 PID 2420 wrote to memory of 2488 2420 13EE.tmp 37 PID 2420 wrote to memory of 2488 2420 13EE.tmp 37 PID 2420 wrote to memory of 2488 2420 13EE.tmp 37 PID 2488 wrote to memory of 2132 2488 144C.tmp 38 PID 2488 wrote to memory of 2132 2488 144C.tmp 38 PID 2488 wrote to memory of 2132 2488 144C.tmp 38 PID 2488 wrote to memory of 2132 2488 144C.tmp 38 PID 2132 wrote to memory of 1948 2132 14A9.tmp 39 PID 2132 wrote to memory of 1948 2132 14A9.tmp 39 PID 2132 wrote to memory of 1948 2132 14A9.tmp 39 PID 2132 wrote to memory of 1948 2132 14A9.tmp 39 PID 1948 wrote to memory of 2404 1948 1507.tmp 40 PID 1948 wrote to memory of 2404 1948 1507.tmp 40 PID 1948 wrote to memory of 2404 1948 1507.tmp 40 PID 1948 wrote to memory of 2404 1948 1507.tmp 40 PID 2404 wrote to memory of 2516 2404 1574.tmp 41 PID 2404 wrote to memory of 2516 2404 1574.tmp 41 PID 2404 wrote to memory of 2516 2404 1574.tmp 41 PID 2404 wrote to memory of 2516 2404 1574.tmp 41 PID 2516 wrote to memory of 2312 2516 15E1.tmp 42 PID 2516 wrote to memory of 2312 2516 15E1.tmp 42 PID 2516 wrote to memory of 2312 2516 15E1.tmp 42 PID 2516 wrote to memory of 2312 2516 15E1.tmp 42 PID 2312 wrote to memory of 1756 2312 165E.tmp 43 PID 2312 wrote to memory of 1756 2312 165E.tmp 43 PID 2312 wrote to memory of 1756 2312 165E.tmp 43 PID 2312 wrote to memory of 1756 2312 165E.tmp 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe"C:\Users\Admin\AppData\Local\Temp\2024-07-01_a78d9e33454d3c6784db4015b9973a10_mafia.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\10C3.tmp"C:\Users\Admin\AppData\Local\Temp\10C3.tmp"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\1111.tmp"C:\Users\Admin\AppData\Local\Temp\1111.tmp"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\116E.tmp"C:\Users\Admin\AppData\Local\Temp\116E.tmp"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\11CC.tmp"C:\Users\Admin\AppData\Local\Temp\11CC.tmp"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\1239.tmp"C:\Users\Admin\AppData\Local\Temp\1239.tmp"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\12B6.tmp"C:\Users\Admin\AppData\Local\Temp\12B6.tmp"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\1323.tmp"C:\Users\Admin\AppData\Local\Temp\1323.tmp"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\1381.tmp"C:\Users\Admin\AppData\Local\Temp\1381.tmp"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\13EE.tmp"C:\Users\Admin\AppData\Local\Temp\13EE.tmp"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\144C.tmp"C:\Users\Admin\AppData\Local\Temp\144C.tmp"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\14A9.tmp"C:\Users\Admin\AppData\Local\Temp\14A9.tmp"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\1507.tmp"C:\Users\Admin\AppData\Local\Temp\1507.tmp"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\1574.tmp"C:\Users\Admin\AppData\Local\Temp\1574.tmp"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\15E1.tmp"C:\Users\Admin\AppData\Local\Temp\15E1.tmp"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\165E.tmp"C:\Users\Admin\AppData\Local\Temp\165E.tmp"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\16CB.tmp"C:\Users\Admin\AppData\Local\Temp\16CB.tmp"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\1729.tmp"C:\Users\Admin\AppData\Local\Temp\1729.tmp"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\1786.tmp"C:\Users\Admin\AppData\Local\Temp\1786.tmp"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\1803.tmp"C:\Users\Admin\AppData\Local\Temp\1803.tmp"20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\1870.tmp"C:\Users\Admin\AppData\Local\Temp\1870.tmp"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:356 -
C:\Users\Admin\AppData\Local\Temp\18DE.tmp"C:\Users\Admin\AppData\Local\Temp\18DE.tmp"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\194B.tmp"C:\Users\Admin\AppData\Local\Temp\194B.tmp"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\19B8.tmp"C:\Users\Admin\AppData\Local\Temp\19B8.tmp"24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\1A06.tmp"C:\Users\Admin\AppData\Local\Temp\1A06.tmp"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\1A44.tmp"C:\Users\Admin\AppData\Local\Temp\1A44.tmp"26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\1A92.tmp"C:\Users\Admin\AppData\Local\Temp\1A92.tmp"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"C:\Users\Admin\AppData\Local\Temp\1AD1.tmp"28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"C:\Users\Admin\AppData\Local\Temp\1B1F.tmp"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"C:\Users\Admin\AppData\Local\Temp\1B5D.tmp"30⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"C:\Users\Admin\AppData\Local\Temp\1BAB.tmp"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:772 -
C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"C:\Users\Admin\AppData\Local\Temp\1BEA.tmp"32⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\1C28.tmp"C:\Users\Admin\AppData\Local\Temp\1C28.tmp"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:928 -
C:\Users\Admin\AppData\Local\Temp\1C66.tmp"C:\Users\Admin\AppData\Local\Temp\1C66.tmp"34⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\1CB4.tmp"C:\Users\Admin\AppData\Local\Temp\1CB4.tmp"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\1D02.tmp"C:\Users\Admin\AppData\Local\Temp\1D02.tmp"36⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\1D41.tmp"C:\Users\Admin\AppData\Local\Temp\1D41.tmp"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"C:\Users\Admin\AppData\Local\Temp\1D8F.tmp"38⤵
- Executes dropped EXE
- Loads dropped DLL
PID:688 -
C:\Users\Admin\AppData\Local\Temp\1DDD.tmp"C:\Users\Admin\AppData\Local\Temp\1DDD.tmp"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"C:\Users\Admin\AppData\Local\Temp\1E2B.tmp"40⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\1E79.tmp"C:\Users\Admin\AppData\Local\Temp\1E79.tmp"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\1EC7.tmp"C:\Users\Admin\AppData\Local\Temp\1EC7.tmp"42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\1F05.tmp"C:\Users\Admin\AppData\Local\Temp\1F05.tmp"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\1F53.tmp"C:\Users\Admin\AppData\Local\Temp\1F53.tmp"44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\1F92.tmp"C:\Users\Admin\AppData\Local\Temp\1F92.tmp"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"C:\Users\Admin\AppData\Local\Temp\1FE0.tmp"46⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\201E.tmp"C:\Users\Admin\AppData\Local\Temp\201E.tmp"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\206C.tmp"C:\Users\Admin\AppData\Local\Temp\206C.tmp"48⤵
- Executes dropped EXE
- Loads dropped DLL
PID:792 -
C:\Users\Admin\AppData\Local\Temp\20AA.tmp"C:\Users\Admin\AppData\Local\Temp\20AA.tmp"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\20F8.tmp"C:\Users\Admin\AppData\Local\Temp\20F8.tmp"50⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\2137.tmp"C:\Users\Admin\AppData\Local\Temp\2137.tmp"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\2175.tmp"C:\Users\Admin\AppData\Local\Temp\2175.tmp"52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\21C3.tmp"C:\Users\Admin\AppData\Local\Temp\21C3.tmp"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:344 -
C:\Users\Admin\AppData\Local\Temp\2202.tmp"C:\Users\Admin\AppData\Local\Temp\2202.tmp"54⤵
- Executes dropped EXE
- Loads dropped DLL
PID:848 -
C:\Users\Admin\AppData\Local\Temp\2240.tmp"C:\Users\Admin\AppData\Local\Temp\2240.tmp"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\228E.tmp"C:\Users\Admin\AppData\Local\Temp\228E.tmp"56⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\22CC.tmp"C:\Users\Admin\AppData\Local\Temp\22CC.tmp"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\230B.tmp"C:\Users\Admin\AppData\Local\Temp\230B.tmp"58⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\2349.tmp"C:\Users\Admin\AppData\Local\Temp\2349.tmp"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\23A7.tmp"C:\Users\Admin\AppData\Local\Temp\23A7.tmp"60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\23E5.tmp"C:\Users\Admin\AppData\Local\Temp\23E5.tmp"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\2433.tmp"C:\Users\Admin\AppData\Local\Temp\2433.tmp"62⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\2472.tmp"C:\Users\Admin\AppData\Local\Temp\2472.tmp"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\24B0.tmp"C:\Users\Admin\AppData\Local\Temp\24B0.tmp"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\24FE.tmp"C:\Users\Admin\AppData\Local\Temp\24FE.tmp"65⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\253C.tmp"C:\Users\Admin\AppData\Local\Temp\253C.tmp"66⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\258A.tmp"C:\Users\Admin\AppData\Local\Temp\258A.tmp"67⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\25C9.tmp"C:\Users\Admin\AppData\Local\Temp\25C9.tmp"68⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\2607.tmp"C:\Users\Admin\AppData\Local\Temp\2607.tmp"69⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\2646.tmp"C:\Users\Admin\AppData\Local\Temp\2646.tmp"70⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\2684.tmp"C:\Users\Admin\AppData\Local\Temp\2684.tmp"71⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\26C2.tmp"C:\Users\Admin\AppData\Local\Temp\26C2.tmp"72⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\2701.tmp"C:\Users\Admin\AppData\Local\Temp\2701.tmp"73⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\273F.tmp"C:\Users\Admin\AppData\Local\Temp\273F.tmp"74⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\277E.tmp"C:\Users\Admin\AppData\Local\Temp\277E.tmp"75⤵PID:2476
-
C:\Users\Admin\AppData\Local\Temp\27BC.tmp"C:\Users\Admin\AppData\Local\Temp\27BC.tmp"76⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\27FA.tmp"C:\Users\Admin\AppData\Local\Temp\27FA.tmp"77⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\2839.tmp"C:\Users\Admin\AppData\Local\Temp\2839.tmp"78⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\2877.tmp"C:\Users\Admin\AppData\Local\Temp\2877.tmp"79⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\28B6.tmp"C:\Users\Admin\AppData\Local\Temp\28B6.tmp"80⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\2904.tmp"C:\Users\Admin\AppData\Local\Temp\2904.tmp"81⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\2942.tmp"C:\Users\Admin\AppData\Local\Temp\2942.tmp"82⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\2980.tmp"C:\Users\Admin\AppData\Local\Temp\2980.tmp"83⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\29BF.tmp"C:\Users\Admin\AppData\Local\Temp\29BF.tmp"84⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"C:\Users\Admin\AppData\Local\Temp\2A0D.tmp"85⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"C:\Users\Admin\AppData\Local\Temp\2A4B.tmp"86⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"C:\Users\Admin\AppData\Local\Temp\2A8A.tmp"87⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"C:\Users\Admin\AppData\Local\Temp\2AC8.tmp"88⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\2B06.tmp"C:\Users\Admin\AppData\Local\Temp\2B06.tmp"89⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\2B45.tmp"C:\Users\Admin\AppData\Local\Temp\2B45.tmp"90⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\2B83.tmp"C:\Users\Admin\AppData\Local\Temp\2B83.tmp"91⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"C:\Users\Admin\AppData\Local\Temp\2BC2.tmp"92⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\2C00.tmp"C:\Users\Admin\AppData\Local\Temp\2C00.tmp"93⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"C:\Users\Admin\AppData\Local\Temp\2C3E.tmp"94⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"C:\Users\Admin\AppData\Local\Temp\2C7D.tmp"95⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"C:\Users\Admin\AppData\Local\Temp\2CBB.tmp"96⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"C:\Users\Admin\AppData\Local\Temp\2CFA.tmp"97⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\2D38.tmp"C:\Users\Admin\AppData\Local\Temp\2D38.tmp"98⤵PID:788
-
C:\Users\Admin\AppData\Local\Temp\2D76.tmp"C:\Users\Admin\AppData\Local\Temp\2D76.tmp"99⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"C:\Users\Admin\AppData\Local\Temp\2DB5.tmp"100⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"C:\Users\Admin\AppData\Local\Temp\2DF3.tmp"101⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\2E32.tmp"C:\Users\Admin\AppData\Local\Temp\2E32.tmp"102⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\2E70.tmp"C:\Users\Admin\AppData\Local\Temp\2E70.tmp"103⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"C:\Users\Admin\AppData\Local\Temp\2EAE.tmp"104⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\2EFC.tmp"C:\Users\Admin\AppData\Local\Temp\2EFC.tmp"105⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"C:\Users\Admin\AppData\Local\Temp\2F3B.tmp"106⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\2F79.tmp"C:\Users\Admin\AppData\Local\Temp\2F79.tmp"107⤵PID:2984
-
C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"C:\Users\Admin\AppData\Local\Temp\2FB8.tmp"108⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"C:\Users\Admin\AppData\Local\Temp\2FF6.tmp"109⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\3034.tmp"C:\Users\Admin\AppData\Local\Temp\3034.tmp"110⤵PID:1856
-
C:\Users\Admin\AppData\Local\Temp\3082.tmp"C:\Users\Admin\AppData\Local\Temp\3082.tmp"111⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\30D0.tmp"C:\Users\Admin\AppData\Local\Temp\30D0.tmp"112⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\310F.tmp"C:\Users\Admin\AppData\Local\Temp\310F.tmp"113⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\314D.tmp"C:\Users\Admin\AppData\Local\Temp\314D.tmp"114⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\318C.tmp"C:\Users\Admin\AppData\Local\Temp\318C.tmp"115⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\31CA.tmp"C:\Users\Admin\AppData\Local\Temp\31CA.tmp"116⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3208.tmp"C:\Users\Admin\AppData\Local\Temp\3208.tmp"117⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3247.tmp"C:\Users\Admin\AppData\Local\Temp\3247.tmp"118⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\3285.tmp"C:\Users\Admin\AppData\Local\Temp\3285.tmp"119⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\32C4.tmp"C:\Users\Admin\AppData\Local\Temp\32C4.tmp"120⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3302.tmp"C:\Users\Admin\AppData\Local\Temp\3302.tmp"121⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\3340.tmp"C:\Users\Admin\AppData\Local\Temp\3340.tmp"122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-